• Saleh Dwiyatno Universitas Serang Raya
  • Ayu Purnama Sari Universitas Serang Raya
  • Agus Irawan Universitas Serang Raya
  • Safig Safig Universitas Serang Raya
Keywords: DDoS, Honeypot, HoneyD, Network, Server


Information security is very important in today's technology. Information storage and crossing is currently no longer using paper media, but has used a lot of computer and internet media. PT. Torini Jaya Abadi is one that uses computer and internet media for information storage and crossing. However, there are disturbances such as heavy server access, which cannot be accessed and sometimes it cannot enter into the database server from the indication that the server might be exposed to a virus or DDoS (Distributed Danial of Service) type attacks occur on the server. Based on these problems, the author uses a honeypot to detect an attack based on alerts that have been accommodated in the log and can also provide information about the attacks that occur, from the results obtained honeyd is able to resemble an original system that pretends to have services that are not real , also able to detect attacks in real time and provide information from attackker, honeyd can emulate virtual hosts that are similar to the original computer, by obtaining logs from the honeyd admin system to find out information that occurs on the server, with honeyd network systems can help detect attacks in real time.


Aidin, L., Nasution, S., dan Azmi, F. (2016). “Implementasi High Interaction Honeypot Pada Server”. E-Proceeding of Engineering Vol. 3. No. (2). 2172-2178

Fathoni, W., Fitryani, Nurkahfi, G. (2016). “Deteksi Penyusup Pada Jaringan Komputer Menggunakan IDS SNORT”. E-Proceeding of Engineering Vol. 3. No. (1). 1169-1172

Ferdiansyah, D. (2013). “Pemanfaatan Teknologi Honeypot Dalam Meningkatkan Evailability Pada Sistem Jaringan”. Jurnal Informatika Manajemen dan Teknologi Vol. 15. No. (1). 11-18

Jain, A., Singh, A. (2012) “Distributed Denial Of Service (DDOS) Attack – Classification and Implications”. Jurnal Of Information Operations Management Vol. 3. No. (1). 136-140

Masse, F., Hidayat, A., dan Badrianto. (2015) “Penerapan Network Intrusion Detection System Menggunakan Snort Berbasis Database Myaql Pada Hotspot Kota”. Jurnal Elektronik Sistem Informasi dan Komputer Vol. 1. No. (2). 1-16

Micro, A. (2012). “Dasar-Dasar Jaringan Komputer”. [online]. Tersedia: [12 Desember 2018]

Nayyar, R., Harshita. (2017). “Identification of DoS Attack on Web Server”. Vol. 5. No. (2). 206-210

Sutarti, Khairunnisa. (2017). “Perancangan dan Analisis Keamanan Jaringan Nirkabel Dari Serangan DDoS (Distributed Denial of Service) Berbasis Honeypot”. Jurnal Prosisko Vol. 4. No. (2). 9-16

Tambunan, B.,Raharjo,W., Purwadi, J. (2013). “Desain Dan Implementsi Honeypot Dengan Fwsnort Dan PSAD Sebagai Intrusion Prevention System”. Ultima Computing Vol. 5. No. (1). 1-7

Utdirartatmo, f. (2005). “Trik Menjebak Hacker Dengan Honeypot”. Yogyakarta. Andi.

Wilman, Fitri, I., Nathasia. (2018). “Port Knocking dan Honeypot Sebagai Keamanan Jaringan Pada Server Ubuntu Virtual”. Jurnal Informatika Merdeka Pasuruan Vol. 3. No. (1). 27-33
How to Cite
Dwiyatno, S., Sari, A., Irawan, A., & Safig, S. (2019). PENDETEKSI SERANGAN DDoS (DISTRIBUTED DENIAL OF SERVICE) MENGGUNAKAN HONEYPOT DI PT. TORINI JAYA ABADI. Jurnal Sistem Informasi Dan Informatika, 2(2), 64-80. Retrieved from