Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Volume 4 Number 1 Januari-Juni 2024 PP 1-7 INTELMATICS ISSN 2775-8850 (Online)

IMPLEMENTATION OF SECURITY INFORMATION & EVENT


MANAGEMENT (SIEM) WAZUH WITH ACTIVE RESPONSE
AND TELEGRAM NOTIFICATION FOR MITIGATING
BRUTE FORCE ATTACKS ON THE GT-I2TI USAKTI
INFORMATION SYSTEM
Farhan Ibnu Farrel1*, Is Mardianto2, Adrian Sjamsul Qamar3
1
Information Systems Study Program, 23Informatics Study Program, Faculty of Industrial
Technology, University of Trisakti

need for effective management and collaboration for successful


Abstract— In an era of widespread information system usage technology implementation.[2]
across various sectors, digital threats to organizations have Over time, information technology gained widespread use
become increasingly significant. These threats have the potential across various business sectors and non-business organizations,
to disrupt operations and result in substantial financial losses. One
enduring threat is brute force attacks, which exploit human
transforming daily life through gadgets, IoT adoption, Wi-Fi 6
tendencies to use easily remembered passwords. By utilizing The technology, Enterprise Resource Planning systems, and
Security Lifecycle Methodology, this research aims to identify an Learning Management Systems. Yet, this extensive use of
efficient and cost-effective solution to enhance information system
security and continuously evaluate the implemented solution
rather than stop right after the policy or solution implementation.
The study proposes the utilization of the open-source Security
Information and Event Management (SIEM) platform, Wazuh.
When combined with the Active Response feature, this platform
not only detects security threats but also automatically takes
mitigating actions against detected attacks. Additionally, the
integration with the Telegram messaging application streamlines
the SIEM monitoring process, making it more practical and
efficient. After implementation, the testing phase confirms the Fig. 1. Source of external network intrusion[3].
effectiveness of the implemented solution as the Wazuh SIEM is
able to detect 100% of brute force testing scenarios in multi- information technology correlates with a significant increase in
protocol attacks with an average of 80,51 seconds time required to cyberattacks, with brute force and password guessing attacks
detect brute force attacks with a 1-second interval between attack, being a primary concern from 2021 to 2023.
172,18 seconds for 10-seconds attack interval, and 434,58 seconds The integration of SIEM Wazuh solution, utilization of
for 30-seconds attack interval. The active response can mitigate Active Response features, and integration with Telegram are
100% of the detected brute force attack with only 0,51 seconds
expected to contribute to the field of information security by
time required between detection and mitigation action taken. The
implemented telegram integration successfully sends all the providing new insights into possible solution combinations that
notifications on time to Telegram Chat by utilizing Telegram API. can be implemented within organizations at affordable costs.
This research will also address the effectiveness of the
Keywords: Information System, Cyber Attack, Security implemented system, thereby complementing data regarding
Information & Event Management, Wazuh, Brute Force, Active various approaches that can be adopted to anticipate brute force
Response, Telegram API attack incidents.
I. INTRODUCTION II. LITERATURE REVIEW

T he use of information technology in businesses and


organizations initially raised doubts about its impact on
organizational productivity. Nicholas Carr's 2003 article, "IT
Before commencing this study, a substantial body of existing
research was identified, closely aligned with the current case.
This existing research serves as a vital point of reference for the
Doesn’t Matter," challenged the view that information present study. The first study, titled 'Active Response Using
technology remained a differentiator and instead became a Host-Based Intrusion Detection System and Software-Defined
commodity owned by many organizations[1]. In 2008, Erik Networking'[4], implements the Open-Source Security
Brynjolfsson and Andrew McAfee's study, "Investing in the IT (OSSEC) with Floodlight as the SDN Controller, utilizing the
That Makes a Competitive Difference," found that technology AHNSR design to evaluate system resource performance
sharpens distinctions between companies and highlighted the

*Corresponding author 1 https://doi.org/10.25105/itm.v4i1.18529


E-mail addresss : farhan065001900038@std.trisakti.ac.id
Imolementation of Security Information & Event Management (SIEM) Wazuh with Active Response and Telegram Notification for Mitigating Farrel Et Al
Brute Force Attacks on the GT-12TI USAKTI Information System

during intrusion tests. process is documented step by step.


The second study, 'Analysis of Security Information and 4) Monitor:
Event Management (SIEM) Implementation Based on Wazuh Once all phases have been executed, the system's enhanced
in Windows and Linux Operating Systems,'[5] implements security requires testing to validate the effectiveness of the
Wazuh as the SIEM and integrates it with three components: security improvements. The testing results serve as a foundation
VirusTotal, Yara, and Suricata. The study then assesses the for future security enhancements. In addition to testing,
effectiveness of Wazuh SIEM compared to SolarWinds SIEM continuous monitoring of the security system's performance
in detecting five different test scenarios. and effectiveness is carried out.
The third study, titled 'Wazuh as Log Event Management and In the context of the research conducted on GT-I2TI, the
Security Gap Detection on Servers from DoS Attacks,'[6] researcher introduced a new policy involving the
integrates Wazuh SIEM with Suricata as a Network Intrusion implementation of a security information system that can detect
Detection System (NIDS) to detect Denial of Service (DoS) and mitigate security gaps in the face of brute force attacks on
attacks. the organization's information assets.
B. Research Phase
The research phases represent the steps delineated by the
researcher for executing the study, drawing from previously
established reference models. By organizing these research
phases, it is anticipated that the research outcomes will align
with expectations and fulfill the research objectives. The
following outlines the stages of this research:
1) System Observation
Fig. 2. Security Lifecycle Model.[7]
Initially, the researcher conducted an observation at GT-
I2TI Usakti to understand the devices and systems in use.
The researcher subsequently leveraged several of these Information was also gathered from sources at GT-I2TI
studies as references in various aspects of the research, Usakti regarding the security systems that had been
including understanding the methodologies employed by the implemented.
researchers in those studies and gaining insights into their 2) Equipment Preparation
testing procedures. The researcher prepared the infrastructure provided by GT-
I2TI, along with data and simulated systems, in order to
III. RESEARCH METHODOLOGY create a simulated operational information system.
A. Research Methodology 3) SIEM and Active Response Installation and Configuration
The researcher installed the Wazuh SIEM system and
In this research, the researcher adopted the Security Lifecycle configured rules to align with the protocols of the
model as presented in Robert Pfau's version, as published by the information systems. This configuration allowed Wazuh
SANS Institute.[7] This model serves as a framework for
SIEM to detect and configure Active Response for attack
developing security systems based on the policies and standards
mitigation.
established within an organization. The cycle iterates to ensure 4) Integration with Telegram
that security continually improves in accordance with the Upon SIEM system operation, integration with the
organization's set policies and standards.
Telegram API was established. This integration enabled
The Security Lifecycle consists of four key phases: Identify, the forwarding of alerts from events detected by Wazuh
Assess, Protect, and Monitor. SIEM to Telegram Chat.
1) Identify: 5) Testing Attack Simulations
During this phase, data and information are gathered,
During this phase, brute force attack simulations against
including the current state of the system to be secured, the
various protocols were executed according to predefined
resources required to support security system implementation,
testing scenarios.
and other pertinent information needed to align the system with
6) Analysis of Test Results
established policies and standards.
The data obtained from the testing phase were analyzed to
2) Assess:
determine the effectiveness of the implemented system in
After acquiring data and information about the system to be
detecting and mitigating brute force attack simulations.
secured, a plan is devised to secure the system. This phase
7) Drawing Conclusions
involves outlining the necessities for securing the system, such
Based on the analysis, the researcher drew conclusions
as hardware, software, regulations, and other supporting
from the research findings to address the issues raised in
elements.
this study.
3) Protect:
Once the implementation plan is prepared, and the required
resources are in place, the next step involves the actual
implementation of the security system. The implementation

2
Volume 4 Number 1 Januari-Juni 2024 PP 1-7 INTELMATICS ISSN 2775-8850 (Online)

The research environment will be configured to match the


predetermined topology. This setup will encompass the
installation of information systems within the replicated
systems. Subsequently, the Wazuh SIEM will be installed, and
agents will be deployed on each information system. Rules will
then be modified to enable the detection of brute force attacks.
These modifications will involve altering custom rules provided
by Wazuh. Once the rules are customized to detect brute force
attacks on each protocol, the active response will be configured
in the global configuration of Wazuh to execute the 'firewall-
drop' command for Linux agents and 'netsh' for Windows
agents. This configuration will allow for the blocking of
detected attacker IP addresses engaged in brute force attacks on
information systems connected to Wazuh SIEM.
To enable the reading of log files from each information
system, the log file locations will be added to the Wazuh global
configuration. Additionally, the locations of log files from the
active response will be added to ensure that active responses are
recorded within Wazuh events.
Fig. 3. Running system topology at GT-I2TI Usakti. Further, Telegram will be integrated with the Wazuh SIEM
by creating a new integration file and adding integration code
C. Implementation Scenario lines to the global configuration of Wazuh. This integration will
facilitate the transmission of alerts from Wazuh to a Telegram
The implementation process commences with an observation
chat.
of the running system, which is then replicated within the
The integration of Telegram with the Wazuh was achieved
by creating a new integration file and adding integration code
lines to the global configuration of Wazuh.
D. Testing Scenario
In conducting the testing phase, the researcher devised
multiple scenarios encompassing various protocols, intervals,
actors, and repetitions. The tool employed to facilitate brute
force attack testing was THC Hydra. For normal user
simulations, Hydra was executed alongside a custom bash script
to mimic genuine user services. Conversely, for threat actor
simulations, THC Hydra was leveraged as a potent cyber
weapon to execute brute force attacks on the information
system. The following table provides a list of scenarios to be
executed during the testing phase in this research:

Table 1. List of test scenarios


- HTTP
- SSH
- HTTPS
Protocol
- FTP
- IMAP
- RDP
- 1 seconds
Interval - 10 seconds
Fig. 4. Simulated system topology.
- 30 seconds
simulation environment. This initial step is of paramount - 0 normal user, 1 threat actor
importance as it ensures the accuracy of the research - 3 normal user, 0 threat actor
Actor
alignment with the research subject's needs. The figure below - 2 normal user, 2 threat actor
illustrates the system's topology in operation at GT-I2TI - 3 normal user, 2 threat actor
Usakti - Test #1
Building upon the functioning system within GT-I2TI Usakti, Repetition - Test #2
the author has chosen to replicate the system and simulate a - Test #3
real-world scenario. Below is the network topology that will be
employed in this research.

*Corresponding author 3 https://doi.org/10.25105/itm.v4i1.18529


E-mail addresss : farhan065001900038@std.trisakti.ac.id
Imolementation of Security Information & Event Management (SIEM) Wazuh with Active Response and Telegram Notification for Mitigating Farrel Et Al
Brute Force Attacks on the GT-12TI USAKTI Information System

B. Testing
In the testing phase, the researcher will employ THC Hydra
for conducting experiments involving both normal user and
threat actor scenarios. For the normal user, a custom Bash script
will be introduced to enable automatic and continuous
authentication processes. In contrast, for the threat actor, THC
Hydra will be utilized exclusively for conducting attacks with
Fig. 5. Event on Wazuh Dashboard after failed login test customizations made to the interval settings in accordance with
the testing scenarios.

IV. RESULT AND DISCUSSION


Table 2. List of THC Hydra commands used
A. Implementation hydra -l admin -P pass.txt 10.xx.xx.111
The implementation process of Wazuh as a SIEM involves
http-post-form
HTTP "/login.php:username=^USER^&password=^
PASS^&IdUniversity=1&Login=Login:302"
-V -I -c [interval in second]
hydra -l root -P pass.txt
SSH ssh://10.xx.xx.111 -V -I -c [interval
in second]
hydra -l admin -P pass.txt 10.xx.xx.112
https-post-form "/wordpress/wp-
login.php:log=^USER^&pwd=^PASS^&wp-
HTTPS submit=Log+In&redirect_to=http%3A%2F%2
Fig. 6. Active Response rule that will active if one of the rules_id triggered
F10.xx.xx.112%2Fwordpress%2Fwp-
aligning it with the predetermined scenarios, engaging four
admin%2F&testcookie=1:password" -V -I -
simulation information systems replicating six protocols used
by GT-I2TI Usakti. Installation of Wazuh Agents on these c [interval in second]
systems and rule modifications to adapt to brute force attack hydra -l admin -P pass.txt
detection are performed. Once the SIEM system is set up, failed FTP ftp://10.xx.xx.112 -V -I -c [interval
login attempts are initiated on one of the information systems
in second]
hydra -l email -P pass.txt
IMAP imap://10.xx.xx.113 -V -I -c [interval
in second]
hydra -l Administrator -P pass.txt
RDP rdp://10.xx.xx.114 -V -I -c [interval
in second]
Fig. 7. Telegram integration test
to test its functionality.
Following this, the configuration of the Active Response
feature is performed to enable Wazuh to automatically mitigate
detected brute force attacks. Rule IDs for each modified brute
force detection rule serve as triggers for Active Response when
any of these rules are activated.
The integration of Telegram notifications with the Wazuh Table 4. SSH protocol test result
SIEM system begins by creating a Telegram bot and generating
a new integration file. This is followed by the insertion of the
provided API code to enable the bot's functionality. Finally, a
test is conducted using one of the rules to verify the successful
delivery of notifications through the Telegram API integration.

4
Volume 4 Number 1 Januari-Juni 2024 PP 1-7 INTELMATICS ISSN 2775-8850 (Online)

Table 5. HTTPS protocol test result

Table 6. FTP protocol test result

Fig. 9. Comparison between protocol on


2 Normal User, 2 Threat Actor scenario

undetected attempts. Furthermore, the Active Response system


Table 7. IMAP protocol test result

Table 8. RDP protocol test result

Fig. 10. Comparison between protocol on


3 Normal User, 2 Threat Actor scenario
successfully mitigates all attacks, ensuring none of them bypass
C. Testing Results security measures. Although the time required for detection and
The results of the brute force attack detection, mitigation mitigation varies, these variations are not significant. In
using Active Response, and Telegram notifications are scenario 3, where there are only normal users and no threat
presented in tabular form. Time to detect (TTD) reflects the actors, SIEM Wazuh distinguishes these attempts as non-brute
time SIEM Wazuh requires to identify an attack since its force attack indications. Consequently, no login attempts are
initiation, measured in seconds, while time to respond (TTR) identified as brute force attacks in this scenario, and Active
measures the time for Active Response to mitigate indicators of Response remains inactive. Additionally, Telegram
brute force attacks, also in seconds. The N indicator reveals the notifications are consistently received for each experiment.
capability to send notifications to Telegram Chat.

Based on the bar chart comparing the three scenarios with


The results of the brute force attack testing on all information
system protocols reveal that in each attack scenario, the
Table 3. HTTP protocol test result
configured rules within Wazuh detect every attack without any

each protocol, it is evident that the time required for detection


and response is nearly identical among most protocols.
However, in the case of the IMAP protocol, the time for
detection and response is similar for intervals of 1s and 10s.
Wazuh Detection Effectiveness
To draw conclusions from the research, particularly in the
section related to the detection of brute force attacks on the GT-
Fig. 8. Comparison between protocol on I2TI Usakti simulation system, the findings from all scenarios
0 Normal User, 1 Threat Actor scenario

*Corresponding author 5 https://doi.org/10.25105/itm.v4i1.18529


E-mail addresss : farhan065001900038@std.trisakti.ac.id
Imolementation of Security Information & Event Management (SIEM) Wazuh with Active Response and Telegram Notification for Mitigating Farrel Et Al
Brute Force Attacks on the GT-12TI USAKTI Information System

were combined, resulting in the following outcomes. 𝐴𝑐𝑡𝑖𝑣𝑒 𝑅𝑒𝑠𝑝𝑜𝑛𝑠𝑒 𝑅𝑒𝑎𝑐𝑡𝑖𝑜𝑛 𝑇𝑖𝑚𝑒
= (𝑡𝑖𝑚𝑒 𝑡𝑜 𝑟𝑒𝑠𝑝𝑜𝑛𝑠𝑒) − (𝑡𝑖𝑚𝑒 𝑡𝑜 𝑑𝑒𝑡𝑒𝑐𝑡)
Table 9 Wazuh detection summary
ALL 3 SCENARIO Using this formula, the researcher calculated the reaction
time from the grouped data based on scenarios and consolidated
TTD 1s TTD 10s TTD 30s the results into the following table.
28,33 (HTTP &
MIN 146,00 (SSH) 403,67 (IMAP)
HTTPS) Subsequently, data regarding the minimum time, average
AVERAGE 80,51 173,18 434,58 time, median time, and maximum time needed for Active
Response to initiate actions upon detecting brute force attack
MEDIAN 36,17 154,67 434,83 indications by SIEM Wazuh was gathered and is presented in
the following table.
MAX 258,67 (IMAP) 265,00 (IMAP) 466,33 (IMAP)

Based on the final data analysis, where all scenarios and


protocols were combined and compared, it was observed that
the minimum time required to detect brute force attacks varied
across different protocol intervals. Notably, the HTTP and Table 11. Active Response mitigation summary
HTTPS protocols exhibited the shortest detection time, while
the IMAP protocol required the longest time for detection. This Active Response Reaction Time
trend persisted consistently throughout the analysis, (All Tests)
highlighting the distinct authentication mechanisms inherent to
MIN 0,00
AVERAGE 0,51
Table 10. Active Response reaction time
MEDIAN 0,49
MAX 1,33

Based on the data presented in the table above, we reveal that


the average duration necessary for Active Response to initiate
a response upon detecting brute force attacks, facilitated by
Wazuh, amounted to 0.51 seconds. This average response time
underscores the system's efficiency in promptly addressing
security threats. Furthermore, examination of the tests data
unveiled that the shortest recorded response time was
each protocol.
instantaneous, registering at 0.00 seconds, indicative of
This indicates that the authentication mechanism between
immediate action taken upon detection. Conversely, the
these protocols is different as we didn't get the same result in
lengthiest response time recorded was 1.33 seconds, signifying
the final analysis. HTTP and HTTPS take the shortest time to
instances where response initiation encountered slight delays,
detect as they required less step to authenticate and only use
albeit within an acceptable timeframe.
request-respond process while IMAP required more complex
authentication process. Each IMAP authentication session also
V. CONCLUSION
needs to establish TCP connection and that adds more overhead
time. This made IMAP are the longest time required to detect Based on the research conducted regarding the
for a brute force attack. implementation and testing of SIEM Wazuh, the Active
Although the factors influencing authentication time were Response feature, and its integration with Telegram, several
not the focus of this research, they present potential avenues for conclusions can be drawn as follows:
further investigation. Despite this, our study confirms the The implementation of the SIEM Wazuh system, inclusive of
effectiveness of the implemented solution, achieving a 100% the Active Response feature, was executed successfully,
detection accuracy across all six protocols tested for brute force adhering to the predefined implementation scenario and
attacks. simulation topology, mirroring the live system environment at
GT-I2TI Usakti. Furthermore, the integration with Telegram
D. Active Response Mitigation Effectiveness proved successful in transmitting notifications to the designated
To determine the Reaction Time, which is the time required Telegram Chat.
by Active Response to take action against the source IP SIEM Wazuh demonstrates remarkable efficacy in detecting
identified as conducting a brute force attack, the researcher brute force attacks across diverse protocols, boasting a flawless
employed the following formula: accuracy rate of 100%. Notably, the system exhibits varying
average detection times across intervals, with figures standing
at 80.51 seconds for 1-second intervals, 173.18 seconds for 10-

6
Volume 4 Number 1 Januari-Juni 2024 PP 1-7 INTELMATICS ISSN 2775-8850 (Online)

second intervals, and 434.58 seconds for 30-second intervals. (email: mardianto@trisakti.ac.id)
The Active Response functionality within SIEM Wazuh Adrian Sjamsul Qamar, completed bachelor at University of
emerges as a robust tool in thwarting identified brute force Indonesia, master’s at the University of Indonesia.
attacks across multiple protocols. With impeccable accuracy, it (email: adrian.qamar@trisakti.ac.id)
swiftly blocks attackers' IP addresses, with an average initiation
time of merely 0.51 seconds.
Moreover, SIEM Wazuh, coupled with the Active Response
feature, effectively discerns between normal user activities and
those of threat actors, achieving this feat without generating any
false positives during the experimental trials.
The Telegram notification mechanism operates seamlessly,
delivering timely updates regarding failed login attempts and
the activation of Active Response in response to detected brute
force attacks directly to the Telegram application. This ensures
swift and reliable communication of critical security events to
relevant stakeholders.

REFERENCES
[1] Bourgeois, David T.; Smith, James L.; Wang, Shouhong; and Mortati,
Joseph, "Information Systems for Business and Beyond" (2019). Open
Textbooks. 1.
[2] McAfee, A. & Brynjolfsson, “Investing in the IT that Makes a
Competitive Difference”. Harvard Business Review. 86. 98-107 (2008).
[3] ESET Threat Report H1 2023, ESET Research,2023,
https://www.welivesecurity.com/2023/07/11/eset-threat-report-h1-2023/.
Accessed July, 12 2023.
[4] Goodgion, Jonathon S., "Active Response Using Host-Based Intrusion
Detection System and Software-Defined Networking" (2017). Theses and
Dissertations. 1575.
[5] Radhitya, Dimas. “Analisis implementasi Security Information and Event
Management (SIEM) dengan berbasis wazuh pada sistem operasi
Windows dan Linux” (2022). Fakultas Teknik Universitas Indonesia.
[6] Nova, F., Pratama, M. D., & Prayama, D. (2022). Wazuh sebagai Log
Event Management dan Deteksi Celah Keamanan pada Server dari
Serangan Dos. JITSI: Jurnal Ilmiah Teknologi Sistem Informasi, 3(1), 1-
7.
[7] Pfau, Robert. The Security Lifecycle, SANS Institute, USA, 2003.
[8] N. Carr, “IT Doesn’t Matter,” Harvard Business Review, May 2003.
[Online]. Available: https://hbr.org/2003/05/it-doesnt-matter. [Accessed:
October 13, 2022].
[9] Center for Strategic & International Studies (CSIS), “Significant Cyber
Incidents Since 2006,” Center for Strategic & International Studies
(CSIS), 2019.
[10] Check Point Software Technologies Ltd, “CYBER ATTACK TRENDS
Check Point’s 2022 Mid-Year Report,” Check Point Software
Technologies Ltd, 2022.
[11] Dr. Madhu Tyagi, “SECURITY AGAINST CYBER-CRIME:
PREVENTION AND DETECT,” Horizon Books ( A Division of Ignited
Minds Edutech P Ltd), 2017
[12] R. Stair and G. Reynolds, Principles of information systems. Cengage
Learning, 2017.
[13] Committee on National Security Systems Instruction (CNSSI) No. 4009,
“National Information Assurance Glossary,” Committee on National
Security Systems (CNSS), Apr. 2010.
[14] Microsoft, “What is SIEM?,” Microsoft. [Online]. Available:
https://www.microsoft.com/en-us/security/business/security-101/what-
is-siem. [Accessed: Jan. 5, 2023].
[15] Wazuh, “Components – Getting started,” Wazuh. [Online]. Available:
https://documentation.wazuh.com/current/getting-
started/components/index.htm. [Accessed: Jan. 10, 2023].

Farhan Ibnu Farrel, born in Bukittinggi, February 23, 2001.


Student of Trisakti University, Faculty of Information System
Industrial Technology
(email: farhan065001900038@std.trisakti.ac.id)
Is Mardianto, completed bachelor at Institute Technology
Bandung, Master’s at University of Indonesia

*Corresponding author 7 https://doi.org/10.25105/itm.v4i1.18529


E-mail addresss : farhan065001900038@std.trisakti.ac.id

You might also like