Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Jurnal Algoritma

Deteksi dan Pencegahan Web Defacing Judi Online dengan Wazuh SIEM dan Snort IDS Berbasis Signature Reza Pahlevi, Mohammad Rizky; Umam, Chaerul; Handoko, L. Budi
Jurnal Algoritma Vol 22 No 1 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-1.2220

Abstract

Web defacing attacks, where websites are replaced with unwanted content, such as online gambling advertisements, pose a serious threat to the integrity and reputation of websites, especially those belonging to government agencies. This research aims to detect and prevent web defacing attacks containing online gambling content by combining Wazuh Security Information and Event Management (SIEM) and Snort signature-based Intrusion Detection System (IDS). Wazuh is used to monitor and collect activity logs in real-time when suspicious activity is detected. Meanwhile, Snort IDS acts as a signature-based intrusion detection system that can recognize web defacing attack patterns through predefined rules for online gambling content. This research was conducted by building a web defacing attack simulation environment on the server, then testing the response and effectiveness of Wazuh and Snort in detecting and preventing attacks. The test results show that the combination of Wazuh SIEM and Snort IDS can detect and prevent web defacing attacks with a very high accuracy rate, namely 100% of attacks can be detected by Wazuh File Integrity Monitoring and 76% for Snort IDS. The implementation of this system is expected to help improve website security, especially those managed by public institutions, from web defacing threats.
Analisis Keamanan Sistem Kepegawaian dan Pengembangan Sumber Daya Manusia di Sektor Pemerintahan Dengan Metode OWASP Nur Hariyanto, Mohammad Malik; Umam, Chaerul
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2631

Abstract

Information system security plays an important role in supporting public services, particularly in the management of civil servant data and human resources. This research aims to evaluate the security of the personnel information system in the government sector in Pati Regency. This research approach uses OWASP ZAP. The findings show that the system still has a high potential for exploitation through various types of cyber attacks, such as XSS, clickjacking, CSRF, and data theft. This condition makes it very important to conduct regular IT security audits to maintain the reliability and integrity of government information systems.
Analisis Tripartit Keamanan Docker: Evaluasi Metode Deteksi Kerentanan, Registry, dan Layanan Widyanto Utomo, Arya; Ghozi, Wildanil; Umam, Chaerul
Jurnal Algoritma Vol 22 No 2 (2025): Jurnal Algoritma
Publisher : Institut Teknologi Garut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33364/algoritma/v.22-2.2983

Abstract

The adoption of Docker as the standard container platform poses new security challenges, particularly regarding vulnerabilities in public images. This study evaluates the effectiveness of three vulnerability scanning methods for Docker images: direct scanning, vendor-integrated SBOM scanning, and cross-vendor SBOM scanning, using Trivy and Grype on 36 images from three major registries (Docker Official, Bitnami, Chainguard). The results show that direct scanning and vendor-integrated SBOM scanning produce identical detections (12,023 vulnerabilities with Trivy; 8,950 with Grype), while cross-vendor SBOM scanning decreases dramatically by more than 90% (only 800–790 findings). Chainguard proved to be the most secure, while Docker Official was the most vulnerable (e.g., python:latest had 2,053 vulnerabilities). Programming language-based images (Rust: 3,825; Node.js: 3,816) were also riskier than specialized services (Redis: 341; MongoDB: 351). This research developed a framework for evaluating the effectiveness of cross-approach vulnerability scanning and strengthened the theory of software supply chain security through the concept of SBOM provenance dependency, which became the basis for the development of a multi-phase vulnerability scanning framework and recommendations for secure container implementation.