PENGEMBANGAN SISTEM SIEM TERINTEGRASI MITRE ATT&CK UNTUK IDENTIFIKASI DAN ANALISIS INSIDEN KEAMANAN SIBER

Penulis

  • Anbiya Sisda Yaridz Telkom University
  • Muhammad Iqbal Telkom University

Abstrak

[1]        M. Landauer, K. Mayer, F. Skopik, M. Wurzenberger, and M. Kern, “Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation,” arXiv preprint arXiv:2408.15645, pp. 1–12, 2024.

[2]        A. Georgiadou, S. Mouzakitis, and D. Askounis, “Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework,” Sensors, vol. 21, no. 3267, p. 2, 2021.

[3]        M. I. Abdullah, A. I. Abas, and A. I. Hajamydeen, “Effective SOC Response Strategies Using MITRE ATT&CK,” Malaysia Board of Technologists (MBOT), vol. 3, no. 1, pp. 1–7, Jun. 2024.

[4]        H. Irawan, A. H. Muhammad, and A. Nasiri, “Design of Cybersecurity Maturity Assessment Framework Using NIST CSF v1.1 and CIS Controls v8,” INOVTEK POLBENG - SERI INFORMATIKA, vol. 9, no. 1, pp. 1–14, 2024.

[5]        “Akamai ‘Infection Monkey’, 2 Januari 2025. [Online]. Available: https://www.akamai.com/infectionmonkey. [Accessed 2 Januari 2025].”

[6]        “M. ATTACK, ‘MITRE ATT&CK ID: T1078,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1078/. [Accessed 2 Januari 2025].”

[7]        “M. ATTACK, ‘MITRE ATT&CK ID: T1548.002,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1548/002/. [Accessed 2 Januari 2025].”

[8]        “M. ATTACK, ‘MITRE ATT&CK ID: T1543.003,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1543/003/. [Accessed 2 Januari 2025].”

[9]        “M. ATTACK, ‘MITRE ATT&CK ID: T1069,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1069/. [Accessed 2 Januari 2025].”

[10]     “M. ATTACK, ‘MITRE ATT&CK ID: T1098,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1098/. [Accessed 2 Januari 2025].”

[11]     “M. ATTACK, ‘MITRE ATT&CK ID: T1548,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1548/. [Accessed 2 Januari 2025].”

[12]     “M. ATTACK, ‘MITRE ATT&CK ID: T1027,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1027/. [Accessed 2 Januari 2025].”

[13]     “M. ATTACK, ‘MITRE ATT&CK ID: T1569.002,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1569/002/. [Accessed 2 Januari 2025].”

[14]     “M. ATTACK, ‘MITRE ATT&CK ID: T1021,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1021/. [Accessed 2 Januari 2025].”

[15]     “M. ATTACK, ‘MITRE ATT&CK ID: T1041,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1041/. [Accessed 2 Januari 2025].”

[16]     “M. ATTACK, ‘MITRE ATT&CK ID: T1110,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1110/. [Accessed 2 Januari 2025].”

[17]     “M. ATTACK, ‘MITRE ATT&CK ID: T1046,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1046/. [Accessed 2 Januari 2025].”

[18]     “M. ATTACK, ‘MITRE ATT&CK ID: TA0008,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/tactics/TA0008/. [Accessed 2 Januari 2025].”

[19]     “CIS Critical Security Controls Version 8.1, 2024. [Online]. Available: https://www.cisecurity.org/controls/v8-1.”

##submission.additionalFiles##

Diterbitkan

2025-06-24

Terbitan

Bagian

Prodi D3 Teknologi Telekomunikasi