Main Article Content
Cyber crimes can attack computer networks, infiltrate the network, retrieve confidential data and paralyze computer network systems. In overcoming the crimes that will occur, a system equipped with a firewall and an Intrusion Detection System (IDS) is needed. Firewall and IDS as network security features that can protect servers, networks, and block attacks. Firewall and IDS features can be implemented in OSSEC Tools. OSSEC is an open-source host-based intrusion detection system (HIDS) capable of performing log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerts, and active responses. OSSEC is capable of monitoring a single server or thousands of servers in server/agent mode
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
 A. Anafcheh, “Intrusion Detection with OSSEC,” 2018.
 M. Syani, “Analisis Dan Implementasi Network Security System Menggunakan Teknik Host-Based Intrusion Detection System (Hids) Berbasis Cloud Computing,” no. Selisik, 2019, doi: 10.31227/osf.io/6t7us.
 Y. Zhou, G. Cheng, S. Jiang, and M. Dai, “Building an efficient intrusion detection system based on feature selection and ensemble classifier,” Comput. Networks, vol. 174, 2020, doi: 10.1016/j.comnet.2020.107247.
 D. Teixeira, L. Assunção, T. Pereira, S. Malta, and P. Pinto, “OSSEC IDS extension to improve log analysis and override false positive or negative detections,” J. Sens. Actuator Networks, vol. 8, no. 3, 2019, doi: 10.3390/jsan8030046.
 M. Syafrizal and U. A. Yogyakarta, Pengantar Jaringan Komputer. Penerbit Andi, 2020.
 M. A. Anas, Y. Soepriyanto, and S. Susilaningsih, “Pengembangan multimedia tutorial topologi jaringan untuk smk kelas x teknik komputer dan jaringan,” J. Kaji. Teknol. Pendidik., vol. 1, no. 4, pp. 307–314, 2019.
 A. Hadi, Administrasi Jaringan Komputer, 1st ed. Jakarta: Kencana Prenada Media Group, 2016.
 OSSEC, “Rules Classification.” https://www.ossec.net/docs/manual/rules- decoders/rule-levels.html (accessed Feb. 18, 2022).
 C. Zoho, “Server Monitoring Tools.” https://www.manageengine.com (accessed Oct. 27, 2021).
 M. Azmi, C. Foozy, K. Sukri, N. Abdullah, I. Hamid, & Hidra Amnur "Feature Selection Approach to Detect DDoS Attack Using Machine Learning Algorithms," JOIV : International Journal on Informatics Visualization, vol. 5, no. 4, , pp. 395-401, Dec. 2021. https://doi.org/10.30630/joiv.5.4.734
 H. Malallah et al., “A Comprehensive Study of Kernel (Issues and Concepts) in Different Operating Systems,” Asian J. Comput. Sci. Inf. Technol., vol. 8, pp. 16–31, 2021, doi: 10.9734/AJRCOS/2021/v8i330201.
 W. S. Bintara, “Pengertian Ubuntu, Definisi, Sejarah, Jenis, Kelebihan,” 2021. https://dianisa.com/pengertian-ubuntu/ (accessed Dec. 23, 2021).
 A. Vardi, “Linux For Beginners: The Ultimate Guide To The Linux OperatingSystem & Linux Commands,” 2016.
 T. Alam, “Cloud Computing and its role in the Information Technology,” IAIC Trans. Sustain. Digit. Innov., vol. 1, pp. 108–115, 2021.
 A. W. S. Inc, “Komputasi Cloud dengan AWS,” 2021. https://aws.amazon.com/id/what-is-aws/ (accessed Nov. 25, 2021)