Implementasi Keamanan Server Aplikasi E-Raport SMK Negeri 1 Sinjai Menggunakan Wazuh
Kata Kunci:
Wazuh, server security, sysn flood slowris, low orbit ion cannon, monitoring server, e-raportAbstrak
Monitoring of the SYN flood Slowloris attack with 100,000 packets detected in /var/sys showed 52 events (9,175 bytes) between 09:53:57 and 10:06:58. Additionally, monitoring of 500,000 sockets by the Wazuh agent recorded 165 suspicious events with a total of 27,049 bytes. The monitoring of the Low Orbit Ion Cannon attack, sending 100,000 sockets, showed activity between 11:59:52 and 12:10:53, with 50 events (9,197 bytes). The attack using 300,000 sockets recorded between 11:59:52 and 12:22:53 showed 62 events (11,451 bytes), causing the E-Raport server to buffer, though connectivity remained stable. The attack with 500,000 sockets caused the server to time out, with 97 events (17,766 bytes). Overall analysis of the Slowloris attack with socket configurations of 100,000 and 500,000 showed that 100,000 sockets did not bring the server down, while 500,000 sockets with a payload of 120 bytes per packet and 64 TCP resulted in 100% packet loss. In the LOIC attack targeting IP 10.10.12.5, the researcher aimed at port 80 with 500,000 sockets per thread using the HTTP method, with monitoring times of 11:59:33 for 100,000 sockets, 11:59:52 for 100,000 sockets, 11:59:52 for 300,000 sockets, and 12:27:53 for 500,000 sockets
Unduhan
Referensi
S. Kramer and J. C. Bradfield, “A general definition of malware,” J. Comput. Virol., vol. 6, no. 2, pp. 105–114, May 2010, doi: 10.1007/s11416-009-0137-1.
I. B. A. I. Iswara and I. P. P. K. Yasa, “Analisis Dan Perbandingan Quality Of Service Video Conference Jitsi Dan Bigbluebutton Pada Virtual Private Server,” J. Resist. Rekayasa Sist. Komput., vol. 4, no. 2, pp. 192–203, Oct. 2021, doi: 10.31598/jurnalresistor.v4i2.794.
M. R. Ramadhani and A. R. Pratama, “Analisis Kesadaran Cybersecurity Pada Pengguna Media Sosial Di Indonesia”.
D. B. Rendro, W. N. Aji, J. R. Serang, C. Km, and T. Drangong, “Analisis Monitoring Sistem Keamanan Jaringan Komputer Menggunakan Software Nmap (Studi Kasus Di Smk Negeri 1 Kota Serang),” vol. 7, no. 2, 2020.
A. G. S. Harahap, “Intrusion Detection And Anomaly Menggunakan Wazuh Pada Universitas Muhammadiyah Palembang”.
F. Muhammad, I. Wahidah, and A. I. Irawan, “Analisis Pendeteksian Serangan Denial Of Service (DOS) Menggunakan Logika Fuzzy Metode Mamdani Pada Jaringan Internet Of Things (IOT)”.
M. Nas, F. Ulfiah, and U. Putri, “Analisis Sistem Security Information and Event Management (SIEM) Aplikasi Wazuh pada Dinas Komunikasi Informatika Statistik dan Persandian Sulawesi Selatan,” J. Teknol. Elekterika, vol. 20, no. 2, p. 92, Nov. 2023, doi: 10.31963/elekterika.v20i2.4536.
H. Khotimah, F. Bimantoro, and R. S. Kabanga, “Implementasi Security Information And Event Management (SIEM) Pada Aplikasi Sms Center Pemerintah Daerah Provinsi Nusa Tenggara Barat,” J. Begawe Teknol. Inf. JBegaTI, vol. 3, no. 2, Sep. 2022, doi: 10.29303/jbegati.v3i2.752.
I. W. Sinaga, I. Saputra, and T. Zebua, “Pengamanan Data Nilai Pada Aplikasi E-Raport Berdasarkan Algoritma 2DES,” KOMIK Konf. Nas. Teknol. Inf. Dan Komput., vol. 3, no. 1, Nov. 2019, doi: 10.30865/komik.v3i1.1604.
B. Jaya, Y. Yuhandri, and S. Sumijan, “Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS),” J. Sistim Inf. Dan Teknol., pp. 115–123, Dec. 2020, doi: 10.37034/jsisfotek.v2i4.32.
Moh Sulthan Arief Rahmatullah, Andyana Muhandhatul Nabila, Salmaa Satifha Dewi, Vira Datry, and Fathika Afrine Azaruddin, “Implementasi SIEM dan IDS Dalam Monitoring Terhadap Ancaman Serangan Pada WEB Server,” SABER J. Tek. Inform. Sains Dan Ilmu Komun., vol. 2, no. 1, pp. 130–137, Dec. 2023, doi: 10.59841/saber.v2i1.666.
E. Erawan and M. Salman, “Penguatan Keamanan Otomatis pada Sistem Operasi Ubuntu berbasis Image Mesin Virtual menggunakan solusi Packer,” Cakrawala Repos. IMWI, vol. 6, no. 4, pp. 1089–1097, Aug. 2023, doi: 10.52851/cakrawala.v6i4.451.
A. P. Armadhani, D. Nofriansyah, and K. Ibnutama, “Analisis Keamanan Untuk Mengetahui Vulnerability Pada DVWA Lab esting Menggunakan Penetration Testing Standart OWASP,” J. SAINTIKOM J. Sains Manaj. Inform. Dan Komput., vol. 21, no. 2, p. 80, Aug. 2022, doi: 10.53513/jis.v21i2.6119.