Deteksi Ancaman Keamanan Pada Server dan Jaringan Menggunakan OSSEC
Isi Artikel Utama
Abstrak
Kejahatan cyber dapat menyerang jaringan komputer, menyusup kedalam jaringan mengambil data-data rahasia dan melumpuhkan sistem jaringan komputer. Dalam mengatasi kejahatan yang akan terjadi, dibutuhkan sistem yang dilengkapi firewall dan Intrusion Detection System (IDS). Firewall dan IDS sebagai fitur keamanan jaringan yang dapat melindungi server, jaringan, dan memblok serangan. Fitur firewall dan IDS dapat diterapkan dalam Tools OSSEC. OSSEC merupakan IDS berbasis open-source (host-based intrusion detection system/HIDS) yang mampu melakukan analisis log, pengecekan integritas, pemantauan registri Windows, deteksi rootkit, peringatan berbasis waktu, dan respons aktif. OSSEC mampu memantau satu server atau ribuan server dalam mode server/agent
Rincian Artikel
Referensi
[2] A. Anafcheh, “Intrusion Detection with OSSEC,” 2018.
[3] M. Syani, “Analisis Dan Implementasi Network Security System Menggunakan Teknik Host-Based Intrusion Detection System (Hids) Berbasis Cloud Computing,” no. Selisik, 2019, doi: 10.31227/osf.io/6t7us.
[4] Y. Zhou, G. Cheng, S. Jiang, and M. Dai, “Building an efficient intrusion detection system based on feature selection and ensemble classifier,” Comput. Networks, vol. 174, 2020, doi: 10.1016/j.comnet.2020.107247.
[5] D. Teixeira, L. Assunção, T. Pereira, S. Malta, and P. Pinto, “OSSEC IDS extension to improve log analysis and override false positive or negative detections,” J. Sens. Actuator Networks, vol. 8, no. 3, 2019, doi: 10.3390/jsan8030046.
[6] M. Syafrizal and U. A. Yogyakarta, Pengantar Jaringan Komputer. Penerbit Andi, 2020.
[7] M. A. Anas, Y. Soepriyanto, and S. Susilaningsih, “Pengembangan multimedia tutorial topologi jaringan untuk smk kelas x teknik komputer dan jaringan,” J. Kaji. Teknol. Pendidik., vol. 1, no. 4, pp. 307–314, 2019.
[8] A. Hadi, Administrasi Jaringan Komputer, 1st ed. Jakarta: Kencana Prenada Media Group, 2016.
[9] OSSEC, “Rules Classification.” https://www.ossec.net/docs/manual/rules- decoders/rule-levels.html (accessed Feb. 18, 2022).
[10] C. Zoho, “Server Monitoring Tools.” https://www.manageengine.com (accessed Oct. 27, 2021).
[11] M. Azmi, C. Foozy, K. Sukri, N. Abdullah, I. Hamid, & Hidra Amnur "Feature Selection Approach to Detect DDoS Attack Using Machine Learning Algorithms," JOIV : International Journal on Informatics Visualization, vol. 5, no. 4, , pp. 395-401, Dec. 2021. https://doi.org/10.30630/joiv.5.4.734
[12] H. Malallah et al., “A Comprehensive Study of Kernel (Issues and Concepts) in Different Operating Systems,” Asian J. Comput. Sci. Inf. Technol., vol. 8, pp. 16–31, 2021, doi: 10.9734/AJRCOS/2021/v8i330201.
[13] W. S. Bintara, “Pengertian Ubuntu, Definisi, Sejarah, Jenis, Kelebihan,” 2021. https://dianisa.com/pengertian-ubuntu/ (accessed Dec. 23, 2021).
[14] A. Vardi, “Linux For Beginners: The Ultimate Guide To The Linux OperatingSystem & Linux Commands,” 2016.
[15] T. Alam, “Cloud Computing and its role in the Information Technology,” IAIC Trans. Sustain. Digit. Innov., vol. 1, pp. 108–115, 2021.
[16] A. W. S. Inc, “Komputasi Cloud dengan AWS,” 2021. https://aws.amazon.com/id/what-is-aws/ (accessed Nov. 25, 2021)