基于web的基于Boyer-Moore算法和正则表达式技术的网站攻击检测日志分析系统

Izzeldin Addarda, Siti Maesaroh
{"title":"基于web的基于Boyer-Moore算法和正则表达式技术的网站攻击检测日志分析系统","authors":"Izzeldin Addarda, Siti Maesaroh","doi":"10.24114/cess.v8i2.48342","DOIUrl":null,"url":null,"abstract":"Di era digitalisasi saat ini, ancaman serangan siber terus meningkat secara global. serangan siber merujuk pada tindakan kejahatan yang dapat menyebabkan gangguan, pemalsuan dan pencurian informasi berharga dari aplikasi atau situs web. Bersumber pada halaman suara.com terdapat lebih dari 700 juta serangan siber yang berlangsung di Indonesia pada tahun 2022 yang diikuti dengan kebocoran informasi kesehatan e-HAC. Hal tersebut berkaitan dengan peranan dari web server guna melayani permintaan HTTP (Hypertext Transfer Protocol). Selain itu, web server bertugas untuk menerjemahkan kode-kode dinamis menjadi kode-kode statis dalam suatu laman website. Berdasarkan hal tersebut dibuatlah sistem log analysis menggunakan algoritma boyer moore dan teknik regular expressions sebagai metode pencarian adanya indikasi serangan website dengan hasil bahwa algoritma boyer moore dan teknik regular expressions dapat menemukan indikasi jenis serangan terhadap website dengan baik dan relatif cepat karena hanya membutuhkan waktu 32.9 detik untuk menganalisis 1553 baris data yang berasal dari log file. Dengan demikian administrator web server dapat dengan mudah mencari atau melihat jenis upaya serangan website terhadap web server oleh pelaku kejahatan siber.  In the current era of digitalization, the threat of cyber attacks continues to increase globally. cyberattacks refer to criminal acts that can lead to tampering, falsification, and theft of valuable information from applications or websites. Sourced on the Suara.com page, there were more than 700 million cyber attacks that took place in Indonesia in 2022, followed by the leak of e-HAC health information. This relates to the role of the web server to serve HTTP (Hypertext Transfer Protocol) requests. In addition, the web server is tasked with translating dynamic codes into static codes on a website page. Based on this, a log analysis system was created using the boyer moore algorithm and regular expressions techniques as a search method for indications of website attacks with the result that the boyer moore algorithm and regular expressions techniques can find indications of types of attacks on websites properly and relatively quickly because it only takes 32.9 seconds to analyze 1553 rows of data coming from the log file. Thus, web server administrators can easily search for or view types of website attack attempts against web servers by cybercriminals.  ","PeriodicalId":53361,"journal":{"name":"CESS Journal of Computer Engineering System and Science","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Web-based Log Analysis System for Website Attack Detection using Boyer-Moore Algorithm and Regular Expression Technique\",\"authors\":\"Izzeldin Addarda, Siti Maesaroh\",\"doi\":\"10.24114/cess.v8i2.48342\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Di era digitalisasi saat ini, ancaman serangan siber terus meningkat secara global. serangan siber merujuk pada tindakan kejahatan yang dapat menyebabkan gangguan, pemalsuan dan pencurian informasi berharga dari aplikasi atau situs web. Bersumber pada halaman suara.com terdapat lebih dari 700 juta serangan siber yang berlangsung di Indonesia pada tahun 2022 yang diikuti dengan kebocoran informasi kesehatan e-HAC. Hal tersebut berkaitan dengan peranan dari web server guna melayani permintaan HTTP (Hypertext Transfer Protocol). Selain itu, web server bertugas untuk menerjemahkan kode-kode dinamis menjadi kode-kode statis dalam suatu laman website. Berdasarkan hal tersebut dibuatlah sistem log analysis menggunakan algoritma boyer moore dan teknik regular expressions sebagai metode pencarian adanya indikasi serangan website dengan hasil bahwa algoritma boyer moore dan teknik regular expressions dapat menemukan indikasi jenis serangan terhadap website dengan baik dan relatif cepat karena hanya membutuhkan waktu 32.9 detik untuk menganalisis 1553 baris data yang berasal dari log file. Dengan demikian administrator web server dapat dengan mudah mencari atau melihat jenis upaya serangan website terhadap web server oleh pelaku kejahatan siber.  In the current era of digitalization, the threat of cyber attacks continues to increase globally. cyberattacks refer to criminal acts that can lead to tampering, falsification, and theft of valuable information from applications or websites. Sourced on the Suara.com page, there were more than 700 million cyber attacks that took place in Indonesia in 2022, followed by the leak of e-HAC health information. This relates to the role of the web server to serve HTTP (Hypertext Transfer Protocol) requests. In addition, the web server is tasked with translating dynamic codes into static codes on a website page. Based on this, a log analysis system was created using the boyer moore algorithm and regular expressions techniques as a search method for indications of website attacks with the result that the boyer moore algorithm and regular expressions techniques can find indications of types of attacks on websites properly and relatively quickly because it only takes 32.9 seconds to analyze 1553 rows of data coming from the log file. Thus, web server administrators can easily search for or view types of website attack attempts against web servers by cybercriminals.  \",\"PeriodicalId\":53361,\"journal\":{\"name\":\"CESS Journal of Computer Engineering System and Science\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-07-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"CESS Journal of Computer Engineering System and Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24114/cess.v8i2.48342\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"CESS Journal of Computer Engineering System and Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24114/cess.v8i2.48342","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在今天的数字化时代,网络攻击的威胁继续在全球范围内增加。网络攻击指的是可能导致从应用程序或网站上破坏、伪造和窃取有价值的信息的犯罪行为。网上直播的是2022年印尼发生的7亿多起网络攻击事件,随后是e-HAC健康信息的泄露。这与web服务器在服务HTTP(超文本传输协议)需求中的作用有关。此外,web服务器的职责是将动态代码转换成一个网站页面上的静态代码。基于这些建造日志分析系统采用boyer摩尔和普通的表白作为技术算法搜索网站攻击的迹象,结果算法boyer摩尔和普通的表白技巧可以发现网站类型攻击的迹象相对好和快,因为只需要一行1553 32。9秒的时间来分析的数据来自日志文件。因此,web服务器管理员可以很容易地搜索或查看网络犯罪分子对web服务器攻击的类型尝试。在数字时代的趋势中,网络攻击的威胁继续增加全球。网络攻击的反应可能导致从应用程序或网站获取宝贵信息。消息人士称,2022年在印尼拥有的网络资源超过7亿美元,由e-HAC健康信息(e-HAC health information)关注。这篇文章适用于服务HTTP的web服务器role。在补充中,web服务器是通过将动态编码成一个网站页面上的静态代码来完成的。改编自这,一个日志分析系统用的是创造了boyer moore算法和普通的表白techniques美国网站的搜索方法为indications attacks《boyer moore算法的论点和普通的表白techniques能找到indications of types of attacks网站上可以和relatively快,因为它只需要9秒32 to analyze rows 1553数据来从《日志记录的文件。因此,网络管理服务器可以很容易地搜索或查看由网络犯罪分子针对网络攻击的类型。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Web-based Log Analysis System for Website Attack Detection using Boyer-Moore Algorithm and Regular Expression Technique
Di era digitalisasi saat ini, ancaman serangan siber terus meningkat secara global. serangan siber merujuk pada tindakan kejahatan yang dapat menyebabkan gangguan, pemalsuan dan pencurian informasi berharga dari aplikasi atau situs web. Bersumber pada halaman suara.com terdapat lebih dari 700 juta serangan siber yang berlangsung di Indonesia pada tahun 2022 yang diikuti dengan kebocoran informasi kesehatan e-HAC. Hal tersebut berkaitan dengan peranan dari web server guna melayani permintaan HTTP (Hypertext Transfer Protocol). Selain itu, web server bertugas untuk menerjemahkan kode-kode dinamis menjadi kode-kode statis dalam suatu laman website. Berdasarkan hal tersebut dibuatlah sistem log analysis menggunakan algoritma boyer moore dan teknik regular expressions sebagai metode pencarian adanya indikasi serangan website dengan hasil bahwa algoritma boyer moore dan teknik regular expressions dapat menemukan indikasi jenis serangan terhadap website dengan baik dan relatif cepat karena hanya membutuhkan waktu 32.9 detik untuk menganalisis 1553 baris data yang berasal dari log file. Dengan demikian administrator web server dapat dengan mudah mencari atau melihat jenis upaya serangan website terhadap web server oleh pelaku kejahatan siber.  In the current era of digitalization, the threat of cyber attacks continues to increase globally. cyberattacks refer to criminal acts that can lead to tampering, falsification, and theft of valuable information from applications or websites. Sourced on the Suara.com page, there were more than 700 million cyber attacks that took place in Indonesia in 2022, followed by the leak of e-HAC health information. This relates to the role of the web server to serve HTTP (Hypertext Transfer Protocol) requests. In addition, the web server is tasked with translating dynamic codes into static codes on a website page. Based on this, a log analysis system was created using the boyer moore algorithm and regular expressions techniques as a search method for indications of website attacks with the result that the boyer moore algorithm and regular expressions techniques can find indications of types of attacks on websites properly and relatively quickly because it only takes 32.9 seconds to analyze 1553 rows of data coming from the log file. Thus, web server administrators can easily search for or view types of website attack attempts against web servers by cybercriminals.  
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
40
审稿时长
4 weeks
期刊最新文献
Implementation of the Multimedia Development Life Cycle in Making Educational Games About Indonesia Data Mining Algorithm Decision Tree Itterative Dechotomiser 3 (ID3) for Classification of Stroke Implementation of Weight Aggregated Sum Product Assessment (WASPAS) on the Selection of Online English Course Platforms Usability of Brain Tumor Detection Using the DNN (Deep Neural Network) Method Based on Medical Image on DICOM Performance Comparison Analysis of Multi Prime RSA and Multi Power RSA
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1