Skripsi
SISTEM DETEKSI SERANGAN OUTSIDER PADA GERAKAN LATERAL SSH MENGGUNAKAN METODE RULE BASED
The advancement of computer network technology has brought significant benefits in data exchange and communication, but it also introduces cybersecurity risks, one of which is lateral movement. This type of attack occurs when an attacker gains initial access to a system and then moves laterally across the internal network to obtain more valuable information. This study aims to simulate and detect brute force attacks on the SSH service, which can be exploited in lateral movement scenarios. The simulation involves targeting a non-standard SSH port (port 2222) using a Python script and a wordlist to guess login credentials. The results show that an external attacker was able to gain access to the victim's system, and this activity was successfully detected using network analysis tools such as Wireshark, Snort, and NetworkMiner. These tools demonstrated effectiveness in identifying attack patterns through data packets, alert rules, and network artifacts. Additionally, mitigation measures such as changing the SSH port, disabling conventional login methods, and implementing SSH key-based authentication proved effective in preventing similar attacks during repeated testing. Therefore, a rule-based detection approach combined with proper security configurations can significantly enhance a system’s resilience against SSH-based lateral movement attacks.
Inventory Code | Barcode | Call Number | Location | Status |
---|---|---|---|---|
2507003702 | T176978 | T1769782025 | Central Library (Reference) | Available but not for loan - Not for Loan |
No other version available