Experimental Evaluation of Wazuh-Grafana Integration for Real-Time Cyber Threat Detection in Resource-Constrained Environments

Authors

  • Achmad Sutanto Politeknik Harapan Bersama
  • Arif Rakhman Politeknik Harapan Bersama

DOI:

https://doi.org/10.30871/jaic.v9i5.10404

Keywords:

Brute-force attack, Cyber threat detection, Grafana, Real-time SIEM, Wazuh

Abstract

This research evaluates the performance of integrating Wazuh, an open-source Security Information and Event Management (SIEM) platform, with Grafana, a real-time visualization tool, for cyber threat detection in resource-constrained environments. The objective is to assess detection accuracy, false positive rates, response times, and system efficiency under controlled experimental conditions. The testbed consisted of two virtual private servers (4 vCPUs, 4–8 GB RAM, 38–50 GB storage) and employed the CIC-IDS2017 dataset as a benchmark for simulating three representative attacks: brute-force, malware injection, and webshell exploitation. The results showed that the integrated system achieved 100% detection accuracy with 0% false positives across 30 trials, with an average total detection time of 3033 ms. Resource utilization remained low, with CPU usage below 35% and memory consumption under 25%, confirming feasibility for mid-range servers typical of small institutions. While these results underscore the system’s efficiency, the findings must be interpreted within the limitations of a laboratory environment where predefined signatures were used. Performance in real-world networks with diverse traffic and unknown threats may differ, and further validation is required. This study makes two key contributions: (1) it provides the first structured quantitative benchmark of Wazuh-Grafana integration in constrained environments using a standardized dataset, and (2) it offers practical recommendations for small and medium-sized institutions, including minimum system requirements and guidelines for dashboard configuration. These findings reinforce the role of open-source solutions as affordable, adaptive, and effective alternatives to commercial SIEM systems, particularly for organizations with limited cybersecurity budgets.

Downloads

Download data is not yet available.

References

[1] T. Liebetrau and L. Monsees, “Cybersecurity and International Relations: developing thinking tools for digital world politics,” Int. Aff., vol. 100, no. 6, pp. 2303–2315, Nov. 2024, doi: 10.1093/ia/iiae232.

[2] S. S. Tirumala, N. Nepal, and S. K. Ray, “Raspberry Pi-based Intelligent Cyber Defense Systems for SMEs and Smart-homes: An Exploratory Study,” EAI Endorsed Trans. Smart Cities, vol. 6, no. 18, p. e4, Aug. 2022, doi: 10.4108/eetsc.v6i18.2345.

[3] A. Piazza, S. Vasudevan, and M. Carr, “Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector,” J. Cybersecurity, vol. 9, no. 1, Jan. 2023, doi: 10.1093/cybsec/tyad019.

[4] B. Wibowo, A. Nurrohman, and L. Hafiz, “Deep Learning in Wazuh Intrusion Detection System to Identify Advanced Persistent Threat (APT) Attacks,” Int. J. Sci. Educ. Cult. Stud., vol. 4, no. 1, pp. 1–10, Jan. 2025, doi: 10.58291/ijsecs.v4i1.311.

[5] C. MACANEATA, “Overview of Security Information and Event Management Systems,” Inform. Econ., vol. 28, no. 1/2024, pp. 15–24, Mar. 2024, doi: 10.24818/issn14531305/28.1.2024.02.

[6] M. R. Islam and R. Rafique, “Wazuh SIEM for Cyber Security and Threat Mitigation in Apparel Industries,” Int. J. Eng. Mater. Manuf., vol. 9, no. 4, pp. 136–144, Oct. 2024, doi: 10.26776/ijemm.09.04.2024.02.

[7] Jumiaty and B. Soewito, “SIEM and Threat Intelligence: Protecting Applications with Wazuh and TheHive,” Int. J. Adv. Comput. Sci. Appl., vol. 15, no. 9, 2024, doi: 10.14569/IJACSA.2024.0150923.

[8] S. Moiz, A. Majid, A. Basit, M. Ebrahim, A. A. Abro, and M. Naeem, “Security and Threat Detection through Cloud-Based Wazuh Deployment,” in 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC), Jan. 2024, pp. 1–5, doi: 10.1109/KHI-HTC60760.2024.10482206.

[9] M. Nas, F. Ulfiah, and U. Putri, “Analisis Sistem Security Information and Event Management (SIEM) Aplikasi Wazuh pada Dinas Komunikasi Informatika Statistik dan Persandian Sulawesi Selatan,” J. Teknol. Elekterika, vol. 20, no. 2, p. 92, Nov. 2023, doi: 10.31963/elekterika.v20i2.4536.

[10] C. Kurniawan and A. Triayudi, “Reconstruction and Detection of Gambling Web Defacement Attack Using Wazuh and Velociraptor,” in 2024 International Conference on Information Technology Research and Innovation (ICITRI), Sep. 2024, pp. 257–262, doi: 10.1109/ICITRI62858.2024.10699215.

[11] Z. S. Younus and M. Alanezi, “Detect and Mitigate Cyberattacks Using SIEM,” in 2023 16th International Conference on Developments in eSystems Engineering (DeSE), Dec. 2023, pp. 510–515, doi: 10.1109/DeSE60595.2023.10469387.

[12] F. I. F. Farrel, M. K. Is Mardianto, S.Si, and M. Ir. Adrian Sjamsul Qamar, “Implementation of Security Information & Event Management (SIEM) Wazuh with Active Response and Telegram Notification for Mitigating Brute Force Attacks on The GT-I2TI USAKTI Information System,” Intelmatics, vol. 4, no. 1, pp. 1–7, Feb. 2024, doi: 10.25105/itm.v4i1.18529.

[13] M. Monteros, J. F. Chuqui Quille, N. Benitez-Cacao, and P. Velez-Guerrero, “Implementar un sistema de gestión y análisis de seguridad con la herramienta Wazuh, en el Instituto Superior Universitario Tecnológico del Azuay,” Atenas Rev. Científica Técnica y Tecnológica, vol. 3, no. 1, 2024, doi: 10.36500/atenas.3.006.

[14] Kurniabudi, D. Stiawan, Darmawijoyo, M. Y. Bin Idris, A. M. Bamhdi, and R. Budiarto, “CICIDS-2017 Dataset Feature Analysis With Information Gain for Anomaly Detection,” IEEE Access, vol. 8, pp. 132911–132921, 2020, doi: 10.1109/ACCESS.2020.3009843.

[15] F. D. Utami and F. D. Astuti, “Comparison of Hadoop Mapreduce and Apache Spark in Big Data Processing with Hgrid247-DE,” J. Appl. Informatics Comput., vol. 8, no. 2, pp. 390–399, Nov. 2024, doi: 10.30871/jaic.v8i2.8557.

[16] M. R. A. Suhendi, Alfarizi, A. A. Sukmandhani, and Y. D. Prabowo, “Network Anomaly Detection Analysis using Artillery Honeypot and Wazuh SIEM,” in 2023 IEEE 9th International Conference on Computing, Engineering and Design (ICCED), Nov. 2023, pp. 1–6, doi: 10.1109/ICCED60214.2023.10425009.

[17] R. Amami, M. Charfeddine, and S. Masmoudi, “Exploration of Open Source SIEM Tools and Deployment of an Appropriate Wazuh-Based Solution for Strengthening Cyberdefense,” in 2024 10th International Conference on Control, Decision and Information Technologies (CoDIT), Jul. 2024, pp. 1–7, doi: 10.1109/CoDIT62066.2024.10708476.

[18] C. Bassey, E. T. Chinda, and S. Idowu, “Building a Scalable Security Operations Center: A Focus on Open-source Tools,” J. Eng. Res. Reports, vol. 26, no. 7, pp. 196–209, Jun. 2024, doi: 10.9734/jerr/2024/v26i71203.

Downloads

Published

2025-10-18

How to Cite

[1]
A. Sutanto and A. Rakhman, “Experimental Evaluation of Wazuh-Grafana Integration for Real-Time Cyber Threat Detection in Resource-Constrained Environments”, JAIC, vol. 9, no. 5, pp. 2783–2790, Oct. 2025.

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.