Implementing Honeypot Technology to Enhance BMKG Network Security
Main Article Content
Abstract
The quick advancement of innovation has expanded the modernity of cyber dangers, requiring strong security measures to protect basic frameworks such as those overseen by the Meteorology, Climatology, and Geophysics Office (BMKG). This think about centers on the execution of honeypot innovation as a proactive defense component to upgrade BMKG's organize security. A case think about approach was conducted at Sekolah Tinggi Teknologi Adisutjipto, recreating BMKG organize situations to analyze and assess the viability of honeypots in recognizing and moderating cyberattacks. The investigate included the plan, arrangement, and testing of a honeypot framework custom fitted to imitate BMKG's arrange structure, capturing pernicious activity and recognizing assault designs. Comes about illustrated that the honeypot successfully recognized unauthorized get to endeavors, given experiences into attacker behaviors, and decreased the hazard of information breaches by redirecting malevolent on-screen characters absent from real systems. This paper concludes that executing honeypot innovation essentially upgrades arrange security by advertising real-time checking, risk investigation, and an extra layer of assurance against cyber dangers. The discoveries give a viable system for BMKG and other basic educate in receiving honeypots as portion of their cybersecurity methodologies. Future investigate seem investigate coordination honeypots with other progressed innovations, such as machine learning, to assist move forward security defenses.
Downloads
References
P. Lanka, K. Gupta, and C. Varol, “Intelligent Threat Detection—AI- Driven Analysis of Honeypot Data to Counter Cyber Threats,” Electronics (Switzerland), vol. 13, no. 13, Jul. 2024, doi: 10.3390/electronics13132465.
W. Fan, Z. Du, D. Fernandez, and V. A. Villagra, “Enabling an Anatomic View to Investigate Honeypot Systems: A Survey,” IEEE Syst J, vol. 12, no. 4, pp. 3906–3919, Dec. 2018, doi: 10.1109/JSYST.2017.2762161.
S. Kumar, B. Janet, and R. Eswari, “Multi Platform Honeypot for Generation of Cyber Threat Intelligence,” in Proceedings of the 2019 IEEE 9th International Conference on Advanced Computing, IACC 2019, Institute of Electrical and Electronics Engineers Inc., Dec. 2019, pp. 25–29. doi: 10.1109/IACC48062.2019.8971584.
A. Ziaie Tabari and X. Ou, “A Multi- phased Multi-faceted IoT Honeypot Ecosystem,” Proceedings of the ACM Conference on Computer and Communications Security, pp. 2121– 2123, 2020, doi: 10.1145/3372297.3420023.
M. L. Bringer, C. A. Chelmecki, and H. Fujinoki, “A Survey: Recent Advances and Future Trends in Honeypot Research,” International Journal of Computer Network and Information Security, vol. 4, no. 10, pp. 63–75, 2012, doi: 10.5815/ijcnis.2012.10.07.
W. Fan, Z. Du, M. Smith-Creasey, and D. Fernandez, “HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 3, pp. 683–697, 2019, doi: 10.1109/JSAC.2019.2894307.
W. Fan, Z. Du, M. Smith-Creasey, and D. Fernandez, “HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design,” IEEE Journal on Selected Areas in Communications, vol. 37, no. 3, pp. 683–697, Mar. 2019, doi: 10.1109/JSAC.2019.2894307.
X. Yang, J. Yuan, H. Yang, Y. Kong, H. Zhang, and J. Zhao, “A Highly Interactive Honeypot-Based Approach to Network Threat Management,” Future Internet, vol. 15, no. 4, Apr. 2023, doi: 10.3390/fi15040127.
A. Chuvakin, “‘Honeynets: High value security data,’” Network Security, vol. 2003, no. 8, pp. 11–15, 2003, doi: 10.1016/S1353-4858(03)00808-0.
A. S. Sani, E. Bertino, D. Yuan, K. Meng, and Z. Y. Dong, “SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities,” Comput Secur, vol. 115, p. 102610, Apr. 2022, doi: 10.1016/J.COSE.2022.102610.
A. Bar, B. Shapira, L. Rokach, and M. Unger, “Scalable attack propagation model and algorithms for honeypot systems,” Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016, pp. 1130–1135, 2016, doi: 10.1109/BigData.2016.7840716.
Z. Zhan, M. Xu, and S. Xu, “Characterizing honeypot-captured cyber attacks: Statistical framework and case study,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 11, pp. 1775–1789, 2013, doi: 10.1109/TIFS.2013.2279800.
W. Zhang, B. Zhang, Y. Zhou, H. He, and Z. Ding, “An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks,” IEEE Internet Things J, vol. 7, no. 5, pp. 3991–3999, May 2020, doi: 10.1109/JIOT.2019.2956173.
S. Lee, A. Abdullah, N. Jhanjhi, and S. Kok, “Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning,” PeerJ Comput Sci, vol. 7, pp. 1–23, 2021, doi: 10.7717/PEERJ-CS.350.
Z. Zhan, M. Xu, and S. Xu, “Characterizing honeypot-captured cyber attacks: Statistical framework and case study,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 11, pp. 1775–1789, 2013, doi: 10.1109/TIFS.2013.2279800.
M. Winn, M. Rice, S. Dunlap, J. Lopez, and B. Mullins, “Constructing cost-effective and targetable industrial control system honeypots for production networks,” International Journal of Critical Infrastructure Protection, vol. 10, pp. 47–58, 2015, doi: 10.1016/j.ijcip.2015.04.002.
W. Zhang, B. Zhang, Y. Zhou, H. He, and Z. Ding, “An IoT Honeynet Based on Multiport Honeypots for Capturing IoT Attacks,” IEEE Internet Things J, vol. 7, no. 5, pp. 3991–3999, 2020, doi: 10.1109/JIOT.2019.2956173.
W. Tian, M. Du, X. Ji, G. Liu, Y. Dai, and Z. Han, “Honeypot Detection Strategy against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game,” IEEE Internet Things J, vol. 8, no. 24, pp. 17372–17381, Dec. 2021, doi: 10.1109/JIOT.2021.3080527.
S. Lee, A. Abdullah, N. Jhanjhi, and S. Kok, “Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning,” PeerJ Comput Sci, vol. 7, pp. 1–23, 2021, doi: 10.7717/PEERJ-CS.350.
A. Girdhar and S. Kaur, “Comparative Study of Different Honeypots System,” 2012. [Online]. Available: www.ijerd.com