SIMULASI DAN ANALISIS EFEKTIVITAS SISTEM KEAMANAN JARINGAN MENGGUNAKAN INTRUSION PREVENTION SYSTEM (IPS) BERBASIS WAZUH

Authors

  • Andika Andika Universitas Kristen Satya Wacana
  • Rissal Efendi, M.Kom Fakultas Teknologi dan Informasi, Universitas Kristen Satya Wacana, Jawa Tengah

DOI:

https://doi.org/10.37792/jukanti.v8i1.1454

Keywords:

Wazuh, Network Security, Intrusion Prevention System, Simulation, Cybersecurity

Abstract

Abstract

Computer network security is a crucial aspect in the digital era, especially with the growing complexity and dynamics of cyber threats. This study aims to simulate a network security system using a Wazuh-based Intrusion Prevention System (IPS), an open-source security platform that integrates threat detection, prevention, and monitoring. The research methodology involves designing network topology, configuring Wazuh as an IPS, and conducting tests to evaluate its effectiveness in detecting and mitigating security threats. The simulation results show that Wazuh is capable of identifying and preventing attacks such as brute force and Cross-Site Scripting (XSS) attacks with satisfactory accuracy. This study provides practical insights into implementing an IPS-based network security system, particularly for organizations with limited resources.

 

Downloads

Download data is not yet available.

References

A. Aminanto and W. Sulistyo, “Simulasi Sistem Keamanan Jaringan Komputer Berbasis IPS Snort dan Honeypot Artilery,” Aiti, vol. 16, no. 2, pp. 135–150, 2020, doi: 10.24246/aiti.v16i2.135-150.

M. Anif, S. Hws, and M. D. Huri, “Penerapan Intrusion Detection System ( IDS ) dengan metode Deteksi Port Scanning pada Jaringan Komputer di Politeknik Negeri Semarang,” J. TELE, Vol. 13 Nomor 1, vol. 13, no. 1, pp. 25–30, 2015.

R. N. Dasmen, C. Ariyanto, M. H. Surya, and H. Ramadhan, “Penerapan Snort Sebagai Sistem Pendeteksi Serangan Keamanan Jaringan,” Jurasik (Jurnal Ris. Sist. Inf. dan Tek. Inform., vol. 7, no. 1, p. 8, 2022, doi: 10.30645/jurasik.v7i1.409.

B. Fachri and F. H. Harahap, “Simulasi Penggunaan Intrusion Detection System (IDS) Sebagai Keamanan Jaringan dan Komputer,” J. Media Inform. Budidarma, vol. 4, no. 2, p. 413, 2020, doi: 10.30865/mib.v4i2.2037.

W. W. Purba and R. Efendi, “Perancangan dan analisis sistem keamanan jaringan komputer menggunakan SNORT,” Aiti, vol. 17, no. 2, pp. 143–158, 2021, doi: 10.24246/aiti.v17i2.143-158.

M. Ulfa, “Implementasi Insrusion Detection System (IDS) Di Jaringan Internet Universitas Bina Darma,” J. Imiah MATRIK, vol. 15, no. 12, pp. 105–118, 2013.

I. Solikin, “Penerapan Metode PPDIOO dalam Pengembangan LAN dan WLAN,” Teknomatika, vol. 07, no. 01, pp. 65–73, 2017, [Online]. Available: http://ojs.palcomtech.ac.id.

Downloads

Published

2025-04-30

How to Cite

SIMULASI DAN ANALISIS EFEKTIVITAS SISTEM KEAMANAN JARINGAN MENGGUNAKAN INTRUSION PREVENTION SYSTEM (IPS) BERBASIS WAZUH. (2025). Jurnal Pendidikan Teknologi Informasi (JUKANTI), 8(1), 17-24. https://doi.org/10.37792/jukanti.v8i1.1454

Similar Articles

11-20 of 67

You may also start an advanced similarity search for this article.