Implementasi Keamanan Server Aplikasi E-Raport SMK Negeri 1 Sinjai Menggunakan Wazuh

Penulis

  • Mutawadiyah Mikyal Universitas Negeri Makassar
  • Mustari Lamada Universitas Negeri Makassar
  • Abdul Wahid Universitas Negeri Makassar

Kata Kunci:

Wazuh, server security, sysn flood slowris, low orbit ion cannon, monitoring server, e-raport

Abstrak

Monitoring of the SYN flood Slowloris attack with 100,000 packets detected in /var/sys showed 52 events (9,175 bytes) between 09:53:57 and 10:06:58. Additionally, monitoring of 500,000 sockets by the Wazuh agent recorded 165 suspicious events with a total of 27,049 bytes. The monitoring of the Low Orbit Ion Cannon attack, sending 100,000 sockets, showed activity between 11:59:52 and 12:10:53, with 50 events (9,197 bytes). The attack using 300,000 sockets recorded between 11:59:52 and 12:22:53 showed 62 events (11,451 bytes), causing the E-Raport server to buffer, though connectivity remained stable. The attack with 500,000 sockets caused the server to time out, with 97 events (17,766 bytes). Overall analysis of the Slowloris attack with socket configurations of 100,000 and 500,000 showed that 100,000 sockets did not bring the server down, while 500,000 sockets with a payload of 120 bytes per packet and 64 TCP resulted in 100% packet loss. In the LOIC attack targeting IP 10.10.12.5, the researcher aimed at port 80 with 500,000 sockets per thread using the HTTP method, with monitoring times of 11:59:33 for 100,000 sockets, 11:59:52 for 100,000 sockets, 11:59:52 for 300,000 sockets, and 12:27:53 for 500,000 sockets

Unduhan

Data unduhan belum tersedia.

Referensi

S. Kramer and J. C. Bradfield, “A general definition of malware,” J. Comput. Virol., vol. 6, no. 2, pp. 105–114, May 2010, doi: 10.1007/s11416-009-0137-1.

I. B. A. I. Iswara and I. P. P. K. Yasa, “Analisis Dan Perbandingan Quality Of Service Video Conference Jitsi Dan Bigbluebutton Pada Virtual Private Server,” J. Resist. Rekayasa Sist. Komput., vol. 4, no. 2, pp. 192–203, Oct. 2021, doi: 10.31598/jurnalresistor.v4i2.794.

M. R. Ramadhani and A. R. Pratama, “Analisis Kesadaran Cybersecurity Pada Pengguna Media Sosial Di Indonesia”.

D. B. Rendro, W. N. Aji, J. R. Serang, C. Km, and T. Drangong, “Analisis Monitoring Sistem Keamanan Jaringan Komputer Menggunakan Software Nmap (Studi Kasus Di Smk Negeri 1 Kota Serang),” vol. 7, no. 2, 2020.

A. G. S. Harahap, “Intrusion Detection And Anomaly Menggunakan Wazuh Pada Universitas Muhammadiyah Palembang”.

F. Muhammad, I. Wahidah, and A. I. Irawan, “Analisis Pendeteksian Serangan Denial Of Service (DOS) Menggunakan Logika Fuzzy Metode Mamdani Pada Jaringan Internet Of Things (IOT)”.

M. Nas, F. Ulfiah, and U. Putri, “Analisis Sistem Security Information and Event Management (SIEM) Aplikasi Wazuh pada Dinas Komunikasi Informatika Statistik dan Persandian Sulawesi Selatan,” J. Teknol. Elekterika, vol. 20, no. 2, p. 92, Nov. 2023, doi: 10.31963/elekterika.v20i2.4536.

H. Khotimah, F. Bimantoro, and R. S. Kabanga, “Implementasi Security Information And Event Management (SIEM) Pada Aplikasi Sms Center Pemerintah Daerah Provinsi Nusa Tenggara Barat,” J. Begawe Teknol. Inf. JBegaTI, vol. 3, no. 2, Sep. 2022, doi: 10.29303/jbegati.v3i2.752.

I. W. Sinaga, I. Saputra, and T. Zebua, “Pengamanan Data Nilai Pada Aplikasi E-Raport Berdasarkan Algoritma 2DES,” KOMIK Konf. Nas. Teknol. Inf. Dan Komput., vol. 3, no. 1, Nov. 2019, doi: 10.30865/komik.v3i1.1604.

B. Jaya, Y. Yuhandri, and S. Sumijan, “Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS),” J. Sistim Inf. Dan Teknol., pp. 115–123, Dec. 2020, doi: 10.37034/jsisfotek.v2i4.32.

Moh Sulthan Arief Rahmatullah, Andyana Muhandhatul Nabila, Salmaa Satifha Dewi, Vira Datry, and Fathika Afrine Azaruddin, “Implementasi SIEM dan IDS Dalam Monitoring Terhadap Ancaman Serangan Pada WEB Server,” SABER J. Tek. Inform. Sains Dan Ilmu Komun., vol. 2, no. 1, pp. 130–137, Dec. 2023, doi: 10.59841/saber.v2i1.666.

E. Erawan and M. Salman, “Penguatan Keamanan Otomatis pada Sistem Operasi Ubuntu berbasis Image Mesin Virtual menggunakan solusi Packer,” Cakrawala Repos. IMWI, vol. 6, no. 4, pp. 1089–1097, Aug. 2023, doi: 10.52851/cakrawala.v6i4.451.

A. P. Armadhani, D. Nofriansyah, and K. Ibnutama, “Analisis Keamanan Untuk Mengetahui Vulnerability Pada DVWA Lab esting Menggunakan Penetration Testing Standart OWASP,” J. SAINTIKOM J. Sains Manaj. Inform. Dan Komput., vol. 21, no. 2, p. 80, Aug. 2022, doi: 10.53513/jis.v21i2.6119.

Diterbitkan

2024-10-14

Cara Mengutip

Mikyal, M., Lamada, M. ., & Wahid, A. . (2024). Implementasi Keamanan Server Aplikasi E-Raport SMK Negeri 1 Sinjai Menggunakan Wazuh. JIMU:Jurnal Ilmiah Multidisipliner, 3(01), 103–125. Diambil dari https://ojs.smkmerahputih.com/index.php/jimu/article/view/542

Artikel paling banyak dibaca berdasarkan penulis yang sama