Javascript must be enabled to continue!
SISTEM KEAMANAN DETEKSI SERANGAN REAL-TIME DAN OTOMATISASI PEMBLOKIRAN PADA WORDPRESS
View through CrossRef
WordPress is the most widely used Content Management System (CMS) in the world, but it is also a primary target of cyberattacks such as brute-force login attempts, SQL Injection, and unauthorized access to administration pages. This research aims to analyze and develop a security plugin called WP Realtime Monitor, which is capable of detecting attacks in real time, sending notifications to administrators via Telegram, and automatically blocking the attacker’s IP address. The research methodology includes security requirement analysis, plugin architecture design using WordPress hooks, implementation using PHP and Telegram API integration, as well as testing against several simulated attack scenarios. The results show that the plugin successfully detects repeated failed login attempts, access to wp-login.php, and simple SQL Injection attacks. In addition, the system can send notifications to Telegram in less than one second and automatically block IP addresses that repeatedly launch attacks. Performance analysis indicates that the plugin is lightweight, does not add significant load to the WordPress server, and provides practical security improvements. Therefore, the development of WP Realtime Monitor is proven to be effective as an alternative solution for WordPress website security.
Sekolah Tinggi Manajemen Informatika dan Komputer Kaputama
Title: SISTEM KEAMANAN DETEKSI SERANGAN REAL-TIME DAN OTOMATISASI PEMBLOKIRAN PADA WORDPRESS
Description:
WordPress is the most widely used Content Management System (CMS) in the world, but it is also a primary target of cyberattacks such as brute-force login attempts, SQL Injection, and unauthorized access to administration pages.
This research aims to analyze and develop a security plugin called WP Realtime Monitor, which is capable of detecting attacks in real time, sending notifications to administrators via Telegram, and automatically blocking the attacker’s IP address.
The research methodology includes security requirement analysis, plugin architecture design using WordPress hooks, implementation using PHP and Telegram API integration, as well as testing against several simulated attack scenarios.
The results show that the plugin successfully detects repeated failed login attempts, access to wp-login.
php, and simple SQL Injection attacks.
In addition, the system can send notifications to Telegram in less than one second and automatically block IP addresses that repeatedly launch attacks.
Performance analysis indicates that the plugin is lightweight, does not add significant load to the WordPress server, and provides practical security improvements.
Therefore, the development of WP Realtime Monitor is proven to be effective as an alternative solution for WordPress website security.
Related Results
FAKTOR-FAKTOR YANG MEMPENGARUHI MORTALITAS PADA PASIEN DENGAN FRAKTUR COSTA: Literature Review
FAKTOR-FAKTOR YANG MEMPENGARUHI MORTALITAS PADA PASIEN DENGAN FRAKTUR COSTA: Literature Review
FAKTOR-FAKTOR YANG MEMPENGARUHI MORTALITAS PADA PASIEN DENGAN FRAKTUR COSTA: Literature Review Anna Tri Wahyuni1), Masfuri2), Liya Arista3)1,2,3 Fakultas Ilmu Keperawatan Univers...
KAJIAN HUKUM TERHADAP PEMBLOKIRAN PADA BUKU TANAH DALAM PENDAFTARAN TANAH
KAJIAN HUKUM TERHADAP PEMBLOKIRAN PADA BUKU TANAH DALAM PENDAFTARAN TANAH
Penelitian ini bertujuan untuk mengetahui pengaturan pemblokiran dan mekanisme pemblokiran pada buku tanah dalam pendaftaran tanah yang dapat menjamin kepastian hukum bagi pihak pe...
DAMPAK TEKNOLOGI TERHADAP PROSES BELAJAR MENGAJAR
DAMPAK TEKNOLOGI TERHADAP PROSES BELAJAR MENGAJAR
DAFTAR PUSTAKAAditama, M. H. R., & Selfiardy, S. (2022). Kehidupan Mahasiswa Kuliah Sambil Bekerja di Masa Pandemi Covid-19. Kidspedia: Jurnal Pendidikan Anak Usia Dini, 3(...
Sosialisasi Ketrampilan Dan Kemampuan Strategi Serangan Peserta Akademi Futsal Di Surakarta
Sosialisasi Ketrampilan Dan Kemampuan Strategi Serangan Peserta Akademi Futsal Di Surakarta
Tujuan kegiatan ini yaitu untuk pengabdian kepada masyarakat terkait dengan sosialisasi ketrampilan dan kemampuan strategi serangan peserta akademi futsal di Surakarta. Kegiatan in...
IMPLEMENTASI METODE NAIVE BAYES UNTUK INTRUSION DETECTION SYSTEM (IDS)
IMPLEMENTASI METODE NAIVE BAYES UNTUK INTRUSION DETECTION SYSTEM (IDS)
IDS berfungsi untuk mengidentifikasi traffic atau lalu-lintas data pada sebuah jaringan komputer dimana IDS dapat menentukan apakah traffic aman, mencurigakan atau bahkan terindika...
PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN
PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN
Pemantauan  server  jaringan  komputer  sangat  penting  dilakukan  untuk  mempermudah seorang administrator dalam mengamati dan mengontrol sistem jaringan ...
IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN
IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN
Sistem keamanan jaringan semakin hari kian makin berkembang, begitu pula serangan pada sistem jaringan yang berbeda-beda metode dan perkembangannya, khususnya pada server yang menj...

