Web-Based Network Anomaly Detection System for Disaster Recovery Center: A SIEM Implementation at the Indonesian Attorney General Training Agency

  • Authors

  • Affiliations

  • Published

  • Section Article

  • DOI https://doi.org/10.56347/jics.v4i1.217

  • Issue
Views icon

276

Views

Downloads icon

220

Downloads

Altmetrics icon

Altmetrics

Abstract

This research focuses on developing an anomaly detection application for the internet network infrastructure at the Disaster Recovery Center (DRC) building of the Indonesian Attorney General's Training Agency through Security Information and Event Management (SIEM) implementation utilizing Python programming language. The primary objective of this study is to develop a comprehensive application that assists personnel, particularly network administrators at the DRC facility, in monitoring and analyzing internet network communication patterns and traffic flows. The research methodology involves creating a detection system designed to enhance network security capabilities and provide continuous monitoring functionality for network infrastructure protection. The developed application leverages SIEM technology to aggregate and process security-related information extracted from log data across network devices, applications, and hardware components. SIEM technology demonstrates the capability to handle substantial data volumes while correlating and analyzing security events from multiple heterogeneous sources within the network environment. The implementation of this application provides critical visibility into the internal network operations of the DRC facility, enabling proactive threat detection and response capabilities. When security incidents or anomalous activities are identified, the system generates comprehensive reports detailing network conditions and security status, which are subsequently escalated to management for appropriate remedial actions and strategic decision-making.

References

  1. Aditya, M. R., & Dewi, C. (2024). Optimisasi pengecekan anomali pada proses job: Analisis waktu dan data untuk identifikasi anomali yang efisien. Jurnal Indonesia: Manajemen Informatika Dan Komunikasi, 5(2), 1819-1832. https://doi.org/10.35870/jimik.v5i2.737
  2. Alnaasan, N., Jain, A., Shafi, A., Subramoni, H., & Panda, D. (2021). OMB-Py: Python micro-benchmarks for evaluating performance of MPI libraries on HPC systems. https://doi.org/10.48550/arxiv.2110.10659
  3. AMT-IT. (2022, March 15). Network security: Tingkatkan keamanan jaringan perusahaan. https://amt-it.com/blog/network-security-adalah/
  4. Bootstrap. (2024). Build fast, responsive sites with Bootstrap. https://getbootstrap.com/
  5. Bullejos, M., Cabezas, D., Martín-Martín, M., & Alcalá, F. (2022). A k-nearest neighbors algorithm in Python for visualizing the 3D stratigraphic architecture of the Llobregat River Delta in NE Spain. Journal of Marine Science and Engineering, 10(7), 986. https://doi.org/10.3390/jmse10070986
  6. Carnes, B. (2021, May 17). Full Bootstrap 5 tutorial for beginners. freeCodeCamp. https://www.freecodecamp.org/news/full-bootstrap-5-tutorial-for-beginners/
  7. Choiri, E. O. (2021, August 12). Sejarah singkat internet & perkembanganya sampai saat ini. Qwords. https://qwords.com/blog/sejarah-singkat-internet/
  8. Chua, W., Pajas, A., Castro, C., Panganiban, S., Pasuquin, A., Purganan, M., Salonga, K., Velasco, L., & Velasco, L. (2024). Web traffic anomaly detection using isolation forest. Informatics, 11(4), 83. https://doi.org/10.3390/informatics11040083
  9. Cyber Academy Indonesia. (2022, June 8). Perbedaan SIEM dan SOAR. https://www.cyberacademy.id/blog/perbedaan-siem-dan-soar
  10. Dimovan, M. (2019). Dasar-dasar Mikrotik. http://103.44.149.34/elib/assets/buku/Dasar_Mikrotik.pdf
  11. Fazil, A. W., Hamidi, S. A., & Habibi, H. (2024). Evaluating the impact of emerging technologies on mobile user experience: The role of user-centered design in overcoming development challenges. International Journal Software Engineering and Computer Science (IJSECS), 4(3), 1244–1252. https://doi.org/10.35870/ijsecs.v4i3.3167
  12. Harris, C., Millman, K., Walt, S., Gommers, R., Virtanen, P., Cournapeau, D., Wieser, E., Taylor, J., Berg, S., Smith, N., Kern, R., Picus, M., Hoyer, S., Kerkwijk, M., Brett, M., Haldane, A., Río, J., Wiebe, M., Peterson, P., ... Oliphant, T. (2020). Array programming with NumPy. Nature, 585(7825), 357-362. https://doi.org/10.1038/s41586-020-2649-2
  13. Hattu, A., & Susetyo, Y. (2024). Development of operational application system at PT. XYZ with Flask overriding. International Journal Software Engineering and Computer Science (IJSECS), 4(1), 312–320. https://doi.org/10.35870/ijsecs.v4i1.2318
  14. Issenoro, Trisnawati, H., Tarigan, S. O., Faizah, N. M., & Veranita. (2025). Perancangan dan pengembangan aplikasi deteksi anomali pada jaringan internet gedung disaster recovery center Badan Diklat Kejaksaan RI dengan implementasi sistem manajemen informasi dan keamanan (SIEM) berbasis web. Jurnal Ilmu Komputer Dan Teknologi Informasi, 2(1), 12-21. https://doi.org/10.35870/jikti.v2i1.1341
  15. Izzathohir, K. M., & Yulianton, H. (2024). Sistem aplikasi penjualan gula aren berbasis web menggunakan framework Flask. Jurnal JTIK (Jurnal Teknologi Informasi Dan Komunikasi), 8(1), 163–169. https://doi.org/10.35870/jtik.v8i1.1332
  16. Ji, I., Lee, J., Kang, M., Park, W., Jeon, S., & Seo, J. (2024). Artificial intelligence-based anomaly detection technology over encrypted traffic: A systematic literature review. Sensors, 24(3), 898. https://doi.org/10.3390/s24030898
  17. Kamal, M. R., & Setiawan, M. A. (2021). Deteksi anomali dengan Security Information and Event Management (SIEM) Splunk pada jaringan UII. Automata, 2(2), 1–6. https://journal.uii.ac.id/AUTOMATA/article/view/19522
  18. Larasati, S., & Susetyo, Y. A. (2024). Development of a web-based trading term application using Flask framework at PT. XYZ. International Journal Software Engineering and Computer Science (IJSECS), 4(1), 367–376. https://doi.org/10.35870/ijsecs.v4i1.2339
  19. Ma'arif, O. M., & Kurniasih, T. (2024). Perancangan sistem inventory berbasis web menggunakan framework Flask: PT. Gagas Mitra Jaya (Area Salatiga). Jurnal Indonesia: Manajemen Informatika Dan Komunikasi, 5(2), 1947-1959. https://doi.org/10.35870/jimik.v5i2.822
  20. MITRE Corporation. (2024). Cybersecurity. https://www.mitre.org/focus-areas/cybersecurity
  21. Mustakim, A. (2021, March 16). Solusi keamanan siber untuk perusahaan. ACS Group. https://acsgroup.co.id/id/2021/03/16/indonesia-solusi-keamanan-siber-untuk-perusahaan/
  22. MySQL Tutorial. (2024). MySQL tutorial. https://www.mysqltutorial.org/
  23. Nassif, A., Talib, M., Nasir, Q., & Dakalbab, F. (2021). Machine learning for anomaly detection: A systematic review. IEEE Access, 9, 78658-78700. https://doi.org/10.1109/access.2021.3083060
  24. NgodingData. (2024). Tutorial Flask – Web framework Python. https://ngodingdata.com/tutorial-flask-web-framework-python/
  25. Octiva, C. S., Suryadi, D., Judijanto, L., Laia, M., & Irwan, D. (2024). The application of artificial intelligence for anomaly detection in big data systems for decision-making. International Journal Software Engineering and Computer Science (IJSECS), 4(3), 983–989. https://doi.org/10.35870/ijsecs.v4i3.3358
  26. Ogotan, T. E., & David, F. (2024). Pengembangan modul stock fulfillment online transaction pada aplikasi distribution center system menggunakan framework Flask di PT.XYZ. Jurnal Indonesia: Manajemen Informatika Dan Komunikasi, 5(2), 1485-1494. https://doi.org/10.35870/jimik.v5i2.696
  27. Pilnenskiy, N., & Smetannikov, I. (2020). Feature selection algorithms as one of the Python data analytical tools. Future Internet, 12(3), 54. https://doi.org/10.3390/fi12030054
  28. Prihandoyo, M. T. (2018). Unified Modeling Language (UML) model untuk pengembangan sistem informasi akademik berbasis web. Jurnal Informatika: Jurnal Pengembangan IT, 3(1), 126-129. https://doi.org/10.30591/jpit.v3i1.765
  29. Putra, A. A. A. W., Wanditya, I. M. D., & Fhadillah, M. L. H. (2025). Pengembangan antarmuka website kebugaran Fitme untuk mendukung pola hidup sehat dengan penerapan metode human-centered design. Jurnal Indonesia: Manajemen Informatika Dan Komunikasi, 6(1), 161-173. https://doi.org/10.35870/jimik.v6i1.1136
  30. Putra, A. A. A. W., Wirdianthi, N. L. R. P., & Azzaky, R. K. (2025). Perancangan UI/UX aplikasi stunting your buddy dengan metode user-centered design. Jurnal Indonesia: Manajemen Informatika Dan Komunikasi, 6(1), 115-127. https://doi.org/10.35870/jimik.v6i1.1132
  31. Python Software Foundation. (2024). Python. https://www.python.org/
  32. Rahmat, B. (2021). Pemrograman deep learning dengan Python. CV. Indomedia Pustaka.
  33. Ramdani, R. M., Yuniarti, R., & Komarudin, A. (2024). Interaction design on basic hand movement training game in taekwondo using user-centered design. International Journal Software Engineering and Computer Science (IJSECS), 4(1), 339–349. https://doi.org/10.35870/ijsecs.v4i1.2314
  34. Romadhoni, M. N., & Dirgahayu, T. (2024). Evaluasi dan redesain UI/UX pada aplikasi web Young on Top. Jurnal Indonesia: Manajemen Informatika Dan Komunikasi, 5(3), 2390-2401. https://doi.org/10.35870/jimik.v5i3.909.
  35. Santoso, B. B., & Saian, P. O. N. (2023). Implementasi Flask framework pada development modul reporting aplikasi sistem informasi helpdesk di PT.XYZ. Jurnal JTIK (Jurnal Teknologi Informasi Dan Komunikasi), 7(2), 217–226. https://doi.org/10.35870/jtik.v7i2.718
  36. Sijabat, D. R., & Evo, S. (2023). Perancangan Security Information and Event Management (SIEM) untuk mendeteksi insiden pada situs web. J-Intech, 11(1), 10–17. https://doi.org/10.32664/j-intech.v11i1.860
  37. Tama, B., Nkenyereye, L., Islam, S., & Kwak, K. (2020). An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access, 8, 24120-24134. https://doi.org/10.1109/access.2020.2969428
  38. Tutorial Mikrotik. (2024). Tutorial Mikrotik. https://tutorialmikrotik.com/
  39. Visual Paradigm. (2024). UML class diagram tutorial. https://www.visual-paradigm.com/guide/uml-unified-modeling-language/uml-class-diagram-tutorial/
  40. W3Schools. (2024). MySQL tutorial. https://www.w3schools.com/mysql/
  41. Walingkas, H. L., & Saian, P. O. N. (2023). Penerapan framework Flask pada pembangunan sistem informasi pemasok barang. Jurnal JTIK (Jurnal Teknologi Informasi Dan Komunikasi), 7(2), 227–234. https://doi.org/10.35870/jtik.v7i2.729
  42. Wang, P., Wang, Z., Chi, L., Ren, X., Wu, W., & Cheng, W. (2022). Research and application of the network security monitoring capability evaluation model of power control system based on AHP and fuzzy comprehensive evaluation. Journal of Physics: Conference Series, 2246(1), 012046. https://doi.org/10.1088/1742-6596/2246/1/012046
  43. Yuniar, Suganda, U. S., Alkahfi, M., & Suryadi, D. (2021). Koleksi program database Python.

Author Biographies

How to Cite

Issenoro, Trisnawati, H., Tarigan, S. O., & Faizah, N. M. (2025). Web-Based Network Anomaly Detection System for Disaster Recovery Center: A SIEM Implementation at the Indonesian Attorney General Training Agency. Journal Innovations Computer Science, 4(1), 1-17. https://doi.org/10.56347/jics.v4i1.217

Article Details

  • Volume: 4
  • Issue: 1
  • Pages: 1-17
  • Published:
  • Section: Article
  • Copyright: 2025
  • ISSN: 2961-970X

License

Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY 4.0). This means that users may share and adapt the articles published on this website in a reasonable manner, but they must give appropriate credit to the creator and indicate the changes they have made. Users must not apply additional restrictions, but must publish the work under the same license (CC-BY 4.0).

Similar Articles

Similar Articles

Discover other articles with topics similar to what you're currently reading. Find more references and expand your knowledge base.

Related Articles You May Be Interested In

More Similar Articles

Perancangan Sistem Informasi Reservasi Berbasis Web...

Dedek Susi Darwati

Vol. 3 No. 2 (2024): November
Perancangan Sistem Informasi Penjualan Tanaman Hias pada...

Bagus Sarul Setia, Banta Cut, Juniana Husna

Vol. 2 No. 1 (2023): May 2023
Rancangan Aplikasi Presensi Karyawan CV. Pramana Mukti...

Bayu Nosiyanto, NM Faizah, Widyat Nurcahyo

Vol. 3 No. 1 (2024): May 2024
Design and Development of a Web-Based Toddler Health Card...

Kharina Permatasari, Widyat Nurcahyo, NM Faizah, Tiwuk Wahyuli Prihandayani

Vol. 4 No. 1 (2025): May
Most read articles by the same author(s)

Related Articles