Implementation of Intrusion Detection System in Cyber Attack Prevention Efforts

Authors

  • Sendi Ahmad Hidayat Telkom University
  • Denny Darlis Telkom University

Abstract

In this digital era, information systems have
become the backbone for many organizations and
companies. However, information systems are not free from
cyber attacks. Statistics from the National Cyber and Crypto Agency
State Cyber and Crypto Agency (BSSN) noted that there have been 370.02 million cyber attacks
in Indonesia in 2022[1]. In order to avoid
material losses and immaterial losses caused by cyberattacks, organizations, companies, entities
by cyberattacks, organizations, companies, government agencies and others are required to have a strong
organizations, companies, government agencies and others are required to have a system that
can monitor, analyze vulnerabilities, and prevent cyber attacks.
against cyber attacks. Wazuh is an open
platform that acts as an Intrusion Detection System (IDS)
or as a threat detection system, security monitoring
and incident response. Implementing Wazuh can
become a defensive wall in an organizational body,
company, government agency and so on in
overcome cyber attacks. The implementation of vigilance has functions
for Threat prevention, Integrity monitoring, Incident
response, Compliance in the server, Threat detection, Log
Event Management and Gap Detection that can
minimize the occurrence of cyber attacks.

Keywords - Cyber attack, Information system, Wazuh,
Security monitoring, Threat detection

References

kominfo, 15 5 2023. [Online]. Available:

https://bpptik.kominfo.go.id/Publikasi/detail/jenis-jenisserangan-siber-di-era-digital. [Diakses 12 5 2024].

[Online]. Available: https://kompas100.kompas.id/beritaekonomi/serangan-siber-perbankan-rugi-ratusan-miliar/.

[Diakses 12 5 2024].

M. D. Pratama, F. Nova dan D. Prayama,

Log Event Management dan Deteksi Celah,= Jurnal Ilmiah

Teknologi Sistem Informasi (Jitsi), vol. 3, pp. 1-7, 2022.

https://documentation.wazuh.com/current/gettingstarted/architecture.html#architecture. [Diakses 16 5 2024].

https://documentation.wazuh.com/current/gettingstarted/architecture.html#required-ports. [Diakses 16 5

.

Available:

https://documentation.wazuh.com/current/quickstart.html#h

ardware. [Diakses 16 5 2024].

H. Khotimah, F. Bimantoro, R. S. Kabanga dan I. B. K.

Widiartha,

INFORMATION AND EVENT MANAGEMENT (SIEM)

PADA APLIKASI SMS CENTER PEMERINTAH

DAERAH PROVINSI NUSA TENGGARA BARAT,=

JBegaTI, vol. 3, pp. 1-7, 2022.

A. Shafiyyah, G. F. Nama dan R. A. Pradipta,

METODE PPDIOO DI SISTEM KEAMANAN JARINGAN

PSDKU UNIVERSITAS LAMPUNG WAYKANAN

SEBAGAI DETEKSI DAN RESPON SERANGAN

SIBER,= JITET (Jurnal Informatika dan Teknik Elektro

Terapan) , vol. 12, pp. 970-982, 2024.

Downloads

Published

2024-10-21 — Updated on 2024-11-20

Versions

Issue

Section

Program Studi D3 Teknologi Telekomunikasi