Abstract

Introduction: The growing use of data centers encourages virtualization technology to become an alternative solution in virtualization to provide a dense environment that can be adjusted according to needs. In hypervisor-based virtualization technology in managing servers in the Open Journal System data center, network administrators must allocate resources that are large enough so that when developing web or mobile systems takes a long time, and in hypervisor-based virtualization techniques, they must have access to the host kernel. Purpose: Research on the attack model and vulnerabilities of the Docker internal security system on the Open Journal System from the Docker daemon attack and DDoS attacks when building and managing the Docker internal system. Method: This research begins with a literature study, network scope, system design, and system implementation based on plans that have been made, as well as testing, analysis, and concluding the tests that have been carried out. Finding: At the testing stage, the results obtained were the success of the Docker system in handling DDoS attacks and the success of securing the Docker Daemon from Docker Daemon attacks. Conclusion: The Docker Daemon Attack can occur by misconfiguring containers. This flaw allows an unauthorised party to take control of a container that has already been created. By gaining root access, attackers can perform various malicious activities within the container. Therefore, it is important to have an understanding and implementation of proper security practices in the management and configuration of Docker containers to reduce the risk of these types of attacks. Keyword: Docker, Container, DDoS, Attack. ------------------------------------------ Studi dan Analisis Keamanan Sistem Internal Docker dari Docker Daemon Attack dan Ddos Pada Sistem Open Journal System Pendahuluan: Berkembangnya penggunaan data center ini mendorong teknologi virtualisasi menjadi salah satu alternatif solusi dalam virtualisasi untuk menyediakan lingkungan yang padat agar dapat disesuaikan sesuai kebutuhan. Pada teknologi virtualisasi berbasis hypervisor dalam pengelolaan server pada data Open Journal System, center administrator jaringan harus mengalokasikan resources yang cukup besar, sehingga ketika dilakukan development sistem web atau mobile membutuhkan waktu yang lama, serta pada teknik virtualisasi berbasis hypervisor harus memiliki akses ke kernel host. Tujuan: Meneliti model serangan dan kerentanan sistem keamanan internal Docker pada Open Journal System dari ancaman Docker Daemon Attack dan serangan DDoS pada saat membangun dan mengelola sistem internal Docker. Metode Penelitian: Penelitian ini dimulai dengan studi literatur, ruang lingkup jaringan, perancangan sistem, implementasi sistem berdasarkan rancangan yang telah dibuat, serta pengujian, analisis dan penarikan kesimpulan dari pengujian yang telah dilakukan. Hasil Penelitian: Pada tahap pengujian dilakukan hasil yang didapatkan yaitu keberhasilan sistem docker dalam menangani serangan DdoS serta keberhasilan pengamanan docker daemon dari serangan docker daemon attack. Kesimpulan: Serangan Docker Daemon dapat terjadi karena kesalahan konfigurasi container. Kelemahan ini memungkinkan pihak yang tidak berwenang untuk mengambil kendali atas container yang telah dibuat. Dengan mendapatkan akses root, penyerang dapat melakukan berbagai aktivitas berbahaya di dalam container. Oleh karena itu, penting untuk memiliki pemahaman dan penerapan praktik keamanan yang tepat dalam pengelolaan dan konfigurasi container Docker untuk mengurangi risiko jenis serangan ini. Kata Kunci: Docker, Container, DDoS, Attack.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.