MODELING INTRUSION DETECTION AND PREVENTION SYSTEM TO DETECT AND PREVENT NETWORK ATTACKS USING WAZUH

  • Otniel Dewangga Divan Pramudya Informatics and Computer Engineering Education, Faculty of Teacher Training and Education, Universitas Sebelas Maret, Indonesia
  • Puspanda Hatta Informatics and Computer Engineering Education, Faculty of Teacher Training and Education, Universitas Sebelas Maret, Indonesia
  • Cucuk Wawan Budiyanto Informatics and Computer Engineering Education, Faculty of Teacher Training and Education, Universitas Sebelas Maret, Indonesia
Keywords: Cybercrime, IDPS, Open-Source, QoS, Virtual Lab, Wazuh

Abstract

The rapid development of technology has a positive impact on society. The internet can be easily accessed anytime and anywhere, but with the advancement of internet technology, there are many threats lurking in the security of its users. Criminal activities in the digital world are referred to as cybercrime. Numerous cases of cybercrime have occurred worldwide, ranging from attacks that can disable servers to data theft and illegal access. It is noted that more than 50% of companies do not have a plan to respond to these cybercrimes. This is due to various factors, one of which is the limited availability of freely accessible and easily configurable network security platforms for all users. Therefore, this research aims to provide a solution in the form of an open-source-based Intrusion Detection and Prevention System (IDPS) that can be freely distributed and easily configured, one of which is Wazuh. The study uses the Cisco PPDIOO approach in developing a virtual lab with various scenarios for testing and measuring the Quality of Services (QoS) of Wazuh's performance. From the created test scenarios, Wazuh can detect attacks from both inside and outside the network. Wazuh has proven to be capable of detecting and preventing various types of network attacks and features that can facilitate users in responding to cybercrime, making it a potential solution for organizations that have not planned to respond to cybercrime.

Downloads

Download data is not yet available.

References

Z. Tie, “A mobile agent-based system for server resource monitoring,” Cybernetics and Information Technologies, vol. 13, no. 4, pp. 104–117, 2013, doi: 10.2478/cait-2013-0057.

A. Raharjo, R. W. Bintoro, N. A. Tri Utami, and M. Suzuki, “The Legal Policy of Criminal Justice Bureaucracy Cybercrime,” BESTUUR, vol. 10, no. 2, p. 105, Dec. 2022, doi: 10.20961/bestuur.v10i2.64498.

C. Sirois, “New McAfee Report Estimates Global Cybercrime Losses to Exceed $1 Trillion.” [Online]. Available: https://bit.ly/3imW1jv

Iskandar, “Situs Pemantauan Virus Corona DKI Jakarta Sempat Kena Serangan DDoS, Warganet Murka.” [Online]. Available: https://bit.ly/3GV5qbh

W. K. Pertiwi, “BPJS Kesehatan Akui Ada Kemungkinan Peretasan Data 279 Juta Warga RI.” [Online]. Available: https://bit.ly/3VZVdPg

P. Stavroulakis and M. Stamp, Handbook of Information and Communication Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. doi: 10.1007/978-3-642-04117-4.

A. L. Imoize, T. Oyedare, M. E. Otuokere, and S. Shetty, “Software Intrusion Detection Evaluation System: A Cost-Based Evaluation of Intrusion Detection Capability,” Communications and Network, vol. 10, no. 04, pp. 211–229, 2018, doi: 10.4236/cn.2018.104017.

H. Sjölinder and O. Carlsson, “Open Source Software Licenses Impact on Businesses,” 2023. [Online]. Available: www.bth.se

S. N. Kumar, “Review on Network Security and Cryptography,” International Transaction of Electrical and Computer Engineers System, vol. 3, no. 1, pp. 1–11, 2015, doi: 10.12691/iteces-3-1-1.

M. Syafrizal, “ISO 17799: Standar Sistem Manajemen Keamanan Informasi,” 2007.

R. Ali, A. Ali, F. Iqbal, M. Hussain, and F. Ullah, “Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review,” Security and Communication Networks, vol. 2022. Hindawi Limited, 2022. doi: 10.1155/2022/2959222.

P. Maniriho, A. N. Mahmood, and M. J. M. Chowdhury, “A systematic literature review on Windows malware detection: Techniques, research issues, and future directions,” Journal of Systems and Software, vol. 209, p. 111921, Mar. 2024, doi: 10.1016/j.jss.2023.111921.

N. N. Abdulla and R. K. Hasoun, “Review of Detection Denial of Service Attacks using Machine Learning through Ensemble Learning,” Iraqi Journal for Computers and Informatics, vol. 48, no. 1, pp. 13–20, 2022.

A. Cheema, M. Tariq, A. Hafiz, M. M. Khan, F. Ahmad, and M. Anwar, “Prevention Techniques against Distributed Denial of Service Attacks in Heterogeneous Networks: A Systematic Review,” Security and Communication Networks, vol. 2022. Hindawi Limited, 2022. doi: 10.1155/2022/8379532.

A. Alazzawi, “SQL INJECTION DETECTION USING RNN DEEP LEARNING MODEL,” Journal of Applied Engineering and Technological Science, vol. 5, no. 1, pp. 531–541, 2023.

G. Kostopoulos, Cyberspace and Cybersecurity, vol. Second edition. Boca Raton, Florida: Auerbach Publications, 2017. [Online]. Available: http://e-resources.perpusnas.go.id:2048/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=1620732&site=eds-live

Wazuh Documentation, “Getting Started.” Accessed: Jan. 09, 2024. [Online]. Available: https://documentation.wazuh.com/4.2/getting-started/index.html

Wazuh Documentation, “Wazuh Components.” Accessed: Jan. 09, 2024. [Online]. Available: https://documentation.wazuh.com/4.3/getting-started/components/index.html

T. Ernawati and F. Rachmat, “Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 5, no. 1, pp. 180–186, Feb. 2021, doi: 10.29207/resti.v5i1.2825.

Harahap A and Hutrianto, “INTRUSION DETECTION AND ANOMALY MENGGUNAKAN WAZUH PADA UNIVERSITAS MUHAMMADIYAH PALEMBANG,” Bina Darma Conference on Computer Science, pp. 324–328, Nov. 2021.

M. S. S. Husain, L. Fid Aksara, and N. Ransi, “IMPLEMENTASI KEAMANAN SERVER PADA JARINGAN WIRELESS MENGGUNAKAN METODE INTRUSION DETECTION AND PREVENTION SYSTEM (IDPS) (STUDI KASUS : TECHNO’S STUDIO),” semanTIK, vol. 4, no. 2, pp. 11–20, 2018, doi: 10.5281/zenodo.1407864.

N. S. S. Yomo, A. Z. Mardiansyah, and I. W. A. Arimbawa, “Deteksi Serangan SQL Injection Menggunakan Security Information and Event Management (SIEM) Wazuh (Sudi Kasus: Sistem Informasi Akademik Universitas Mataram),” 2023.

M. D. Pratama, F. Nova, and D. Prayama, “Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan Dos,” JITSI : Jurnal Ilmiah Teknologi Sistem Informasi, vol. 3, no. 1, pp. 1–7, Mar. 2022, doi: 10.30630/jitsi.3.1.59.

Verawati, “Merancang dan Membangun Jaringan VLAN Dengan Metode RIP pada Dinas Sosial dan Tenaga Kerja Menggunakan Cisco Router,” Jurnal Cendikia, vol. 12, no. 1, pp. 23–30, Apr. 2016.

StatCounter, “Desktop Operating System Market Share Worldwide 2021 - 2023.” Accessed: Jan. 25, 2024. [Online]. Available: https://gs.statcounter.com/os-market-share/desktop/worldwide/#yearly-2021-2023-bar

F. I. Tampati, F. G. Setyawan, W. W. Sejati, and A. R. Kardian, “Analisis Perbandingan Performa CPU pada Sistem Operasi FreeBSD 64-bit dan RedHat Linux 64-bit terhadap Serangan Denial of Service (DoS) Menggunakan Hping3,” CESS (Journal of Computing Engineering, System and Science), vol. 8, no. 1, pp. 209–219, 2023, [Online]. Available: www.jurnal.unimed.ac.id

Y. Singh, P. Singh, G. Sinha, and G. Sinha, “Footprinting Using Nmap,” Journal of Informatics Electrical and Electronics Engineer-ing, vol. 03, pp. 1–15, 2022, doi: 10.54060/JIEEE/003.

P. Wulandari, S. Soim, and M. Rose, “MONITORING DAN ANALISIS QOS (QUALITY OF SERVICE) JARINGAN INTERNET PADA GEDUNG KPA POLITEKNIK NEGERI SRIWIJAYA DENGAN METODE DRIVE TEST,” Prosiding SNATIF Ke-4 Tahun 2017, 2017.

ETSI, “Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); General aspects of Quality of Service (QoS),” 1999. [Online]. Available: http://www.etsi.org

W. Graniszewski and A. Arciszewski, “Performance analysis of selected hypervisors (Virtual Machine Monitors-VMMs),” International Journal of Electronics and Telecommunications, vol. 62, no. 3, pp. 231–236, Sep. 2016, doi: 10.1515/eletel-2016-0031.

Published
2025-02-12
How to Cite
[1]
O. D. D. Pramudya, P. Hatta, and C. W. Budiyanto, “MODELING INTRUSION DETECTION AND PREVENTION SYSTEM TO DETECT AND PREVENT NETWORK ATTACKS USING WAZUH”, J. Tek. Inform. (JUTIF), vol. 6, no. 1, pp. 173-186, Feb. 2025.