Teler Real-time HTTP Intrusion Detection at Website with Nginx Web Server

Agus Tedyyana - Department of Informatics Engineering, Politeknik Negeri Bengkalis, Bengkalis, 28711, Indonesia
Osman Ghazali - School of Computing, University Utara Malaysia, Sintok, Kedah, Malaysia

Citation Format:



Web servers and web-based applications are now widely used, but in this case, the crime rate in cyberspace has also increased. Crime in cyberspace can occur due to the exploitation of how a system works. For example, the way HTTP works are exploited to weaken the webserver. Various tools for attacking the internet are also starting to be easy to find, but so are the tools to detect these attacks. One of the useful tools for detecting attacks and sending warnings against threats is based on the weblogs on the webserver. Many have not reviewed Teler as an intrusion detection system on HTTP on web servers because the existing tools are relatively new. Teler detecting the weblog and run on the terminal with rule resources collected from the community. So here, the researcher tries to implement the use of Teler in detecting HTTP intrusions on a Nginx-based web server. Intrusion is carried out in attacks commonly used by attackers, for example, port scanning and directory brute force using the Nmap and OWASP ZAP tools. Then the detection results will be sent via the Telegram bot to the server admin. From the results of the experiments conducted, it has been found that Teler is still classified as being able to send warning notifications with a delay between the time of detection and the time when the alert is received, no more than 3 seconds.


HTTP; intrusion detection; teler; web server.

Full Text:



BSSN, “BSSN’S Measure to Detect Cyberthreats,†Jakarta, 2019. doi: 10.1017/CBO9781107415324.004.

A. Gupta and L. Sen Sharma, “Detecting attacks in high-speed networks: Issues and solutions,†Inf. Secur. J., vol. 29, no. 2, pp. 51–61, 2020, doi: 10.1080/19393555.2020.1722296.

M. Tabash, M. A. Allah, and B. Tawfik, “Intrusion detection model using naive bayes and deep learning technique,†Int. Arab J. Inf. Technol., vol. 17, no. 2, pp. 215–224, 2020, doi: 10.34028/iajit/17/2/9.

S. Jose, D. Malathi, B. Reddy, and D. Jayaseeli, “A Survey on Anomaly Based Host Intrusion Detection System,†J. Phys. Conf. Ser., vol. 1000, no. 1, 2018, doi: 10.1088/1742-6596/1000/1/012049.

A. H. Hambali and S. Nurmiati, “Implementasi Intrusion Detection System (IDS) Pada Keamanan PC Server Terhadap Serangan Flooding Data,†Sainstech J. Penelit. dan Pengkaj. Sains dan Teknol., vol. 28, no. 1, pp. 35–43, 2018, doi: 10.37277/stch.v28i1.267.

D. Utomo, M. Sholeh, and A. Avorizano, “Membangun Sistem Mobile Monitoring Keamanan Web Aplikasi Menggunakan Suricata dan Bot Telegram Channel,†Semin. Nas. Teknoka, vol. 2, no. 2502, pp. 1–7, 2017.

K. Ma, R. Jiang, D. Mianxiong, Y. Jia, and A. Li, “Neural Network Based Web Log Analysis for Web Intrusion Detection,†Springer Int. Publ., pp. 194–204, 2017, doi: 10.1007/978-3-319-72395-2.

D. Siswanto, “Teler Real-time HTTP Intrusion Detection,†2020. (accessed Dec. 05, 2020).

M. Baş Seyyar, F. Ö. Çatak, and E. Gül, “Detection of attack-targeted scans from the Apache HTTP Server access logs,†Applied Computing and Informatics, vol. 14, no. 1. Elsevier B.V., pp. 28–36, Jan. 01, 2018, doi: 10.1016/j.aci.2017.04.002.

A. Erlansari, F. F. Coastera, and A. Husamudin, “Early Intrusion Detection System (IDS) using Snort and Telegram approach,†Sisforma, vol. 7, no. 1, p. 21, 2020, doi: 10.24167/sisforma.v7i1.2629.

S. Suroto, “A Review of Defense Against Slow HTTP Attack,†JOIV Int. J. Informatics Vis., vol. 1, no. 4, p. 127, 2017, doi: 10.30630/joiv.1.4.51.

R. S. Devi and M. M. Kumar, “Testing for Security Weakness of Web Applications using Ethical Hacking,†no. Icoei, pp. 354–361, 2020.

J. C. de Oliveira, D. H. Santos, and M. Ìario P. Neto, “Chatting with Arduino Platformthrough Telegram Bot,†in 2016 IEEE International Symposium on Consumer Electronics, 2016, pp. 1–2.

K. Coffey, R. Smith, L. Maglaras, and H. Janicke, “Vulnerability Analysis of Network Scanning on SCADA Systems,†Secur. Commun. Networks, vol. 2018, 2018, doi: 10.1155/2018/3794603.

A. A. Kristanto, Y. Harjoseputro, and J. E. Samodra, “Implementasi Golang dan New Simple Queue pada Sistem Sandbox Pihak Ketiga Berbasis REST API,†J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 4, pp. 745–750, 2020.

M. Barthelmäs, M. Killinger, and J. Keller, “Using a Telegram chatbot as cost-effective software infrastructure for ambulatory assessment studies with iOS and Android devices,†Behav. Res. Methods, 2020, doi: 10.3758/s13428-020-01475-4.

F. Holik and S. Neradova, “Vulnerabilities of modern web applications,†2017 40th Int. Conv. Inf. Commun. Technol. Electron. Microelectron. MIPRO 2017 - Proc., pp. 1256–1261, 2017, doi: 10.23919/MIPRO.2017.7973616.

S. K. Paudel, “Vulnerable Web Applications and How To Audit Them,†Oulu University of Applied Sciences, 2016.

G. C. Deka, NoSQL Web Crawler Application, 1st ed., vol. 109. Elsevier Inc., 2018.

Sucurisecurity, “Directory Guessing Brute Force Attacks,†2019. (accessed Dec. 12, 2020).