2021
DOI: 10.33369/jamplifier.v11i1.16683
|View full text |Cite
|
Sign up to set email alerts
|

Penerapan Sistem Keamanan Web Menggunakan Metode Web Aplication Firewall

Abstract: The application of a security system on the web needs to be done considering that the web itself can be accessed through a public network. In this study, a Web Application Firewall (WAF)-based security system will be implemented using modsecurity, in which the purpose of implementing this web security system is to understand the concept of a security system on the web and pay attention to the results before the application of the firewall and after the application of the firewall on the web. This research uses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
1
0
2
Order By: Relevance
“…This of course makes it easier for human activities to get information from the use of this web application. However, nothing is perfect in this world, the various advantages of web applications in the internet world also have weaknesses related to security aspects, which are very vulnerable to attacks from irresponsible parties [21].…”
Section: Fig 1 Wheel Movement With a Ropementioning
confidence: 99%
“…This of course makes it easier for human activities to get information from the use of this web application. However, nothing is perfect in this world, the various advantages of web applications in the internet world also have weaknesses related to security aspects, which are very vulnerable to attacks from irresponsible parties [21].…”
Section: Fig 1 Wheel Movement With a Ropementioning
confidence: 99%
“…Salah satu cara untuk mencegah serangan pada server web adalah dengan menggunakan firewall (simulasi keamanan) baik dalam bentuk software maupun hardware. Secara garis besar, sistem ini menangani permintaan dari pengguna dan membedakan antara pengguna klien dan pengguna penyerang yang mengakses situs web di server web [24] dengan menggunakan istem pertahanan ini diharapkan dapat memberikan rekomendasi untuk peningkatan keamanan aplikasi web juga menjaga integritas data pada aplikasi tersebut [25]. Penelitian selanjutnya dapat melakukan dengan tahapan yang lebih spesifik menggunakan metode OWASP maupun metode yang berbeda dengan tahapan penetration testing untuk mendaptkan celah keamanan sesuai laporan identifikasi kerentanan menggunakan tools OWASP Zap, Security Scan, maupun Acunetix Vulnerability Scanner.…”
Section: Gambar 2 Persentase Kerentanan Websiteunclassified
“…Tahap ini merupakan pengujian celah keamanan yang ditemukan. Informasi yang diperoleh pada tahap sebelumnya dapat digunakan sebagai bahan untuk melakukan pengujian celah keamanan [25]. Pada Gambar 8 dapat dilihat hasil pemindaian (scanning) menggunakan tools OWASP Zap.…”
Section: Exploitunclassified