Security Information and Event Management (SIEM) to identify cyberattacks on OWASP standard web

Tia Rahmawati*, Nyoman Bogi Aditya Karna, Sofia Naning Hertina

Abstract


Cybercriminals usually attack an information security system that contains important and confidential data. Usually frequent attacks are carried out against web applications. Many web application developers  do not pay attention to the security side  of web applications  so that many are exploited by hackers. Security Information and Event Management (SIEM) used will monitor and collect all log reports. SIEM will process the logs to analyze security. All data obtained has been presented in visual form such as graphs. Then the data will be sent to the plugin so that users can more easily access the log report.

Keywords


SIEM

Full Text:

PDF

References


Ali, S., & Malik, T. N. (2022). Intrusion detection and prevention against cyber attacks for an energy management system. Mehran University Research Journal Of Engineering & Technology, 41(1), 202–219.

Alnabulsi, H., Islam, M. R., & Mamun, Q. (2014). Detecting SQL injection attacks using SNORT IDS. Asia-Pacific World Congress on Computer Science and Engineering, 1–7.

Angela, V. F. (2023). Strategi Pengembangan Ekowisata dalam Mendukung Konservasi Alam Danau Tahai. JIM: Jurnal Ilmiah Mahasiswa Pendidikan Sejarah, 8(3), 984–993.

Asril, A., Jaenam, J., Syahrizal, S., Armalena, A., & Yuherman, Y. (2023). Peningkatan Nilai-Nilai Demokrasi dan Nasionalisme Pada Mahasiswa Melalui Pembelajaran Pendidikan Pancasila dan Kewarganegaraan. JIM: Jurnal Ilmiah Mahasiswa Pendidikan Sejarah, 8(3), 1300–1309. https://doi.org/10.24815/jimps.v8i3.25109

Gunadhi, E., & Sudrajat, A. (2016). Pengamanan data rekam medis pasien menggunakan kriptografi vigenere cipher. Jurnal Algoritma, 13(2), 295–301.

Hartoyo, R., & Sulistyowati, S. (2023). The Role Of The Legal Aid Post Is In Providing Legal Assistance To Disadvantaged People In Order To Obtain Justice In The Courts Of The Holy Land. JIM: Jurnal Ilmiah Mahasiswa Pendidikan Sejarah, 8(3), 1599–1611. https://doi.org/10.24815/jimps.v8i3.25236

Indriati, K. I., Muchlas, M., & Syuti, M. (2023). Kebiasaan Belajar Siswa Sekolah Menengah Kejuruan Saat Pandemi Covid-19 Di SMK Muhammadiyah Purwodadi Purworejo. JIM: Jurnal Ilmiah Mahasiswa Pendidikan Sejarah, 8(3), 1319–1332. https://doi.org/doi.org/10.24815/jimps.v8i3.25117

Islam, m A., & Islam, m M. (2015). A novel signature based traffic classification engine reduce false alarms in intrusion detection systems. Int. Journal of Computer Networks and Communications (IJCNC), 7(1).

Ladjamuddin, S. M., & Bangga, I. G. W. (2022). Simulasi Snort Sebagai Alat Pendeteksi Intrusi Pada Web Damn Vulnerable Web Application. JURNAL REKAYASA INFORMASI, 11(2), 160–167.

Muhammad, R. M., Irawati, I. D., & Iqbal, M. (2021). Integrated Security System Implementation for Network Intrusion. Journal of Hunan University Natural Sciences, 48(6).

Monikasari, M., & Fitriyanti, F. (2023). The Existence of The Malay House ‘Limas Potong’In the Midst of Modernization Currents in the City of Batam 1970-2022. Riwayat: Educational Journal of History and Humanities, 6(2). https://doi.org/10.24815/jr.v6i2.31445

Mugiyatmi, M. (2023). Pengaruh Model Pembelajaran Teams Games Tournaments terhadap Hasil Belajar PPKN Siswa Kelas IV SDN Pacar. JIM: Jurnal Ilmiah Mahasiswa Pendidikan Sejarah, 8(2), 799–805.

Muwardi, R., Gao, H., Ghifarsyam, H. U., Yunita, M., Arrizki, A., & Andika, J. (2021). Network security monitoring system via notification alert. Journal of Integrated and Advanced Engineering (JIAE), 1(2), 113–122.

Novi, N., & Zaini, Z. (2017). Secure Socket Layer untuk Keamanan Data Rekam Medis Tumor Otak pada Health Information System. Jurnal Nasional Teknik Elektro, 137–142.

Yang, C.-H., & Shen, C.-H. (2009). Implement web attack detection engine with snort by using modsecurity core rules. Fourth the E-Learning and Information Technology Symposium (EITS 09).

Yuwono, D. T. (2022). Analysis Performance Intrusion Detection System in Detecting Cyber-Attack on Apache Web Server. IT Journal Research and Development, 6(2), 169–178.




DOI: https://doi.org/10.24815/jr.v6i3.33653

Article Metrics

Abstract view : 0 times
PDF - 0 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Riwayat: Educational of History and Humanities indexed by

sinta_logodoaj_logoDimensions_logoCROSSREF_logoROAD_logoPKP_Index_logoGoogle_Scholar_logogaruda_logoonesearch_logoBASE_logoWordcat_logo

___________________________________________________________
Riwayat: Educational of History and Humanities

E-ISSN 2775-5037
P-ISSN 2614-3917

Published by History Education Department, Faculty of Teacher Training and Education, Universitas Syiah Kuala, Province Aceh. Indonesia
W :https://jurnal.usk.ac.id/riwayat
E : riwayat@usk.ac.id

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.