Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring

Main Article Content

Alde Alanda H.A Mooduto Ronal Hadi

Abstract

As cloud computing grows exponentially, organizations face escalating cybersecurity challenges due to increased cyber threats and attacks on cloud-based networks. Monitoring cloud servers is one action that can be taken to improve the security. This can be done with the help of various server monitoring tools, such as Wazuh. The study investigates Wazuh's effectiveness in real-time monitoring of three AWS EC2 instance-based cloud servers. Wazuh's capabilities such as log data collection, malware detection, active response automation, and Docker container monitoring, are examined. The research reveals detailed insights into user activities, web server access, and database operations. Wazuh proves adept at tracking file integrity, detecting malware, and responding actively, as evidenced by the 342 alerts generated during a 24-hour monitoring period. The result shows that Wazuh is a particularly effective tool for protecting cloud environments from cyberattacks because it provides quick and ongoing security monitoring, which is essential for securing intricate cloud infrastructures.

Downloads

Download data is not yet available.

Article Details

How to Cite
Alanda, A., Mooduto, H., & Hadi, R. (2023, September 30). Real-time Defense Against Cyber Threats: Analyzing Wazuh’s Effectiveness in Server Monitoring. JITCE (Journal of Information Technology and Computer Engineering), 7(2), 56-62. https://doi.org/https://doi.org/10.25077/jitce.7.2.56-62.2023
Section
Articles
Author Biographies

Alde Alanda, Politeknik Negeri Padang

Department of Information Technology

H.A Mooduto, Politeknik Negeri Padang

Department of Information Technology

Ronal Hadi, Politeknik Negeri Padang

Department of Information Technology

References

[1] A. A. Hezam, S. A. Mostafa, Z. Baharum, A. Alanda, and M. Z. Salikon, “Combining Deep Learning Models for Enhancing the Detection of Botnet Attacks in Multiple Sensors Internet of Things Networks,” Int. J. Informatics Vis., vol. 5, no. 4, 2021.
[2] A. Alanda, D. Satria, M. I. Ardhana, A. A. Dahlan, and H. A. Mooduto, “Web application penetration testing using sql injection attack,” Int. J. Informatics Vis., vol. 5, no. 3, 2021.
[3] FBI, “2020 Internet Crime Report,” Fed. Bur. Investig. - Internet Crime Complain. Cent., 2020.
[4] Sonicwall, “2021 SonicWall Cyber Threat Report,” 2021 SonicWall, pp. 1–38, 2021.
[5] F. S. Toker, K. O. Akpinar, and I. Ozcelik, “MITRE ICS Attack Simulation and Detection on EtherCAT Based Drinking Water System,” in 9th International Symposium on Digital Forensics and Security, ISDFS 2021, 2021.
[6] A. G. S. Harahap and H. Hutrianto, “Intrusion Detection and Anomaly Menggunakan Wazuh Pada Universitas Muhammadiyah Palembang,” Bina Darma …, pp. 324–328, 2021.