Implementasi Sistem Deteksi Defacement Otomatis pada Website Pemerintah Menggunakan N8N
Abstract
Advances in information technology have encouraged the use of websites as a means of public services in various sectors. One sector that utilizes websites to support its services is the government sector. However, in its implementation, this system faces cybersecurity challenges, namely defacement attacks, which involve unauthorized changes to the appearance or content of a website that are often detected too late and can erode public trust. This research aims to develop a system capable of detecting indications of defacement attacks automatically and more quickly. The method applied in this research is a system experiment approach, which utilizes the n8n workflow automation platform, operated on a scheduled basis via schedule triggers. This system is tasked with monitoring website domains by applying analytical techniques based on keyword matching to page content that is potentially subject to change. The monitoring data is then processed using a function node to match specific keywords, such as "judol," "bokep," "gacor," and "slot," which frequently appear in defacement cases. Once keywords are detected, the system then sends a warning message to the administrator via Discord. The results show that the system is capable of automatically detecting keyword occurrences and sending a warning message via Discord webhook to the administrator when a change in website content is identified. This system also helps speed up the verification process by providing direct links to related pages so that handling can be done more quickly and effectively.
Downloads
References
Y. Jumaryadi and J. Desmon, “Systematic Literature Review: Serangan Deface Website sebagai Bentuk Kejahatan Siber,” Just IT J. Sist. Informasi, Teknol. Inf. dan Komput., vol. 14, no. 2, pp. 106–112, 2023. https://doi.org/10.24853/justit.14.2.106-112
F. E. Putri and F. Z. An Nibras, “Analysis of Website Vulnerability to Defacement Attacks,” J. Sist. Inf. dan Teknol. Inf., vol. 2, no. 1, pp. 152–156, 2025. https://doi.org/10.33197/justinfo.v2i1.1806
P. Agustin and A. Wahyu, “Analisis Keamanan Situs .go.id Terhadap Serangan Web Defacement Judi Online,” In Search, vol. 24, no. 1, 2025. https://doi.org/10.37278/insearch.v24i1.1125
L. M. Zagi, G. P. Digdo, and W. Shalannanda, “Just Dork and Crawl: Measuring Illegal Online Gambling Defacement in Indonesian Websites,” arXiv Prepr., 2025.
https://doi.org/10.48550/arXiv.2508.19368
C. Kurniawan and A. Triayudi, “File Integrity Monitoring as a Method for Detecting and Preventing Web Defacement Attacks,” J. Online Inform., vol. 9, no. 2, pp. 276–285, 2024. https://doi.org/10.15575/join.v9i2.1326
N. Mamuriyah, S. E. Prasetyo, and A. O. Sijabat, “Rancangan Sistem Keamanan Jaringan dari Serangan DDoS Menggunakan Metode Pengujian Penetrasi,” J. Teknol. dan Sist. Inf. Bisnis, vol. 6, no. 1, pp. 162–167, 2024. https://doi.org/10.47233/jteksis.v6i1.1124
D. A. Artika, D. Rumahorbo, M. H. Al-Majid, and D. Kiswanto, “Implementasi Sistem Keamanan Website dengan Analisis Log dan Deteksi Aktivitas Anomali Menggunakan Isolation Forest,” J. Inform. dan Tek. Elektro Terap., vol. 13, no. 3S1, 2025. https://doi.org/10.23960/jitet.v13i3S1.8133
B. Haryanto and D. W. Chandra, “Implementasi Wazuh Integritas File untuk Perlindungan Keamanan Berdasarkan Aktivitas Log di BTSI UKSW,” J. Indones. Manaj. Inform. dan Komun., vol. 5, no. 1, pp. 183–192, 2024. https://doi.org/10.35870/jimik.v5i1.447
A. R. Amir and S. M. Atif, “Evaluating Workflow Automation Efficiency Using n8n,” 2026.
https://doi.org/10.48550/arXiv.2602.01311
R. D. Ahmad H., E. A. Hadi, and E. Rusnandi, “Automation of Technical Documentation Validation Workflows Based on GitHub Using n8n During Software Development Stages,” J. Multimed. Technol. Appl. Softw., vol. 2, no. 2, pp. 64–69, 2025. https://doi.org/10.71266/jmtas.v2i2.62
A. Ramadhani, M. D. Yantoro, M. F. Akmal, M. Mahfud, and Fauzi, “Chatbot Otomatis dengan n8n dan AI untuk Analisis Data dan Pelaporan Hasil,” J. Ris. Tek. Komput., vol. 2, no. 2, pp. 18–23, 2025. https://doi.org/10.69714/x1p94182
W. Pratama and F. A. Ahda, “Inovasi Agen AI dalam Sistem Pencatatan Struk Digital Otomatis Berbasis n8n,” J. FASILKOM, vol. 15, no. 3, 2025. https://doi.org/10.37859/jf.v15i3.10366
T. Mary and N. Febriyani, “Peningkatan keamanan sistem informasi berbasis Laravel 12 dengan rate limiting dan role-based access control (RBAC),” J. Teknol. dan Sist. Inf. Bisnis, vol. 7, no. 3, pp. 473–481, 2025. https://doi.org/10.47233/jteksis.v7i3.1976
Y. Permatasari and R. F. Aji, “Evaluasi dan Rekomendasi Perbaikan Proses Pemenuhan Permintaan Layanan Teknologi Informasi: Studi Kasus PT Bank XYZ,” J. Teknol. dan Sist. Inf. Bisnis, vol. 7, no. 1, 2025. https://doi.org/10.47233/jteksis.v7i1.1769
D. Merkel, “Docker: Lightweight Linux Containers for Consistent Development and Deployment,” Linux J., no. 239, 2014. https://dl.acm.org/doi/10.5555/2600239.2600241
C. Pahl, “Containerization and the PaaS Cloud,” IEEE Cloud Comput., vol. 2, no. 3, pp. 24–31, 2015. 10.1109/MCC.2015.51
R. Pressman and B. Maxim, Software Engineering: A Practitioner’s Approach, 9th ed. New York: McGraw-Hill Education, 2020. https://books.google.com/books?id=bL7QZHtWvaUC
Copyright (c) 2026 Faisal Anwar, Apriade Voutama

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under an Attribution 4.0 International (CC BY 4.0) that allows others to share — copy and redistribute the material in any medium or format and adapt — remix, transform, and build upon the material for any purpose, even commercially with an acknowledgment of the work's authorship and initial publication in this journal.






























