Preprint has been published in a journal as an article
Preprint / Version 1

Implementation of Monitoring and Prevention of Online Gambling Defacement Attacks Using Wazuh

Implementasi Monitoring dan Pencegahan Serangan Defacement Judi Online Menggunakan Wazuh

##article.authors##

DOI:

https://doi.org/10.21070/ups.9788

Keywords:

Defacement, Online Gambling, Cybersecurity, SIEM, Wazuh, Action Research

Abstract

The rapid acceleration of digital transformation across various sectors has increased system vulnerabilities and the frequency of cyberattacks, including website defacement that inserts online gambling content, particularly on government websites. According to the 2024 BSSN report, such defacement incidents remain prevalent and negatively affect reputation and public trust. This study aims to implement Wazuh SIEM as a monitoring and prevention system for online gambling–related defacement attacks. The research adopts an Action Research methodology based on the SANS 504-B Incident Response Cycle. The system implementation utilizes File Integrity Monitoring (FIM), Active Response, and VirusTotal integration for malware detection. Experimental results show that Wazuh successfully detects and prevents SSH brute force attacks, webshell uploads, reverse shell connections, and file modifications containing online gambling content with a 100% success rate. Furthermore, VirusTotal integration achieves a malware detection accuracy of 80%.

Downloads

Download data is not yet available.

References

I. Z. Satrya, “Serangan Siber Dalam Perkembangan Perbankan Digital di Indonesia,” vol. 9, no. 10, 2024.

M. A. Djibu, “Transformasi Digital dan Keamanan Siber : Upaya Penanggulangan Kejahatan di Era Teknologi di Indonesia,” Judge J. Huk., vol. 6, no. 1, p. 346, 2025.

Badan Siber dan Sandi Negara, “Lanskap Keamanan Siber Indonesia 2024,” Id-SIRTII /CC, no. 70, pp. 1–107, 2024, [Online]. Available: bit.ly/44bzpHM

J. Desmon, Y. Hidayatulloh, and S. Jumaryadi, “Systematic Literature Review : Serangan Deface,” vol. 14, no. 2, pp. 106–112, 2024.

R. A. P. Azzah Shafiyyah, Gigih Forda, “Implementasi Wazuh Menggunakan Metode Ppdioo Di Sistem Keamanan Jaringan Psdku Universitas Lampung Waykanan Sebagai Deteksi Dan Respon Serangan Siber,” vol. 12, no. 2, 2024.

A. Kamil, M. Tahir, S. Juliah, A. L. Rahmat, and Y. D. Mahendra, “Sistem Keamanan Berbasis Host-Based Intrusion Detection System ( Hids ) Menggunakan Wazuh,” vol. 9, no. 3, pp. 5460–5466, 2025.

M. D. Pratama, F. Nova, and D. Prayama, “Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan Dos,” vol. 3, no. 1, pp. 1–7, 2022.

M. R. T. Hidayat, N. Widiyasono, and R. Gunawan, “Optimasi Deteksi Malware Pada Siem Wazuh Melalui Integrasi Cyber Threat Intelligence Dengan Misp Dan Dfir-Iris,” J. Inform. dan Tek. Elektro Terap., vol. 13, no. 1, 2025, doi: http://dx.doi.org/10.23960/jitet.v13i1.5686.

B. Haryanto and D. W. Chandra, “Implementasi Wazuh Integritas File untuk Perlindungan Keamanan Berdasarkan Aktivitas Log di BTSI UKSW,” J. Indones. Manaj. Inform. dan Komun., vol. 5, no. 1, pp. 183–192, 2024, doi: https://doi.org/10.35870/jimik.v5i1.447.

V. E. Pattiradjawane and D. Upuy, “Deteksi Serangan Web Defacement pada Infrastruktur Kritis Menggunakan Machine Learning,” vol. 1, no. 1, pp. 37–42, 2025.

Badan Siber dan Sandi Negara, “Panduan Penanaganan Insiden Web Defacement Judi Online,” Pandu. Penanganan Insid. Web Defacement Judi Online, p. 26, 2023, [Online]. Available: https://www.kemhan.go.id/bacadnas/wp-content/uploads/migrasi/admin/Cyber Defence.pdf

R. N. Fahmi, R. Hartono, and D. S. Anwar, “Integrasi Wazuh Siem Dengan Modsecurity Dan Virus Total Menggunakan Nist Framework Untuk Mendeteksi Serangan Website,” JATI (Jurnal Mhs. Tek. Inform., vol. 9, no. 4, pp. 6578–6586, 2025.

M. R. Reza Pahlevi, C. Umam, and L. B. Handoko, “Deteksi dan Pencegahan Web Defacing Judi Online dengan Wazuh SIEM dan Snort IDS Berbasis Signature,” J. Algoritm., vol. 22, no. 1, pp. 197–208, 2025, doi: 10.33364/algoritma/v.22-1.2220.

A. Makmur, I. Jasman, and U. C. Palopo, “Optimalisasi manajemen bandwith jaringan komputer menggunakan action research pada dinas komunikasi dan informatika kota palopo,” vol. 6, 2023.

I. Z. Satrya, “Serangan Siber Dalam Perkembangan Perbankan Digital di Indonesia,” vol. 9, no. 10, 2024.

M. A. Djibu, “Transformasi Digital dan Keamanan Siber : Upaya Penanggulangan Kejahatan di Era Teknologi di Indonesia,” Judge J. Huk., vol. 6, no. 1, p. 346, 2025.

Badan Siber dan Sandi Negara, “Lanskap Keamanan Siber Indonesia 2024,” Id-SIRTII /CC, no. 70, pp. 1–107, 2024, [Online]. Available: bit.ly/44bzpHM

J. Desmon, Y. Hidayatulloh, and S. Jumaryadi, “Systematic Literature Review : Serangan Deface,” vol. 14, no. 2, pp. 106–112, 2024.

R. A. P. Azzah Shafiyyah, Gigih Forda, “Implementasi Wazuh Menggunakan Metode Ppdioo Di Sistem Keamanan Jaringan Psdku Universitas Lampung Waykanan Sebagai Deteksi Dan Respon Serangan Siber,” vol. 12, no. 2, 2024.

A. Kamil, M. Tahir, S. Juliah, A. L. Rahmat, and Y. D. Mahendra, “Sistem Keamanan Berbasis Host-Based Intrusion Detection System ( Hids ) Menggunakan Wazuh,” vol. 9, no. 3, pp. 5460–5466, 2025.

M. D. Pratama, F. Nova, and D. Prayama, “Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan Dos,” vol. 3, no. 1, pp. 1–7, 2022.

M. R. T. Hidayat, N. Widiyasono, and R. Gunawan, “Optimasi Deteksi Malware Pada Siem Wazuh Melalui Integrasi Cyber Threat Intelligence Dengan Misp Dan Dfir-Iris,” J. Inform. dan Tek. Elektro Terap., vol. 13, no. 1, 2025, doi: http://dx.doi.org/10.23960/jitet.v13i1.5686.

B. Haryanto and D. W. Chandra, “Implementasi Wazuh Integritas File untuk Perlindungan Keamanan Berdasarkan Aktivitas Log di BTSI UKSW,” J. Indones. Manaj. Inform. dan Komun., vol. 5, no. 1, pp. 183–192, 2024, doi: https://doi.org/10.35870/jimik.v5i1.447.

V. E. Pattiradjawane and D. Upuy, “Deteksi Serangan Web Defacement pada Infrastruktur Kritis Menggunakan Machine Learning,” vol. 1, no. 1, pp. 37–42, 2025.

Badan Siber dan Sandi Negara, “Panduan Penanaganan Insiden Web Defacement Judi Online,” Pandu. Penanganan Insid. Web Defacement Judi Online, p. 26, 2023, [Online]. Available: https://www.kemhan.go.id/bacadnas/wp-content/uploads/migrasi/admin/Cyber Defence.pdf

R. N. Fahmi, R. Hartono, and D. S. Anwar, “Integrasi Wazuh Siem Dengan Modsecurity Dan Virus Total Menggunakan Nist Framework Untuk Mendeteksi Serangan Website,” JATI (Jurnal Mhs. Tek. Inform., vol. 9, no. 4, pp. 6578–6586, 2025.

M. R. Reza Pahlevi, C. Umam, and L. B. Handoko, “Deteksi dan Pencegahan Web Defacing Judi Online dengan Wazuh SIEM dan Snort IDS Berbasis Signature,” J. Algoritm., vol. 22, no. 1, pp. 197–208, 2025, doi: 10.33364/algoritma/v.22-1.2220.

A. Makmur, I. Jasman, and U. C. Palopo, “Optimalisasi manajemen bandwith jaringan komputer menggunakan action research pada dinas komunikasi dan informatika kota palopo,” vol. 6, 2023.

Hidayasari, Kasmawi, Mansur, and Z. Efendi, “Implementasi prototipe SIEM berbasis Wazuh pada website

dengan pengujian FIM dan threat hunting,” JITSI: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 6, no. 4, 2025.

Posted

2026-01-23