JITSI : Jurnal Ilmiah Teknologi Sistem Informasi
Vol 3 No 1 (2022): Computer Engineering

Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan Dos

Fitri Nova (Politeknik Negeri Padang)
Muhammad Dehan Pratama (Politeknik Negeri Padang)
Deddy Prayama (Politeknik Negeri Padang)



Article Info

Publish Date
31 Mar 2022

Abstract

Server monitoring is the process of monitoring server system resources such as monitoring server performance also helps identify other performance-related problems such as resource utilization, application downtime, and response time to a service. File Integrity Monitoring (FIM) is the activity of monitoring the integrity of a file to maintain the integrity of a file from unauthorized changes, by utilizing Wazuh as one of the open source applications to monitor has various features to perform monitoring. Computer network security becomes something that needs to be considered as technology develops rapidly. It is the responsibility of a network administrator to monitor system security at any time. Given the various threats that can enter the system at any time, an application is needed that can detect and prevent the threat in real time. The problem raises the idea for the author to utilize one of the applications, namely Suricata in which there is an IDS (Intruction Detection System) method that will serve as an attacker detection. Suricata will display an alert when there is a suspicious package. The resulting alert will be stored in the file log. Then the log will be displayed on the Wazuh web interface. Alerts that appear on Wazuh will be sent to network administrators via e-mail

Copyrights © 2022






Journal Info

Abbrev

jitsi

Publisher

Subject

Computer Science & IT

Description

The journal scopes include (but not limited to) the followings: Computer Science : Artificial Intelligence, Data Mining, Database, Data Warehouse, Big Data, Machine Learning, Operating System, Algorithm Computer Engineering : Computer Architecture, Computer Network, Computer Security, Embedded ...