Isi Artikel Utama
Abstrak
Serangan web defacing, di mana situs web diganti tampilan nya dengan konten yang tidak diinginkan, seperti iklan judi online, merupakan ancaman serius bagi integritas dan reputasi situs web, terutama milik instansi pemerintah. Penelitian ini bertujuan untuk mendeteksi dan mencegah serangan web defacing yang mengandung konten judi online dengan menggabungkan Wazuh Security Information and Event Management (SIEM) dan Snort Intrusion Detection System (IDS) berbasis signature. Wazuh digunakan untuk memantau dan mengumpulkan log aktivitas secara real-time saat terdeteksi aktivitas mencurigakan. Sementara itu, Snort IDS bertindak sebagai sistem pendeteksi intrusi berbasis signature yang dapat mengenali pola serangan web defacing melalui rule yang telah ditetapkan untuk konten judi online. Penelitian ini dilakukan dengan membangun lingkungan simulasi serangan web defacing pada server, lalu menguji respons dan efektivitas dari Wazuh dan Snort dalam mendeteksi dan mencegah serangan. Hasil pengujian menunjukkan bahwa kombinasi Wazuh SIEM dan Snort IDS dapat mendeteksi serta mencegah serangan web defacing dengan tingkat akurasi yang sangat tinggi yaitu 100% serangan dapat dideteksi oleh Wazuh File Integrity Monitoring dan 76% untuk Snort IDS. Implementasi sistem ini diharapkan dapat membantu meningkatkan keamanan situs web, terutama yang dikelola oleh lembaga publik, dari ancaman web defacing.
Kata Kunci
Rincian Artikel

Artikel ini berlisensi Creative Commons Attribution-NoDerivatives 4.0 International License.
References
- A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” Digital Transformation Technology, vol. 3, no. 2, pp. 857–863, Dec. 2023, doi: 10.47709/digitech.v3i2.3379.
- M. R. Sumar, A. Wahid, and J. M. Parenreng, “conditions of the Creative Commons Attribution 4.0 (CC BY) International License. (http://creativecommons.org/licenses/by/4.0/). Sistem Keamanan Jaringan Terhadap Serangan DOS (Denial Of Service) Menggunakan Snort Dan Firewall Berbasis Linux OS (Network Security System Against DOS (Denial Of Service) Attacks Using Snort and Firewall Based on Linux OS).”
- E. Esterlin, V. Sihombing, and A. Putra Juledi, “Deteksi Serangan dalam Jaringan Komputer dengan Algoritma Pohon Keputusan C4.5,” Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI), vol. 7, no. 1, pp. 323–327, Mar. 2024, doi: 10.55338/jikomsi.v7i1.3087.
- W. Hidayat, D. Setyabudi, and N. Surayya Ulfa, "Pengaruh Terpaan Iklan Judi Online Dan Intensitas Komunikasi Dengan Teman Sebaya Terhadap Minat Bermain Judi Online," Interaksi Online, vol. 12, no. 4, pp. 637-647, Sep. 2024.
- BSSN. (2024) Lanskap Keamanan Siber Indonesia 2024 [online]. Available: https://www.bssn.go.id/wp-content/uploads/2025/01/LANSKAP-KEAMANAN-SIBER-2024.pdf. [Accessed: Jan. 15, 2025.]
- J. Desmon, S. Hidayatulloh, and Y. Jumaryadi, “Systematic Literature Review: Serangan Deface Website Sebagai Bentuk Kejahatan Siber,” 2024. [Online]. Available: https://jurnal.umj.ac.id/index.php/just-it/index
- M. R. Islam and R. Rafique, “Wazuh SIEM for Cyber Security and Threat Mitigation in Apparel Industries,” International Journal of Engineering Materials and Manufacture, vol. 9, no. 4, pp. 136–144, Oct. 2024, doi: 10.26776/ijemm.09.04.2024.02.
- “Implementation of signature-based intrusion detection system using SNORT to prevent threats in network servers,” Journal of Soft Computing Exploration, vol. 3, no. 2, Sep. 2022, doi: 10.52465/joscex.v3i2.80.
- A. Erlansari, F. F. Coastera, and A. Husamudin, “Early Intrusion Detection System (IDS) using Snort and Telegram approach,” SISFORMA, vol. 7, no. 1, pp. 21–27, Jun. 2020, doi: 10.24167/sisforma.v7i1.2629.
- J. - and B. Soewito, “SIEM and Threat Intelligence: Protecting Applications with Wazuh and TheHive,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 9, 2024, doi: 10.14569/IJACSA.2024.0150923.
- D. Julian and T. Sutabri, “Analisa Kinerja Aplikasi Digital Forensik Autopsy untuk Pengembalian Data menggunakan Metode NIST SP 800-86,” Jurnal Informatika Terpadu, vol. 9, no. 2, pp. 136–142, Sep. 2023, doi: 10.54914/jit.v9i2.984.
- Reza Febriana and Ahmad Luthfi, “Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 7, no. 5, pp. 1097–1110, Oct. 2023, doi: 10.29207/resti.v7i5.5279.
- E. K. Dewi, “Analisis Log Snort Menggunakan Network Forensic,” JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), vol. 2, no. 2, Dec. 2017, doi: 10.29100/jipi.v2i2.370.
- A. Faizal and A. Luthfi, “Comparison Study of NIST SP 800-86 and ISO/IEC 27037 Standards as A Framework for Digital Forensic Evidence Analysis,” Journal of Information Systems and Informatics, vol. 6, no. 2, pp. 701–718, Jun. 2024, doi: 10.51519/journalisi.v6i2.717.
- A. Suryaningrat, D. Ramayanti, G. M. Taberima, and P. P. Kurniawan, “File Upload Security: Essential Practices for Programmers,” CCIT Journal, vol. 17, no. 2, pp. 184–196, Jul. 2024, doi: 10.33050/ccit.v17i2.3172.
- I. Riadi and E. I. Aristianto, “An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload,” Computer Engineering and Applications Journal, vol. 5, no. 1, pp. 19–28, Feb. 2016, doi: 10.18495/comengapp.v5i1.161.
References
A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” Digital Transformation Technology, vol. 3, no. 2, pp. 857–863, Dec. 2023, doi: 10.47709/digitech.v3i2.3379.
M. R. Sumar, A. Wahid, and J. M. Parenreng, “conditions of the Creative Commons Attribution 4.0 (CC BY) International License. (http://creativecommons.org/licenses/by/4.0/). Sistem Keamanan Jaringan Terhadap Serangan DOS (Denial Of Service) Menggunakan Snort Dan Firewall Berbasis Linux OS (Network Security System Against DOS (Denial Of Service) Attacks Using Snort and Firewall Based on Linux OS).”
E. Esterlin, V. Sihombing, and A. Putra Juledi, “Deteksi Serangan dalam Jaringan Komputer dengan Algoritma Pohon Keputusan C4.5,” Jurnal Ilmu Komputer dan Sistem Informasi (JIKOMSI), vol. 7, no. 1, pp. 323–327, Mar. 2024, doi: 10.55338/jikomsi.v7i1.3087.
W. Hidayat, D. Setyabudi, and N. Surayya Ulfa, "Pengaruh Terpaan Iklan Judi Online Dan Intensitas Komunikasi Dengan Teman Sebaya Terhadap Minat Bermain Judi Online," Interaksi Online, vol. 12, no. 4, pp. 637-647, Sep. 2024.
BSSN. (2024) Lanskap Keamanan Siber Indonesia 2024 [online]. Available: https://www.bssn.go.id/wp-content/uploads/2025/01/LANSKAP-KEAMANAN-SIBER-2024.pdf. [Accessed: Jan. 15, 2025.]
J. Desmon, S. Hidayatulloh, and Y. Jumaryadi, “Systematic Literature Review: Serangan Deface Website Sebagai Bentuk Kejahatan Siber,” 2024. [Online]. Available: https://jurnal.umj.ac.id/index.php/just-it/index
M. R. Islam and R. Rafique, “Wazuh SIEM for Cyber Security and Threat Mitigation in Apparel Industries,” International Journal of Engineering Materials and Manufacture, vol. 9, no. 4, pp. 136–144, Oct. 2024, doi: 10.26776/ijemm.09.04.2024.02.
“Implementation of signature-based intrusion detection system using SNORT to prevent threats in network servers,” Journal of Soft Computing Exploration, vol. 3, no. 2, Sep. 2022, doi: 10.52465/joscex.v3i2.80.
A. Erlansari, F. F. Coastera, and A. Husamudin, “Early Intrusion Detection System (IDS) using Snort and Telegram approach,” SISFORMA, vol. 7, no. 1, pp. 21–27, Jun. 2020, doi: 10.24167/sisforma.v7i1.2629.
J. - and B. Soewito, “SIEM and Threat Intelligence: Protecting Applications with Wazuh and TheHive,” International Journal of Advanced Computer Science and Applications, vol. 15, no. 9, 2024, doi: 10.14569/IJACSA.2024.0150923.
D. Julian and T. Sutabri, “Analisa Kinerja Aplikasi Digital Forensik Autopsy untuk Pengembalian Data menggunakan Metode NIST SP 800-86,” Jurnal Informatika Terpadu, vol. 9, no. 2, pp. 136–142, Sep. 2023, doi: 10.54914/jit.v9i2.984.
Reza Febriana and Ahmad Luthfi, “Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 7, no. 5, pp. 1097–1110, Oct. 2023, doi: 10.29207/resti.v7i5.5279.
E. K. Dewi, “Analisis Log Snort Menggunakan Network Forensic,” JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), vol. 2, no. 2, Dec. 2017, doi: 10.29100/jipi.v2i2.370.
A. Faizal and A. Luthfi, “Comparison Study of NIST SP 800-86 and ISO/IEC 27037 Standards as A Framework for Digital Forensic Evidence Analysis,” Journal of Information Systems and Informatics, vol. 6, no. 2, pp. 701–718, Jun. 2024, doi: 10.51519/journalisi.v6i2.717.
A. Suryaningrat, D. Ramayanti, G. M. Taberima, and P. P. Kurniawan, “File Upload Security: Essential Practices for Programmers,” CCIT Journal, vol. 17, no. 2, pp. 184–196, Jul. 2024, doi: 10.33050/ccit.v17i2.3172.
I. Riadi and E. I. Aristianto, “An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload,” Computer Engineering and Applications Journal, vol. 5, no. 1, pp. 19–28, Feb. 2016, doi: 10.18495/comengapp.v5i1.161.