Implementation of Intrusion Detection System in Cyber Attack Prevention Efforts
Abstract
In this digital era, information systems have
become the backbone for many organizations and
companies. However, information systems are not free from
cyber attacks. Statistics from the National Cyber and Crypto Agency
State Cyber and Crypto Agency (BSSN) noted that there have been 370.02 million cyber attacks
in Indonesia in 2022[1]. In order to avoid
material losses and immaterial losses caused by cyberattacks, organizations, companies, entities
by cyberattacks, organizations, companies, government agencies and others are required to have a strong
organizations, companies, government agencies and others are required to have a system that
can monitor, analyze vulnerabilities, and prevent cyber attacks.
against cyber attacks. Wazuh is an open
platform that acts as an Intrusion Detection System (IDS)
or as a threat detection system, security monitoring
and incident response. Implementing Wazuh can
become a defensive wall in an organizational body,
company, government agency and so on in
overcome cyber attacks. The implementation of vigilance has functions
for Threat prevention, Integrity monitoring, Incident
response, Compliance in the server, Threat detection, Log
Event Management and Gap Detection that can
minimize the occurrence of cyber attacks.
Keywords - Cyber attack, Information system, Wazuh,
Security monitoring, Threat detection
References
kominfo, 15 5 2023. [Online]. Available:
https://bpptik.kominfo.go.id/Publikasi/detail/jenis-jenisserangan-siber-di-era-digital. [Diakses 12 5 2024].
[Online]. Available: https://kompas100.kompas.id/beritaekonomi/serangan-siber-perbankan-rugi-ratusan-miliar/.
[Diakses 12 5 2024].
M. D. Pratama, F. Nova dan D. Prayama,
Log Event Management dan Deteksi Celah,= Jurnal Ilmiah
Teknologi Sistem Informasi (Jitsi), vol. 3, pp. 1-7, 2022.
https://documentation.wazuh.com/current/gettingstarted/architecture.html#architecture. [Diakses 16 5 2024].
https://documentation.wazuh.com/current/gettingstarted/architecture.html#required-ports. [Diakses 16 5
.
Available:
https://documentation.wazuh.com/current/quickstart.html#h
ardware. [Diakses 16 5 2024].
H. Khotimah, F. Bimantoro, R. S. Kabanga dan I. B. K.
Widiartha,
INFORMATION AND EVENT MANAGEMENT (SIEM)
PADA APLIKASI SMS CENTER PEMERINTAH
DAERAH PROVINSI NUSA TENGGARA BARAT,=
JBegaTI, vol. 3, pp. 1-7, 2022.
A. Shafiyyah, G. F. Nama dan R. A. Pradipta,
METODE PPDIOO DI SISTEM KEAMANAN JARINGAN
PSDKU UNIVERSITAS LAMPUNG WAYKANAN
SEBAGAI DETEKSI DAN RESPON SERANGAN
SIBER,= JITET (Jurnal Informatika dan Teknik Elektro
Terapan) , vol. 12, pp. 970-982, 2024.
Downloads
Published
Versions
- 2024-11-20 (4)
- 2024-11-20 (3)
- 2024-11-20 (2)
- 2024-10-21 (1)



