Claim Missing Document
Check
Articles

Found 6 Documents
Search

Risk Analysis of Bruteforce Attacks on Webserver with Telegram Notifications Wibowo, Budi; Hafiz, Luqman
Jurnal Komputer dan Elektro Sains Vol. 3 No. 1 (2025): komets
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/komets.v3i1.305

Abstract

In today's digital era, server security is a top priority for many organizations. Intrusion Detection Systems (IDS) such as Fail2ban, have proven effective in protecting servers from threats by monitoring logs and blocking suspicious IP addresses. This paper discusses the implementation of Fail2ban integrated with Telegram notifications, how it works, testing, and results showing improvements in detecting and responding to attacks. Server ssh brute force attacks pose considerable risks to web servers and have potentially severe consequences. Implementing strong preventive measures, continuous monitoring, and leveraging Telegram notifications for real-time alerts significantly improved the organization’s security posture. These combined efforts ensure robust and responsive detection of brute force attacks. Fail2ban was able to quickly discover the IP address from which the attacker performed the brute force attack and took preventive action by blocking the attacker's Ip for 3 failed login attempts within a specified time limit of 3600 s.
Use of Benime Application in Arabic Language Learning Hael, Edar; Hafiz, Luqman; Deng, Changjiang
Lingeduca: Journal of Language and Education Studies Vol. 2 No. 2 (2023)
Publisher : Yayasan Pedidikan Islam Daarut Thufulah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55849/lingeduca.v2i2.16

Abstract

Language is a very basic thing for every human being, not only for communication but also as a forum for the prosecution of knowledge. At this time, other languages are urgently needed because of the increasing circulation of information using other languages, as well as Arabic itself. In the process of learning Arabic, there are several problems or difficulties faced at the IT Ar-Rahman Palangki Elementary School. With the development of technology at this time, therefore technology can be a solution to the difficulties brought into the teaching and learning process of Arabic at SD IT Ar-Rahman Palangki. This is due to the technology that we can use to assist in making interesting learning media, especially applications that can be accessed on Android in the form of images, sounds, and moving animations, such as the Benime application. The benime app itself is an animated video maker app for a more interesting percentage.
Deep Learning in Wazuh Intrusion Detection System to Identify Advanced Persistent Threat (APT) Attacks Wibowo, Budi; Nurrohman, Aji; Hafiz, Luqman
International Journal of Science Education and Cultural Studies Vol. 4 No. 1 (2025): IJSECS
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijsecs.v4i1.311

Abstract

Advanced Persistent Threats (APTs) pose a significant challenge in modern cybersecurity by leveraging persistent and sophisticated methods to compromise organizations. These threats employ advanced techniques such as encrypted communication, polymorphic malware, and log tampering, to evade detection, exfiltrate sensitive data, and disrupt critical infrastructure. Such characteristics often render conventional security measures ineffective in mitigating or preventing such attacks. This study adopted an experimental approach to assess the application of Wazuh, an advanced open-source security platform, in countering APT attacks. By simulating attack scenarios and analyzing real-time logs from diverse sources, Wazuh demonstrated strong intrusion detection capabilities, identifying attack patterns such as brute force attempts and unauthorized directory access. The findings underscore Wazuh’s effectiveness in enhancing organizational resilience by enabling rapid detection and response to suspicious activities. This research highlights how integrated log analysis can address the stealthy nature of APTs. Future studies should explore the integration of machine learning with platforms like Wazuh to further enhance automated and predictive threat detection capabilities, thereby strengthening defenses against evolving strategies of APTs.
Optimalisasi Bot Telegram untuk Deteksi Situs Perjudian Online di Dunia Pendidikan dan Sektor Pemerintah wibowo, Budi; Fathl Jannah, Annisa; Hafiz, Luqman
Jurnal Pengabdian Masyarakat Sultan Indonesia Vol. 2 No. 1 (2025): Abdisultan
Publisher : Sultan Publsiher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/abdisultan.v2i1.316

Abstract

Maraknya perjudian online telah menjadi ancaman yang signifikan terhadap keamanan digital, terutama untuk situs web pemerintah dan institusi pendidikan. Situs-situs ini, yang sering menjadi sasaran penjahat siber untuk menampung konten terkait perjudian, membuat pengguna terpapar pada berbagai risiko online. Penelitian ini menyajikan pengembangan bot Telegram yang bertujuan untuk mendeteksi situs perjudian online di situs web pemerintah dan institusi pendidikan. Bot ini menggunakan teknik dorking untuk mencari pola spesifik yang mengindikasikan konten perjudian online, memberikan peringatan waktu nyata kepada pengguna ketika situs tersebut teridentifikasi. Tujuan utama dari aplikasi ini adalah untuk meningkatkan kesadaran tentang bahaya perjudian online dan mempromosikan literasi keamanan siber, terutama di kalangan pelajar dan pengguna muda. Dengan mengirimkan notifikasi langsung ke Telegram, bot memastikan bahwa pengguna menerima pembaruan langsung tentang potensi ancaman, mendorong pendekatan proaktif terhadap keamanan online. Penelitian ini menyoroti pentingnya penggunaan teknologi untuk menjembatani kesenjangan dalam literasi digital dan menumbuhkan budaya kesadaran keamanan siber, terutama di lingkungan pendidikan. Temuan ini menunjukkan bahwa perangkat semacam itu dapat memainkan peran penting dalam mengedukasi pengguna dan melindungi mereka dari praktik-praktik online yang berbahaya, yang pada akhirnya berkontribusi pada pengembangan lingkungan internet yang lebih aman.
Application of "Kato Nan Ampek" as an Alternative for Effective Counseling Communication Asmita, Wenda; Silvianetri, Silvianetri; Hafiz, Luqman
Konseling Edukasi : Journal of Guidance and Counseling Vol 7, No 1 (2023): Konseling Edukasi : Journal Guidance and Counseling
Publisher : IAIN Kudus

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21043/konseling.v7i1.18216

Abstract

Application of "Kato Nan Ampek" as an Alternative to Effective Counseling Communication. The counselor deals with the clien twit havariety of issues related to thoughts, feelings, culture, disposition, customs andlanguage. Thecounselor must understand and adapttothe client's situation. This research discusses how the application of  KatoNan   Ampek   can be used as an alternative toeffective counseling communication. The research method usedis literature study, which is the analysis and synthesis of variousarticles    and    books. Research    shows    that counselorsmust first have the ability and personality to adaptto the client's situation. Counselor must consider, appreciate and respect the element soft he client's culture starting witht hecounselor's skill in sorting out the right words and expressionsfor   the   counselor.   Likewise,   counseling   communication with Kato Nan Ampek will be a communication full of ethic sandaesthetics. Keywords: Communication, counseling, effective.
A Review Method for Analysis of the Causes of Data Breach in the Pasca Pandemic Yuswanto, Andrie; wibowo, Budi; Hafiz, Luqman
Jurnal Komputer dan Elektro Sains Vol. 3 No. 1 (2025): komets
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/komets.v3i1.205

Abstract

The vulnerability of personal data breaches makes countries aware of the importance of regulations governing the protection of personal data Therefore, the importance of this research is to conduct a systematic review of the causes of data breaches based on the mechanism of activities carried out to answer problems and provide solutions to problems related to information security. The Systematic Literature Review (SLR) method was used to identify 283 papers in IEEE Xplore database, direct and signature digital science library based on automated search and predefined strings. Then 18 papers were selected for study based on inclusion and exclusion criteria. From the literature study, it can be concluded that the trends analyzed, data breaches are caused by user behavior that has not been educated about the dangers of data theft and awareness of information security.