ANALISIS LOG SISTEM PADA SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) UNTUK MENDETEKSI SERANGAN BRUTE FORCE

Caleb Sebastian, . (2024) ANALISIS LOG SISTEM PADA SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) UNTUK MENDETEKSI SERANGAN BRUTE FORCE. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.

[img] Text
ABSTRAK.pdf

Download (29kB)
[img] Text
AWAL.pdf

Download (374kB)
[img] Text
BAB 1.pdf
Restricted to Repository UPNVJ Only

Download (101kB)
[img] Text
BAB 2.pdf
Restricted to Repository UPNVJ Only

Download (229kB)
[img] Text
BAB 3.pdf
Restricted to Repository UPNVJ Only

Download (104kB)
[img] Text
BAB 4.pdf
Restricted to Repository UPNVJ Only

Download (1MB)
[img] Text
BAB 5.pdf

Download (81kB)
[img] Text
DAFTAR PUSTAKA.pdf

Download (160kB)
[img] Text
RIWAYAT HIDUP.pdf
Restricted to Repository UPNVJ Only

Download (105kB)
[img] Text
LAMPIRAN.pdf
Restricted to Repository UPNVJ Only

Download (231kB)
[img] Text
HASIL PLAGIARISME.pdf
Restricted to Repository staff only

Download (975kB)
[img] Text
ARTIKEL KI.pdf
Restricted to Repository staff only

Download (1MB)

Abstract

Brute-force attacks are a common type of cyber attack that target SSH and RDP protocols. These attacks can cause significant damage to organizations. One solution for detecting brute-force attacks is to use Security Information and Event Management (SIEM). SIEM can monitor login activity and identify suspicious patterns. This study uses Wazuh, a popular open-source SIEM platform, to detect brute-force attacks targeting SSH and RDP protocols. The results of the study show that Wazuh can detect brute-force attacks effectively. Wazuh can block IP addresses that attempt to log in with the wrong password repeatedly. This study provides valuable information for organizations in their efforts to improve their security against brute-force attacks. Organizations can use SIEM, such as Wazuh, to detect brute-force attacks and provide a timely response.

Item Type: Thesis (Skripsi)
Additional Information: No.Panggil: 1910511116 Pembimbing: Henki Bayu Seta Penguji 1: Widya Cholil Penguji 2: Ika Nurlaili Isnainiyah
Uncontrolled Keywords: Brute-force attack, SIEM, Wazuh, SSH, RDP
Subjects: Q Science > QA Mathematics > QA76 Computer software
T Technology > T Technology (General)
Divisions: Fakultas Ilmu Komputer > Program Studi Informatika (S1)
Depositing User: Caleb Sebastian
Date Deposited: 19 Feb 2024 06:51
Last Modified: 19 Feb 2024 06:51
URI: http://repository.upnvj.ac.id/id/eprint/29208

Actions (login required)

View Item View Item