ANALISIS LOG SISTEM PADA SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) UNTUK MENDETEKSI SERANGAN BRUTE FORCE

Brute-force attacks are a common type of cyber attack that target SSH and RDP protocols. These attacks can cause significant damage to organizations. One solution for detecting brute-force attacks is to use Security Information and Event Management (SIEM). SIEM can monitor login activity and identif...

Full description

Saved in:
Bibliographic Details
Main Author: Caleb Sebastian, (Author)
Format: Book
Published: 2024-01-22.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_29208
042 |a dc 
100 1 0 |a Caleb Sebastian, .  |e author 
245 0 0 |a ANALISIS LOG SISTEM PADA SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) UNTUK MENDETEKSI SERANGAN BRUTE FORCE 
260 |c 2024-01-22. 
500 |a http://repository.upnvj.ac.id/29208/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/29208/2/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/29208/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/29208/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/29208/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/29208/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/29208/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/29208/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/29208/9/RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/29208/10/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/29208/11/HASIL%20PLAGIARISME.pdf 
500 |a http://repository.upnvj.ac.id/29208/12/ARTIKEL%20KI.pdf 
520 |a Brute-force attacks are a common type of cyber attack that target SSH and RDP protocols. These attacks can cause significant damage to organizations. One solution for detecting brute-force attacks is to use Security Information and Event Management (SIEM). SIEM can monitor login activity and identify suspicious patterns. This study uses Wazuh, a popular open-source SIEM platform, to detect brute-force attacks targeting SSH and RDP protocols. The results of the study show that Wazuh can detect brute-force attacks effectively. Wazuh can block IP addresses that attempt to log in with the wrong password repeatedly. This study provides valuable information for organizations in their efforts to improve their security against brute-force attacks. Organizations can use SIEM, such as Wazuh, to detect brute-force attacks and provide a timely response. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA76 Computer software 
690 |a T Technology (General) 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/29208/ 
787 0 |n http://repository.upnvj.ac.id 
856 4 1 |u http://repository.upnvj.ac.id/29208/  |z Link Metadata