Javascript must be enabled to continue!
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
View through CrossRef
At this time Internet services have become a necessity no longer to provide information services, but have become important so there are many cases of websites being hacked by attackers, for that network security is very important to avoid theft of important data Security in a web application is a important aspect to have. Securing a web application can be done by installing a firewall that is connected directly to the server network. Security for a web application usually uses a web application firewall installed on a web server. To overcome a security problem in Web Applications and minimize losses caused by SQL Injection and XSS attacks, we need a way to overcome these attacks. Several security measures have been used, such as the use of fortiweb to set the traffic destination for a web application. In this study, we will use a Web Application Firewall (WAF) device. Because it can protect Web applications from existing malware attacks and zero day malware. This final project will implement a Web Application Firewall (WAF). By way of device configuration and will use DVWA for malware testing. The technology that will be used to monitor malware logs will use VMware. From the results of testing a web application firewall, it is hoped that it can implement and prevent various malware attacks that attack web applications and can monitor the logs of an attacking malware.
Universitas Pamulang
Title: Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
Description:
At this time Internet services have become a necessity no longer to provide information services, but have become important so there are many cases of websites being hacked by attackers, for that network security is very important to avoid theft of important data Security in a web application is a important aspect to have.
Securing a web application can be done by installing a firewall that is connected directly to the server network.
Security for a web application usually uses a web application firewall installed on a web server.
To overcome a security problem in Web Applications and minimize losses caused by SQL Injection and XSS attacks, we need a way to overcome these attacks.
Several security measures have been used, such as the use of fortiweb to set the traffic destination for a web application.
In this study, we will use a Web Application Firewall (WAF) device.
Because it can protect Web applications from existing malware attacks and zero day malware.
This final project will implement a Web Application Firewall (WAF).
By way of device configuration and will use DVWA for malware testing.
The technology that will be used to monitor malware logs will use VMware.
From the results of testing a web application firewall, it is hoped that it can implement and prevent various malware attacks that attack web applications and can monitor the logs of an attacking malware.
Related Results
Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware
Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware
Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime. This is very dangerous and ca...
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Potensi wisata Kelurahan Serangan dinilai cukup tinggi. Berdasarkan hasil wawancara singkat dengan salah satu Kepala Lingkungan Kelurahan Serangan, ditemukan bahwa Serangan mengede...
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Latar Belakang: Dua komponen utama pada analisismalware adalah analisis malware statis yang melibatkan pemeriksaan struktur dasar malware yang dapat dieksekusi tanpa mengeksekusiny...
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
PENGEMBANGAN APLIKASI REMOTE BERBASIS ANDROID UNTUK KONFIGURASI INTRUSION PREVENTION SYSTEM MEMANFATKAN INTERNET OF THINGS
PENGEMBANGAN APLIKASI REMOTE BERBASIS ANDROID UNTUK KONFIGURASI INTRUSION PREVENTION SYSTEM MEMANFATKAN INTERNET OF THINGS
Router MikroTik mampu untuk dikonfigurasi sebagai Intrusion Prevention System (IPS) sehingga dapat menolak paket data yang memiliki perilaku sebagai serangan Port Scanning, Brute F...
ANALISIS EFEKTIVITAS APLIKASI WARGAKU SURABAYA DALAM MENUNJANG PELAYANAN PUBLIK MASYARAKAT KOTA SURABAYA
ANALISIS EFEKTIVITAS APLIKASI WARGAKU SURABAYA DALAM MENUNJANG PELAYANAN PUBLIK MASYARAKAT KOTA SURABAYA
Era revolusi industri 4.0 telah memaksa dunia bergerak kedalam trend digital dan internet di berbagai lini kehidupan bermasyarakat. Hal ini telah direspons secara positif oleh peme...
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
The current high rate of malware variant production each day produces hundreds of thousands of new variants making signature detection methods ineffective. Deep learning patterns s...


