PENGEMBANGAN SISTEM SIEM TERINTEGRASI MITRE ATT&CK UNTUK IDENTIFIKASI DAN ANALISIS INSIDEN KEAMANAN SIBER
Abstrak
[1] M. Landauer, K. Mayer, F. Skopik, M. Wurzenberger, and M. Kern, “Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation,” arXiv preprint arXiv:2408.15645, pp. 1–12, 2024.
[2] A. Georgiadou, S. Mouzakitis, and D. Askounis, “Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework,” Sensors, vol. 21, no. 3267, p. 2, 2021.
[3] M. I. Abdullah, A. I. Abas, and A. I. Hajamydeen, “Effective SOC Response Strategies Using MITRE ATT&CK,” Malaysia Board of Technologists (MBOT), vol. 3, no. 1, pp. 1–7, Jun. 2024.
[4] H. Irawan, A. H. Muhammad, and A. Nasiri, “Design of Cybersecurity Maturity Assessment Framework Using NIST CSF v1.1 and CIS Controls v8,” INOVTEK POLBENG - SERI INFORMATIKA, vol. 9, no. 1, pp. 1–14, 2024.
[5] “Akamai ‘Infection Monkey’, 2 Januari 2025. [Online]. Available: https://www.akamai.com/infectionmonkey. [Accessed 2 Januari 2025].”
[6] “M. ATTACK, ‘MITRE ATT&CK ID: T1078,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1078/. [Accessed 2 Januari 2025].”
[7] “M. ATTACK, ‘MITRE ATT&CK ID: T1548.002,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1548/002/. [Accessed 2 Januari 2025].”
[8] “M. ATTACK, ‘MITRE ATT&CK ID: T1543.003,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1543/003/. [Accessed 2 Januari 2025].”
[9] “M. ATTACK, ‘MITRE ATT&CK ID: T1069,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1069/. [Accessed 2 Januari 2025].”
[10] “M. ATTACK, ‘MITRE ATT&CK ID: T1098,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1098/. [Accessed 2 Januari 2025].”
[11] “M. ATTACK, ‘MITRE ATT&CK ID: T1548,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1548/. [Accessed 2 Januari 2025].”
[12] “M. ATTACK, ‘MITRE ATT&CK ID: T1027,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1027/. [Accessed 2 Januari 2025].”
[13] “M. ATTACK, ‘MITRE ATT&CK ID: T1569.002,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1569/002/. [Accessed 2 Januari 2025].”
[14] “M. ATTACK, ‘MITRE ATT&CK ID: T1021,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1021/. [Accessed 2 Januari 2025].”
[15] “M. ATTACK, ‘MITRE ATT&CK ID: T1041,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1041/. [Accessed 2 Januari 2025].”
[16] “M. ATTACK, ‘MITRE ATT&CK ID: T1110,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1110/. [Accessed 2 Januari 2025].”
[17] “M. ATTACK, ‘MITRE ATT&CK ID: T1046,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/techniques/T1046/. [Accessed 2 Januari 2025].”
[18] “M. ATTACK, ‘MITRE ATT&CK ID: TA0008,’ The MITRE Corporation, 2 Januari 2025. [Online]. Available: https://attack.mitre.org/tactics/TA0008/. [Accessed 2 Januari 2025].”
[19] “CIS Critical Security Controls Version 8.1, 2024. [Online]. Available: https://www.cisecurity.org/controls/v8-1.”



