{"title":"基于树莓派4的家庭网络入侵检测系统、多蜜罐和包分析器的设计","authors":"Febrian Rachmad Hariawan, Septia Ulfa Sunaringtyas","doi":"10.1109/QIR54354.2021.9716189","DOIUrl":null,"url":null,"abstract":"Increased crime and cyber-attacks make network security an essential prerequisite for organizations. However, organizations cannot guarantee this because the COVID-19 pandemic has forced organizations to suspend activities in the office and give employees the option to work from home. As a result, employees must always be connected to the home network to work. It can attract hackers to take advantage of the situation by launching various attacks. Therefore home network security must be updated, minimize vulnerabilities, and apply additional security. The number of IoT devices that can connect to the home network is also considered to increase security because the main entry point for hacking IoT is through the network. Raspberry Pi 4 can be used as a low-cost, power-efficient, and practical solution for home network security, including IDS Suricata, multiple honeypots (Cowrie & Dionaea), and Tshark packet analyzer. There are six types of attack simulations: port scanning, brute force, TCP flood attacks, smurf attacks, UDP flood attacks, and exploits on services/ports. Measurement of device performance is also carried out when running the system. Log data from the four sensors will be visualized with the ELK stack, making it easier to analyze attacks.","PeriodicalId":446396,"journal":{"name":"2021 17th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design an Intrusion Detection System, Multiple Honeypot and Packet Analyzer Using Raspberry Pi 4 for Home Network\",\"authors\":\"Febrian Rachmad Hariawan, Septia Ulfa Sunaringtyas\",\"doi\":\"10.1109/QIR54354.2021.9716189\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Increased crime and cyber-attacks make network security an essential prerequisite for organizations. However, organizations cannot guarantee this because the COVID-19 pandemic has forced organizations to suspend activities in the office and give employees the option to work from home. As a result, employees must always be connected to the home network to work. It can attract hackers to take advantage of the situation by launching various attacks. Therefore home network security must be updated, minimize vulnerabilities, and apply additional security. The number of IoT devices that can connect to the home network is also considered to increase security because the main entry point for hacking IoT is through the network. Raspberry Pi 4 can be used as a low-cost, power-efficient, and practical solution for home network security, including IDS Suricata, multiple honeypots (Cowrie & Dionaea), and Tshark packet analyzer. There are six types of attack simulations: port scanning, brute force, TCP flood attacks, smurf attacks, UDP flood attacks, and exploits on services/ports. Measurement of device performance is also carried out when running the system. Log data from the four sensors will be visualized with the ELK stack, making it easier to analyze attacks.\",\"PeriodicalId\":446396,\"journal\":{\"name\":\"2021 17th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 17th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/QIR54354.2021.9716189\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 17th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/QIR54354.2021.9716189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design an Intrusion Detection System, Multiple Honeypot and Packet Analyzer Using Raspberry Pi 4 for Home Network
Increased crime and cyber-attacks make network security an essential prerequisite for organizations. However, organizations cannot guarantee this because the COVID-19 pandemic has forced organizations to suspend activities in the office and give employees the option to work from home. As a result, employees must always be connected to the home network to work. It can attract hackers to take advantage of the situation by launching various attacks. Therefore home network security must be updated, minimize vulnerabilities, and apply additional security. The number of IoT devices that can connect to the home network is also considered to increase security because the main entry point for hacking IoT is through the network. Raspberry Pi 4 can be used as a low-cost, power-efficient, and practical solution for home network security, including IDS Suricata, multiple honeypots (Cowrie & Dionaea), and Tshark packet analyzer. There are six types of attack simulations: port scanning, brute force, TCP flood attacks, smurf attacks, UDP flood attacks, and exploits on services/ports. Measurement of device performance is also carried out when running the system. Log data from the four sensors will be visualized with the ELK stack, making it easier to analyze attacks.