Honeypot Log Analysis as a Network Security Support



How to Cite

Widodo, T., Muhsina, E. A., & Sugiantoro, B. (2013). Honeypot Log Analysis as a Network Security Support. IJID (International Journal on Informatics for Development), 2(1), 8–12. https://doi.org/10.14421/ijid.2013.02102


The development of information and communication technology could not be separated from the development of computer network and interconnected network (internet). On the other side, there are people who try to access the information illegally, even try to disturb and destroy the flow of information. These people are called hacker or cracker. Because of that reason, it is needed tools to prevent this information. Those tools are like firewall, IPS (Intrusion prevention system), IDS (intrusion detection system), anti-virus, and other tools. This research does literature review by analyzing one of IDS tools that is honeypot using a method of data analyzing using secondary data from Honey net Project Research at January 7th until 29th 2003. The result published by those researchers is a DDOS attack was happen at January 18th and 19th 2003 that caused one of the computer servers with IP (internet protocol) went down at January 19th 2003. A computer with IP at January18th 2003 started to get over packets, that is 293 packet or 41.1% from 707 packets, but the computer had not gone down yet. However, at January 19th 2003 the computer got more packets, that was 795 packets or 58% from 1,370 packets, that cause the computer became down. The evidence was unconnected computers at January 20th 2003. Based on these analyzing we concludes that honeypot is very effective to be a supporting tool to detect a network intrusion, especially DDOS. And the addition value of honeypot implementation is a log which gives information for network administrators to know any activities on the network, both normal activities, or disadvantage activities.



F. Utdirartatmo, No Title. 2005.

T. H. Project, “No Title,” 2004.

S. Agiyanto, “Teknik Mengenali Penyerang Sistem Komputer dan Internet dengan Honeypots,” Tek. Mengenali Penyerang Sist. Komput. dan Internet dengan Honeypots, no. ITB, Bandung, 2004.

G. M. Berdnaski and J. Branson, “Information Warfare: Understanding Network Threats through Honeypot Deployment,” no. Carnegie Mellon University, Pensylvania, 2004.

E. Maiwald, Network Security A Beginner’s Guide. The McGraw-Hill Companies, Inc, 2001.

L. Spitzer, “Honeypots The Future.” .

Creative Commons License
IJID (International Journal on Informatics for Development) is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License