Hybrid Intrusion Detection System and Network Infrastructure Vulnerability Mitigation using Active Response (XDR) Technique Wazuh and Suricata

Main Article Content

Hillman Akhyar Damanik
Merry Anggraeni

Abstract

The complexity of cyber threats against the network infrastructure of companies, educational institutions, and government makes protecting network infrastructure a top priority. Router and server devices are highly vulnerable to various types of cyber threats, requiring comprehensive detection and response solutions. This research will implement an intrusion detection system by integrating SIEM technology and Wazuh XDR (Extended Detection and Response). This system analyzes index pattern data from Wazuh agent devices to detect and respond to attacks using the XDR active response firewall. The testing was conducted MikroTik RouterOS, Ubuntu Server 20.04 as Wazuh agent to test reconnaissance attacks, brute force and DoS attacks. The results of the research show Nmap and brute force attacks were successfully detected by Wazuh manager and blocked the attacker IP malicious through active response. Detection of brute force attacks showed an increase in traffic of up to 60 Kbps and CPU usage reached 100%, then decreased after the active response firewall was activated. Authentication failure reached 2198 times in the first hour of the brute force attack. CPU usage increased from 20% to 85% during the attack and decreased to 15% after the active response firewall was activated. DoS attacks, on MikroTik experienced an increase in CPU usage of up to 61% and memory of 67%. After activating the active response firewall, CPU usage decreased to 3%. Traffic on the MikroTik interface increased to 3.3 Mbps during the attack, then decreased to 1 Kbps after the firewall was activated


 

Article Details

Section
Informatics

References

Akbar, S., Endroyono, & Wibawa, A. D. (2017). The impact analysis and mitigation of DDoS attack on local government electronic procurement service (LPSE). Proceeding - 2016 International Seminar on Intelligent Technology and Its Application, ISITIA 2016: Recent Trends in Intelligent Computational Technologies for Sustainable Energy, 36, 405–410. https://doi.org/10.1109/ISITIA.2016.7828694

BSSN. (2022). Lanskap Keamanan Siber Indonesia 2022. Badan Siber Dan Sandi Negara, 70.

Ceron, M., & Scholten, C. (n.d.). [IEEE NOMS 2020-2020 IEEE_IFIP Network Operations and Management Symposium - Budapest, Hungary (2020.4.20-2020.4.24)] NOMS 2020 - 2020 IEEE_IFIP Network Operations and Management Symposium - MikroTik Devices Lan.pdf.

Damanik, H. A., & Anggraeni, M. (2024). Pola Pengelompokan dan Pencegahan Public Honeypot menggunakan Teknik K-Means dan Automation Shell-Script. 12(1), 65–79.

Damanik, H. A., Anggraeni, M., & Nusantari, F. A. A. (2023). Konsep dan Penerapan Switching dan Routing Implementasi Jaringan Komputer Berbasis Cisco (Riana Kusumawati (ed.)). CV. Mega Press Nusantara.

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental Evaluation of Security Monitoring and Notification on Network Intrusion Detection System for Server Security. 2021 9th International Conference on Cyber and IT Service Management, CITSM 2021, 1–6. https://doi.org/10.1109/CITSM52892.2021.9588988

Howard, W., & Borowczak, M. (2020). Detecting DDoS Attacks near the Edge with Router Canaries. IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin, 2020-Novem, 18–21. https://doi.org/10.1109/ICCE-Berlin50680.2020.9352164

Subhan, A., Kunang, Y. N., & Yadi, I. Z. (2023). Analyzing the Attack Pattern of Brute Force Attack on SSH Port. Proceeding - International Conference on Information Technology and Computing 2023, ICITCOM 2023, 67–72. https://doi.org/10.1109/ICITCOM60176.2023.10441929

Suhendi, M. R. A., Alfarizi, Sukmandhani, A. A., & Prabowo, Y. D. (2023). Network Anomaly Detection Analysis using Artillery Honeypot and Wazuh SIEM. 2023 IEEE 9th International Conference on Computing, Engineering and Design (ICCED), 1–6. https://doi.org/10.1109/ICCED60214.2023.10425009

Suryantoro, T., & Sari, D. F. (2022). Analisa Serangan Terhadap Port 80 Webserver Dengan SIEM Wazuh Menggunakan Metode Deteksi Dan OSCAR. September, 1–6.

Triantopoulou, S., Papanikas, D., & Kotzanikolaou, P. (2019). An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet. 10th International Conference on Information, Intelligence, Systems and Applications, IISA 2019, 1–5. https://doi.org/10.1109/IISA.2019.8900732