Main Article Content

Abstract

The rapid development of technology has driven almost all business sectors to adopt digital operations, but this shift has also increased the risk of cybercrime, targeting systems and data. Cyber Threat Intelligence (CTI) is a cybersecurity approach that involves collecting, analyzing, and understanding data to identify the motives, targets, and attack patterns of cybercriminals. One solution to address these threats is CrowdSec, an open-source software designed to detect and prevent cyber-attacks in various environments, including servers. Testing results demonstrate that CrowdSec is effective in detecting SSH brute-force, port scanning, and SQL injection attacks. By identifying suspicious attack patterns and blocking attackers' IPs, CrowdSec significantly reduces the risk of server damage. Its response times are fast: 23 seconds for SSH brute-force, 10 seconds for port scanning, and 6 seconds for SQL injection. Compared to Fail2Ban, CrowdSec offers greater configuration flexibility and broader attack detection capabilities, supported by the CrowdSec Hub, which provides a variety of attack scenarios. With its simple installation and configuration process, CrowdSec is an ideal choice for enhancing server security.

Keywords

CrowdSec CTI Cyber Cybercrime

Article Details

Author Biographies

Muhammad Arif Fadhly Ridha, Politeknik Caltex Riau

Teknik Informatika Politeknik Caltex Riau

Galih Ihsan Maheswara, Politeknik Caltex Riau

Teknik Informatika Politeknik Caltex Riau
How to Cite
Ridha, M. A. F., & Maheswara, G. I. (2025). SISTEM DETEKSI AKTIVITAS BERBAHAYA PADA SERVER MENGGUNAKAN CROWDSEC. Jurnal Komputer Terapan, 11(1), 29–35. https://doi.org/10.35143/jkt.v11i1.6486

References

  1. K. Baker, "Types Of Cyber Attack," 9 November 2023. [Online]. Available: https://www.crowdstrike.com/cybersecurity-101/cyberattacks/most-common-types-of-cyberattacks/.
  2. S. Parulian, D. A. Pratiwi and M. C. Yustina, "Ancaman dan Solusi Serangan Siber di Indonesia," Telecommunications, Networks, Electronics, and Computer Technologies, p. 86, 2021.
  3. S. Danischevsky, "Fail2Ban," 1 Juni 2023. [Online]. Available: https://github.com/fail2ban/fail2ban/wiki.
  4. M. T. S. Rendratama, P. Sukarno and A. A. Wardana, "Perancangan dan Analisis Crowdsec Sebagai Intrusion Prevention System pada Infrastruktur Server," e-Proceeding of Engineering : Vol.10, No.2, pp. 1888-1893, 2023.
  5. U. Airlangga, "Knowledge Base Apa Itu CISRT," 2024. [Online]. Available: https://kb.dsi.unair.ac.id/?kb=cisrt-apa-itu.
  6. H. E. Ardiyanto and T. I. Bayu, "Perancangan Security Information and Event Management (SIEM) Menggunakan Open Source SIEM (OSSIM)," Fakultas Teknologi Informasi Universitas Kristen Satya Wacana, pp. 2-5, 2018.
  7. CrowdSec, ""Docs CrowdSec"," 2023. [Online]. Available: https://doc.crowdsec.net/.
  8. M. H. Dar and S. Z. Harahap, "Implementasi SNORT INTRUSION DETECTION SYSTEM (IDS) Pada Sistem Jaringan Komputer," Informatika : Fakultas Sains dan Teknologi, pp. 15-18, 2018.
  9. R. Kurniawan and B. Rahardjo, "STUDI MODEL ORGANISASI CSIRTs (COMPUTER SECURITY INCIDENT RESPONSE TEAMS) PADA PERUSAHAAN BERSKALA BESAR," Seminar Nasional Aplikasi Teknologi Informasi 2007 (SNATI 2007), 2007.
  10. S. Lund, A. Madgavkar, J. Manyika, S. Smit, K. Ellingrud and O. Robinson, "The Future of Work after COVID-19," 18 February 2021. [Online]. Available: https://www.mckinsey.com/featured-insights/future-of-work/the-future-of-work-after-covid-19.
  11. Y. R. Mulyadi, ""Linux Ubuntu Server"," 2023. [Online]. Available: https://www.idn.id/linux-ubuntu-server/.
  12. M. D. Pratama, F. Nova and D. Prayama, "Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan Dos," Jurnal Ilmiah Teknologi Sistem Informasi (jitsi), 2022.
  13. H. R. P. Sailellah, ""Pengertian Firewall dalam Jaringan Komputer dan Jenis-Jenisnya"," 28 April 2023. [Online]. Available: https://it.telkomuniversity.ac.id/pengertian-firewall-dalam-jaringan-komputer-dan-jenis-jenisnya/.
  14. D. Team, ""Mengenal Linux: Sistem Operasi Open Source dan Gratis"," 7 Februari 2023. [Online]. Available: https://www.dewaweb.com/blog/sistem-operasi-linux/.
  15. Y. Yuliana, H. A. Mooduto and R. Hadi, "Deteksi Ancaman Keamanan Pada Server dan Jaringan Menggunakan OSSEC," Jurnal Ilmiah Teknologi Sistem Informasi (jitsi), 2022.