Investigation of Cyber Malware Attacks On Server Networks Using SIEM Method Based On NIST 800-61 Rev 2

Ali Muhammad, Budi Jejen Zaenal Abidin, Yolanda Putri Yani, Nurul Widyastuti, Angge Firizkiansah, Miri Ardiansyah

Abstract


The growth of cyber threats, especially malware attacks on servers, has increased significantly and is increasingly complex. These attacks can cause huge losses, both in terms of data confidentiality, system integrity, and service availability. Slow and unstructured handling of security incidents can worsen the impact. This research aims to develop an efficient detection and response system to malware attacks, especially on servers that are the main targets of cyberattacks. This research uses a systematic and responsive approach using the NIST 800-61 Rev 2-based SIEM (Security Information and Event Management) framework in handling cyber incidents. The SIEM framework enables an investigation or digital forensics process that includes monitoring, correlating, and analyzing incidents to take place. Meanwhile, NIST 800-61 Rev 2 aims to analyze the investigation process or digital forensics of cybercrime cases and generate digital evidence. The results of this study show that malware cyberattacks tend to be silent and do not show any anomalies on the server. Digital forensic evidence is presented to detect the veracity of a malware attack.


Keywords


Cyber Attack, Malware, Phishing, SIEM NIST 800-61 Rev 2.

Full Text:

PDF

References


Azmi, Saputra Dio; Deris, S. T. Su. (2023). Implementasi Sistem Deteksi Ransomware Menggunakan Deep Packet Inspection pada Layanan SMK Negeri 1 Palembang. Indonesian Journal of Multidisciplinary on Social and Technology, 1(2), 176–183.

Nofiyan, A. (2020). Analisis Forensik pada Web Phishing Menggunakan Metode National Institute Of Standards And Technology ( NIST ). Jurnal Sarana Teknik Informatika, 8(2), 11–23.

Pratama, B. A. H. (2024). Analisis dan Investigasi Forensik Aplikasi Instagram dan Threads Dalam Mendapatkan Bukti Digital Menggunakan Metode Nist 800-86. Kohesi: Jurnal Multidisiplin Saintek, 5(3), 1–18.

Lestari, Julia Ananda; Taufik, G. (2024). Penerapan NIST 800-61 REV 2 Untuk Analisa Ransomware Attack Pada. Jurnal Infortech, 6(1).

Kurniawan, Ade; Riadi, I. (2018). Detection and Analysis Cerber Ransomware Based on Network Forensics Behavior. International Journal of Network Security, 20(September), 836–843. https://doi.org/10.6633/IJNS.201809

Ramadhan, Rizdqi Akbar; Tira, Agro Tambas; Fadhilah, M. R. (2024). Forensik Jaringan : Analisis Serangan Client dan Pengukuran Quality of Service oleh ARP Poisoning menggunakan Network Forensic Generic Process ( NFGP ) Model Network Forensic : Analysis of Client Attack and Quality of Service Measurement by Arp Poisoning. SISTEMASI : Jurnal Sistem Informasi, 13(2), 713–727.

Nasirudin; Sunardi; Riadi, I. (2020). Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express. Jurnal Informatika Universitas Pamulang, 5(1), 89–94.

Arsada, L. M. A. (2021). Penerapan Metode NIST untuk analisis Serangan Denial of Service (DOS) pada Perangkat Internet of Things (IoT). Jurnal Ilmiah KOMPUTASI, 20(2), 275–281.

Anton Yudhana, Imam Riadi, dan Riski Yudhi Prasongko (2022). Forensik WhatsApp Menggunakan Metode Digital Forensic Research Workshop (DFRWS). Jurnal Informatika: Jurnal pengembangan IT (JPIT), Vol.7, No.1, Januari 2022, 1

Butarbutar, K. (2023). Forensic Network Analysis of Metarouter Using NIST SP800-86 Framework. Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia), 1(2), 39–50.

Firmansyah; Fadlil, A., & Umar, R. (2024). Evaluasi Optimalisasi Alat Forensik Keamanan Jaringan pada Lalu Lintas. Edu Komputika Journal, 10(2), 81–92.

Firmansyah; Fadlil, A.; Umar, R. (2021). Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST. JURNAL RESTI (Rekayasa Sistem Dan Teknologi Informasi), 1(10), 91–98.

Firmansyah; Fadlil, A., & Umar, R. (2019). Analisis Forensik Metarouter pada Lalu Lintas Jaringan Klien. Edu Komputika Journal, 6(2), 54–59.

Krisnadi, D. S. I. (2020). Citra Forensik Dari Barang Bukti Elektronik Dengan Metode Physical Menggunakan Acquisition Tools Tableau Imager Dan Ftk Imager. Academia

Mahendra, K. D. O., & Ari Mogi, I. K. (2021). Digital Forensic Analysis Of Michat Application On Android As Digital Proof In Handling Online Prostitution Cases. JELIKU (Jurnal Elektronik Ilmu Komputer Udayana), 9(3), 381. https://doi.org/10.24843/jlk.2021.v09.i03.p09

Marcoulides, G. a. (2005). Discovering Knowledge in Data: an Introduction to Data Mining:Discovering Knowledge in Data: An Introduction to Data Mining. In Journal of the American Statistical Association (Vol. 100, Issue 472). https://doi.org/10.1198/jasa.2005.s61

Muhammad Abdul Aziz, Wicaksono Yuli Sulistyo, & Sri Rahayu Astari3. (2021). Komparatif Anti Forensik Aplikasi Instant Messaging Berbasis Web Menggunakan Metode Association of Chief Police Officers (ACPO). JURISTIK (Jurnal Riset Teknologi Informasi Dan Komputer), 1(01), 8–15. https://doi.org/-10.53863/juristik.v1i01.341

Muhammad Ali Diko Putra, dkk (2024). Analisis Forensik Pada Instagram dan Tik Tok Dalam Mendapatkan Bukti Digital Dengan Menggunakan Metode NIST 800- 86. Jurnal Sistem Informasi Galuh, Volume 2, Nomor 1, Januari 2024. 10

Amsor, Fakhri Awaluddin, dan Momon Mulyana (2024) Tantangan dan Peran Digital Forensik dalam Penegakan Hukum terhadap Kejahatan di Ranah Digital, Journal Humaniora: Jurnal Hukum dan Ilmu Sosial, Volume 02, No.01, 5

Rahmat Novrianda Dasmen, Muhammad Reihan Pratama , Husni Yasir, dan Ariff Budiman (2024), Analisis Forensik Digital Pada Kasus Cyberbullying dengan Metode National Institute of Standard and Technology SP 800-86, Jurnal Ilmiah Informatika, 2

Riadi, I., Yudhana, A., & Barra, M. Al. (2021). Copyright Forensik Mobile pada Layanan Media Sosial LinkedIn. JISKA (Jurnal Informatika Sunan Kalijaga), 6(1), 9–20. https://doi.org/10.14421/jiska.2021.61-02

Setyawan, M. R., Yudhana, A., & Fadlil, A. (2020). Data Acquisition On Messenger Skype Using The National Institute Of Justice Method. Systemic: Information System and Informatics Journal, 5(2), 13–18. https://doi.org/10.29080/-systemic.v5i2.7

Han, J., & Kamber, M. (2006). Data Mining: Concepts and Techniques. In Soft Computing (Vol. 54, Issue Second Edition). https://doi.org/10.1007/978-3-642-19721-5

Rauhulloh Ayatulloh Khomeini Noor Bintang , Rusydi Umar, dan Anton Yudhana (2020) Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST, TECHNO, Vol.21, No.2, 3.

Ridho, F., Yudhana, A., & Riadi, I. (2016). Analisis Forensik Router Untuk Mendeteksi Serangan Distributed Danial of Service ( DDoS ) Secara Real Time. 2(1), 111–116.

Synthiana Rachmie (2020), Peranan Ilmu Digital Forensik Terhadap Penyidikan Kasus Peretasan Website, JURNAL LITIGASI (e-Journal), Vol. 21, 5.

Sholikhatin, S. A., Kuncoro, A. P., Munawaroh, A. L., & Setiawan, G. A. (2023). Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security. Edu Komputika Journal, 9(1). https://doi.org/10.15294/edukomputika. v9i1.57389

Steven Marcellino, Henki Bayu Seta , dan Wayan Widi (2023) Analisis Forensik Digital Recovery Data Smartphone pada Kasus Penghapusan Berkas Menggunakan Metode National Institute Of Justice (NIJ), JURNAL INFORMATIK Edisi ke-19, nomor 2, 2.

Maulana, I., & Pujiyanta, A. (2024). Analisis Forensik Aplikasi Penipuan Berbasis Android. JIKA (Jurnal of Informatics) Universitas Muhammadiyah Tangerang Vol, 8(2), 187–196.




DOI: https://doi.org/10.17509/coelite.v4i2.87286

Refbacks

  • There are currently no refbacks.


Journal of Computer Engineering, Electronics and Information Technology (COELITE)


is published by UNIVERSITAS PENDIDIKAN INDONESIA (UPI),
and managed by Department of Computer Enginering.
Jl. Dr. Setiabudi No.229, Kota Bandung, Indonesia - 40154
email: coelite@upi.edu
e-ISSN: 2829-4149
p-ISSN: 2829-4157