Monitoring on Solid Foundation Servers Using Suricata Through Telegram Bot Notifications

  • Muhammad Faishal Gusrianda Universitas Lancang Kuning
  • Fajrizal Fajrizal Universitas Lancang Kuning
  • Guntoro Guntoro Guntoro Universitas Lancang Kuning
Keywords: Sucirata, Telegram Mesengger, Linux Ubuntu Server, Putty, Curl

Abstract

This research was conducted to study the Telegram Bot-based Suricata technique, which is implemented in the application of data center server security where the data center is related to the center of the Drug and Narcotics Agency of the Republic of Indonesia. We collected data from observations and interviews conducted in the administration section of server data security. Furthermore, the data is analyzed to study the pattern of each technique used. Based on this pattern, a better technique is chosen for the security process to be carried out. Based on the experiments conducted, it is clear that each of these techniques has advantages and disadvantages. However, this Telegram Bot-Based Suricata technique is more recommended because it is simpler in implementation, the desired results can be achieved, and the system can be monitored anywhere.

Downloads

Download data is not yet available.

References

Ismagilova, E., Hughes, L., Rana, N. P., & Dwivedi, Y. K. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers, 24(2), 393–414. https://doi.org/10.1007/s10796-020-10044-1

Gunduz, M. Z., & Das, R. (2020). Cyber-security on smart grid: Threats and potential solutions. Computer Networks, 169, 107094. https://doi.org/10.1016/j.comnet.2019.107094.

Chowdhury, N., & Gkioulos, V. (2021). Cyber security training for critical infrastructure protection: A literature review. Computer Science Review, 40, 100361. https://doi.org/10.1016/j.cosrev.2021.100361

David, D. S., Anam, M., Kaliappan, C., Selvi, S. a. M., Sharma, D. K., Dadheech, P., & Sengan, S. (2022). Cloud Security Service for Identifying Unauthorized User Behaviour. Computers, Materials & Continua/Computers, Materials & Continua (Print), 70(2), 2581–2600. https://doi.org/10.32604/cmc.2022.020213

Vinoth, S., Vemula, H. L., Haralayya, B., Mamgain, P., Hasan, M. F., & Naved, M. (2022). Application of cloud computing in banking and e-commerce and related security threats. Materials Today: Proceedings, 51, 2172–2175. https://doi.org/10.1016/j.matpr.2021.11.121.

Jaya, I. K. N. A., Dewi, I. a. U., & Mahendra, G. S. (2022). Implementation of Wireshark Application in Data Security Analysis on LMS Website. Journal of Computer Networks, Architecture and High Performance Computing, 4(1), 79–86. https://doi.org/10.47709/cnahpc.v4i1.1345

Khrypko, S., Matveev, V., Nykytchenko, O., Stefanova, N., Ishchuk, A., Ishchuk, O., & Bondar, T. (2021). Cybercrime in the Economic Space: Psychological Motivation and Semantic-Terminological Specifics. https://doi.org/10.22937/ijcsns.2021.21.11.18

Sviatun, O. V., Goncharuk, O. V., Roman, C., Kuzmenko, O., & Kozych, I. V. (2021). Combating Cybercrime: Economic and Legal Aspects. WSEAS Transactions on Business and Economics, 18, 751–762. https://doi.org/10.37394/23207.2021.18.72.

Abbasi, M., Shahraki, A., & Taherkordi, A. (2021). Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey. Computer Communications, 170, 19–41. https://doi.org/10.1016/j.comcom.2021.01.021

Andronie, M., Lăzăroiu, G., Iatagan, M., Uță, C., Ștefănescu, R., & Cocoșatu, M. (2021). Artificial Intelligence-Based Decision-Making Algorithms, Internet of Things Sensing Networks, and Deep Learning-Assisted Smart Process Management in Cyber-Physical Production Systems. Electronics, 10(20), 2497. https://doi.org/10.3390/electronics10202497.

Guntoro, G., Lisnawita, L., & Costaner, L. (2024c). Enhancing Cybersecurity: Innovative Hybrid Feature Selection for Intrusion Detection. https://doi.org/10.4108/eai.30-10-2023.2343092

Guntoro, G., & Omar, M. N. B. (2024). A Systematic Literature Review of Intrusion Detection System in Network Security. In Communications in computer and information science (pp. 96–107). https://doi.org/10.1007/978-981-99-9589-9_8

Published
2024-07-01
How to Cite
Muhammad Faishal Gusrianda, Fajrizal, F., & Guntoro, G. G. (2024). Monitoring on Solid Foundation Servers Using Suricata Through Telegram Bot Notifications. ComniTech : Journal of Computational Intelligence and Informatics , 1(1), 38-48. Retrieved from https://pustaka-psm.unilak.ac.id/index.php/ComniTech/article/view/21380
Abstract viewed = 0 times
PDF downloaded = 0 times