Preprint has been published in a journal as an article
Preprint / Version 1

Implementation of The Honeypot Method in Security of Input Form Against Attacks Sql-injection

Implementasi Metode Honeypot dalam Pengamanan Form Input Terhadap Sql-Injection

##article.authors##

DOI:

https://doi.org/10.21070/ups.428

Keywords:

Website, Honeypot Methode

Abstract

At this time the internet is something that can notIbe separated inthe life of modernIsociety. For this reason, fast, safe andIreliable internetis very important. To achieveIthis on theIinternet there arevarious kinds of technology that make itvery influential in our lives. In the scope of security for safe and smoothinternet web surfing, we need security, especially in the excess part of the website. One way to doIthis isto commit website crimes, Sql Injection. SqlIinjection is ahacking action that is carried out in the client application by modifying the SQL commands that areIin the client application memory. SQL Injection is a technique for exploiting webIapplications, commands can be entered as desired by the user even though the user is not authorized to do so. Honeypot is a systemor computer that is deliberately used asIbait to become a target for attacks from attackers.

Keywords - website security, honeypot, sql-injection.

Downloads

Download data is not yet available.

References

A. S. Irawan, E. S. Pramukantoro, and A. Kusyanti, “Pengembangan Intrusion Detection System Terhadap SQL Injection Menggunakan Metode Learning Vector Quantization,” J. Pengemb. Teknol. Inf. dan Ilmu Komput. Univ. Brawijaya, vol. 2, no. 6, pp. 2295–2301, 2018.

I. Riadi, R. Umar, and W. Sukarno, ANALISIS FORENSIK SERANGAN SQL INJECTION MENGGUNAKAN METODE STATIS FORENSIK. 2019.

W. D. Fatma, “Analisa Keamanan Server Pada Login Page Webserver Dengan Enkripsi Sha 1 Dari Serangan Sql Injection Menggunakansystemoperasi Kali Linux Di Lkp Multi Logika Binjai,” 2018.

Yulianingsih, J. Nangka, T. Barat, and J. J. Selatan, “Menangkal Serangan SQL Injection dengan Parameterized Query,” 2018.

T. R. Yudantoro, “Sql Injection Pada Sistem Keamanan Database,” 2018.

P. Soepomo, “Penerapan Sistem Keamanan Honeypot dan Ids pada Jaringan Nirkabel (Hotspot),” JSTIE (Jurnal Sarj. Tek. Inform., vol. 1, no. 1, pp. 111–118, 2019, doi: 10.12928/jstie.v1i1.2512.

M. H. Romadhon and Y. Yudhistira, “Sistem Informasi Rental Mobil Berbsasis Android Dan Website Menggunakan Framework Codeigniter 3 Studi Kasus : CV Kopja Mandiri,” vol. 2, no. 1, pp. 30–36, 2021.

R. F. Ramadhan and R. Mukhaiyar, “Penggunaan Database Mysql dengan Interface PhpMyAdmin sebagai Pengontrolan Smarthome Berbasis Raspberry Pi,” JTEIN J. Tek. Elektro Indones., vol. 1, no. 2, pp. 129–134, 2020, doi: 10.24036/jtein.v1i2.55.

N. Arkaan and D. V. S. Y. Sakti, “Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, pp. 112–120, 2019, doi: 10.25077/teknosi.v5i2.2019.112-120.

B. Wiguna et al., “Wiguna, Implementasi Web Application Firewall dalam Mencegah Serangan SQL Injection pada Website Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website,” 2019, doi: 10.31849/digitalzone.v11i2.4867ICCS.

Posted

2023-02-27