Syntax
Literate: Jurnal Ilmiah
Indonesia p�ISSN: 2541-0849 e-ISSN: 2548-1398
Vol. 7, No. 8, Agustus 2022
CONCURRENT IMPLEMENTATION OF WAF AND HARDENING BROKEN AUTHENTICATION TO
SECURE WEB APPLICATION
Dimas
Charis Suryo Nugroho, Muhammad Fadlan
Hidayat, Benfano Soewito
Universitas Bina Nusantara,
Jakarta, Indonesia
Email: [email protected],
[email protected],
[email protected]
Abstract
Web Application Security is considered crucial in the era of rapid technology
development, following with recent rapid development of artificial intelligence
architecture, virtual reality and the internet of things, one of important node
which is a web application that is connected to others node is needed to be
protected from cyber-attack attempts scenarios. These cyber-attack scenarios
are currently growing and evolve nowadays and cause a lot of losses in various
countries, such as economic loss, privacy loss, safety loss and etc. Some
research studies have developed web application fire-wall using artificial
intelligence and show that using web application firewall are effective to
tackle some of cyber-attack scenarios attempt However, the authors want to
revisit and con duct several experiments on this web application firewall and
also In this research the authors study and communicate proposed cyber security
method through an experiment of concurrent implementation from Web Application
Firewall (WAF) and Hardening Broken Authentication (HBA) method to secure OWASP
2017 most happening and popular two cyber-attack types namely Injection and
Broken Authentication. As cyber-attacks are increased and evolving against
recent web application firewalls, the authors successfully secure 14 out of 16
cyber-attack scenarios, and 11 out of 16 cyber-attack scenarios are perfectly
secured by the concurrent implementation of web application (WAF) and Hardening
Broken Authentication (HBA) without significant increased average network
access from 51 milliseconds to 61 milliseconds according to authors experiment
with fair same internet connection and devices compared to other security
methods in this experiment.
�
Keywords: Web Application Firewall, Hardening Broken
Authentication, Cyber Security, OWASP 2017, Injection, Broken Authentication.
Introduction
Data and information are essential for an organization to operate in
modern society and in most cases, the organization's data and information is
managed on the web application. There are a massive amount of data and
information shared and stored on the web application through the internet.
Forbes.com reported there are 2.5 quintillion bytes of data produced each day
on a worldwide scale in addition statista.com also summarize in January 2021
there were 4.66 billion active internet users worldwide [1] and for Indonesia,
there were 202.6 million internet users. The growth of Indonesia internet users
was 16% or 27 million users between 2020 until 2021 [2].
The huge growth of information reported is also on par with the number
of penetrations and cyber-crime attempts, these penetrations attempt has a
various purpose, several penetrations are meant to take benefit, misuse the
data for wrongdoing, and attempts to prove themselves, or have fun with the
information. According to the data compiled by Indonesia State Cyber and Code
Agency (BSSN) in a recap of web defacement, there were 88.414.296 attempts from
1 January 2020 to 12 April 2020, these number of cyber-attacks keep increasing
due to covid-19 policy, especially work and learn from home mandatory policy
[3]. The huge growth of cyber-attack reported in web applications resulting
importance in the web security and web security is considered critical and
dealing with web security and cyber-attack attempts are progressively
challenging [4].
In this research, the authors conduct four experiments on web security
based on several top scenarios arranged by the Open Web Application Security Project
2017 [5]. The OWASP 2017 reported the first rank of cyber-attack was launched
was injection and the second rank is broken authentication. The research
conducts an experiment to secure the first rank and second rank of OWASP 2017
cyber-attack scenario with a total of 16 scenarios with 8 scenarios of each
type using the concurrent implementation of web application firewall (WAF) and
Hardening Broken Authentication (HBA) method. The authors use security
assessment methodology in the guidance of Resta and Affandy study in 2019. In this cyber-security research also
complemented with network access performance evaluation in each security attack
scenarios. The authors also conduct an upgrade in hardening broken
authentication methods in Ibor study [6] and provide
a security novelty package to secure web applications.
This research article describes and communicates an experiment of
securing web applications from cyber-attack of OWASP 2017 1st rank (Injection)
and 2nd rank (Broken Authentication) using concurrent implementation Web Application
Firewall and Hardening Broken Authentication method. The paper is categorized
as follows. Section 1 is explained the introduction of information and cyber
security current development, section 2 describes related re-search of cyber
security methods to handle cyber-attack, section 3 describes the experiment
methodology of the web security model and attack scenario conducted, sec-tion 4 informs the experiment result and section 5 reveals
the insight from experiment results.
Related
Researchs
In this section the
authors discuss about how crucial protecting one of important ICT
infrastructure which is web application, discuss popular cyber-attack scenario
of Open Web Application Security (OWASP) and summarize several recent research
on Web Application Firewall (WAF).
Figure 1
Experiment Methodelogy
The web applications in
2022 without a doubt is a crucial instrument for an organization. Web
applications are commonly used to provide services, set an organizational
mechanism or rules, media data interaction and etc. Even though this instrument
development is in rapid pace there are also defect of the instrument that keep
evolve and grow over the year along with the instrument development, one of the
most common defect of web applications and also
crucial is the security against cyber-attack [7].
The OWASP is a worldwide
community focused on improving the security of application, all of OWASP tools
and documents are open to anyone who is interested in developing secure
applications, The top 10 popular cyber-attack summarized by OWASP 2017 list as
well as thousands of other known vulnerabilities can be detected with web
application security testing tools automatically or by security experts
manually [5], [8]. The first ranked cyber-attack in OWASP 2017 study is injection
type where this cyber-attack injection type is allowing malicious attackers to
manipulate web server database, which can cause dangerous scenarios such as
stealing the data, manipulating information, or damaging the information [9].
The second cyber-attack concerned by this research is OWASP 2017 broken
authentication cyber-attack type. Where this cyber-attack type is related to
exploit weakness of web system mechanism related to authentication and session
so the attacker can ignore passwords, token and session, these cyber-attacks
are able to maintain their illegitimate user access temporarily or permanently
basis in worst case take over the account [10]�[12].
Answering a huge amount
and evolving cyber-attack in the above paragraph, several recent research
attempts to improve web application firewall from signature base technique to
machine learning firewall approaches. Web application firewall used to guard at
application-level exploitation or cyber-attack scenarios, web application
firewall is popular Intrusion Detection System (IDS) to protect IT
Infrastructure [13], the idea of this web application firewall is functionally
to detect and drop potential dangerous cyber-attack through analyze HTTP
requests and drop the potential cyber-attack before it�s happening, web
application firewall is not only used to protect web application but it also
protecting several node that connected to web application such as web server,
databases, application programming interfaces (APIs) node such as recent popular
smart door an internet of things crucial instrument from cyber-attack [14].
A signature-based web
application firewall commonly make uses of security model base on cyber-attack
database are defined or how policies are implemented. Two main security models are
used: the negative security model and the positive security model. Web
application firewall adopting negative security model allows all traffic to
pass unless it matches defined cyber-attack, in which case traffic is blocked.
If traffic does not match the rules, the security model allows traffic to pass.
The negative security model has typically implemented the use of a
signature-based approach [15].
A signature-based web
application firewall (WAF) is basically a search-based technique approach from
existing blocked cyber-attack or policies. Research by applet et al shows that
this web application firewall signature base or negative-positive model
security may be insufficient since hacker may evolve their attacks to work
around existing security policies or rules, this statement is proven by applet
et al with successfully bypass the current state-of-the-art web application
firewall signature base [16], [17].
Currently, hackers evolve
their attack using generative adversarial algorithms to bypass the web application
firewall. Several research on machine learning base firewall also implemented
and designed. Machine learning web application firewall propose by Ceccato et al [18], a clustering method for detecting SQL
Injection attacks against web application services. This algorithm learns from
the queries that are processed inside the web application using unsupervised
learning approach namely K-medoids and then comes Kar et al [19] with SQLi-GoT a web application firewall base on Support Vector
Machine (SVM) clustering classifier to detect SQL Injection. This web
application firewall is updated by Pinzon et al that explore two direction
first visualization and second is detection, which achieved this direction by a
multi agent system called idMAS-SQL with two different
classifiers namely Neural Network and SVM. In this research the authors conduct
experiment research about concurrent implementation of web application firewall
(WAF) and hardening broken authentication (HBA) [20] that able to enhance
security in web applications [6], [21].
Methods
There are 3 objects in the
experiment methodology in Fig 1., the first object is a web application where
security methods and features are implemented, the second is a cyber-attack or
penetration testing scenario obtained from OWASP 2017 and the third object is a
security point and network access time performance result, the third object
will be produced when the second object that is cyber-attack scenario launched
on the web application object. The web application object consists of four web
applications: 1) web application without security method and features, 2) web
application with WAF, 3) web application with Hardening Broken Authentication,
4) web application with WAF and HBA (the proposed security method). Fig 1. shows
the overall experiment that will be conducted by the authors.
Web Application
�The web application script is built on Zend
Framework (PHP 7.2) and the scripts are stored in a virtual box server, the
virtual box server using Ubuntu Server 16.04 LTS and Apache2 web server, the
authors created four web applications with a list of security features in Table
2. The first web application is not equipped without any security features, in
reason to get an insight of network access time performance. This network
access time performance will be shown in section 4 of the experiment results,
the second web application is equipped with web application firewall method,
the third web application is equipped with the Hardening Broken Authentication
method, and the fourth web application is equipped with concurrent
implementation of firewall and hardening broken authentication.
Table 2
List Of Web Application Experiment Objects
Number of Web Application |
Web Application Method / Feature |
1 |
Web application without any security
feature |
2 |
Web application with WAF |
3 |
Web application with Hardening
Broken Authentication |
Web Application Security
Method / Feature
The specification of Web
Application Firewall - Hardening Broken Authentication method used in the experiment
for Hardening Broken Authentication are session management, brute-force
protection and restrict weak passwords and as for web application firewall is
placed between the web application and internet by implement the concurrent of
WAF-HBA, the web application is more secure to defend cyber-attack scenario
such as SQL Injection, DDoS attack, Cross-Site-Scripting and securing user
authentication. Hardening Broken Authentication method behavior are:
(1) Session Management �
which mean token session changes every time user login and if there�s no
interaction in web application within 2 days the token login will be changed,
to prevent the attackers maintain control on user id in web application.
(2) Brute-Force Protection
� the authors create limit on how many wrong passwords input on web application
to prevent cyber-attack user trying to login using brute force mechanism.
(3) Restrict weak password
� there are three level created to identify the password weakness weak level
indicate there are no combination of word, number nor symbol, normal level indicates
the password there are combination word and number with a minimal length of 8
in the password, strong level there are combination word, number and symbol
with a minimal length of 8 in the password.
Cyber-attack/Penetration
testing scenarios
In Table 1 shows the list
of several experiments of cyber-attack scenarios, the list of cyber-attack
scenarios is obtained from Open Web Application Security Project 2017 (OWASP)
first and second rank scenario, these cyber-attack scenarios will be launched
on four web application objects in Table 1. There are two cyber-attack type,
the first is injection and the second is broken authentication each cyber-attack
type has eight scenario and tools used to launch cyber-attack scenarios, as for
�manual� is not required any tool used to launch the cyber-attack scenarios.
Evaluation Methodology
Evaluation Methodology in
Table 3 there is list of response codes, response descriptions, and security
points. the security point and evaluation methodology are based on Resta study, the authors used points and indicate it with
the phrases of more and less secure because several popular studies state there
is no absolute security in web application [21], [22]. the most
highest point is gained from code R4 and the lowest is gained from code
R1, the more higher security point is collected from the Table 3 indicating
more secure of web application objects, the lower security point is collected
from Table 3 is indicating less secure of web application objects. The
evaluation is also complemented with network time access performance evaluation
in milliseconds.
Table 3
Response Code Status
Code |
Description |
Security
Point |
R1 |
The
Cyber-attack scenario access succeeds, launch succeed, the hacker is able to
retrieve/steal the information or retrieve the result. (Not
Secured, Danger Status) |
1 |
R2 |
Status 200 or 500 (Internal Server Error), the cyber-attack
scenario successfully accesses however, the web application showed the
warning or error messages (Potential of Vulnerability, Warning Status) |
2 |
R3 |
Status 200 or 404 (Not Found), the cyber-attack
scenario successfully accesses, the attacker is not found any critical
information (Potential of Vulnerability, Info Status) |
3 |
R4 |
Server Status 403 (Forbidden) the Cyber-attack
scenario is not successfully accessed. |
4 |
Result
And Discussion
After the methodology is
conducted, the experiment resulted in security score and network time access
for each cyber-attack scenario that was launched on four web application objects.
In table 4, table 5 and table 7 there are four web applications and security
scoring based on the point collected. The first web application object without
any security methods and features suffers vulnerabilities in all cyber-attack
scenario: injection type and broken authentication type. the vulnerability is
shown due to the acquisition of 1 point for every cyber-attack scenario. This
one-point acquisition means the hacker or attacker is successfully launched the
cyber-attack and is able to access, retrieve and damage the information. As we
can see in Table 6 and 7 the first web application has a 429ms average network
access time, it is the fastest access time compared to other web application
objects, on the other hand, this object collected the least point in total of
16 security point and 8 point each cyber-attack type.
Table
4
Injection
Cyber-Attack Type Experiment Result
Cyber-attack Scenario |
HBA |
Time |
WAF |
Time |
HBA and WAF |
Time |
SQL / Blind Injection |
2 |
92ms |
4 |
93ms |
4 |
93ms |
XML Injection |
3 |
93ms |
4 |
93ms |
4 |
95ms |
Code Injection LFI |
1 |
88ms |
4 |
87ms |
4 |
88ms |
Code Injection RFI |
1 |
89ms |
1 |
90ms |
1 |
90ms |
CSRF Injection |
3 |
85ms |
1 |
86ms |
4 |
86ms |
XSS Injection |
3 |
91ms |
4 |
90ms |
4 |
89ms |
Host Header Injection |
3 |
91ms |
4 |
90ms |
4 |
89ms |
OS Command Injection |
1 |
88ms |
4 |
87ms |
4 |
88ms |
Table
5
Broken
Authentication Cyber-Attack Experiment Result
Cyber-attack Scenario |
HBA |
Time |
WAF |
Time |
HBA and WAF |
Time |
Injection |
17 Point |
707ms |
26 Point |
709ms |
29 Point |
715ms |
Broken Auth |
20 Point |
180ms |
14 Point |
183ms |
24 Point |
279ms |
Total |
37 Point |
887ms |
40 Point |
892ms |
53 Point |
994ms |
Average |
18,5 Point |
443,5ms |
20 Point |
446ms |
26,5 Point |
497ms |
Injection |
17 Point |
707ms |
26 Point |
709ms |
29 Point |
715ms |
Broken Auth |
20 Point |
180ms |
14 Point |
183ms |
24Point |
279ms |
Total |
37 Point |
887ms |
40 Point |
892ms |
53 Point |
994ms |
Average |
18,5 Point |
443,5ms |
20 Point |
446ms |
26,5 Point |
497ms |
Table
6
Overall
Score Of The Web Application Security Point
Cyber-attack Scenario |
HBA |
Time |
WAF |
Time |
HBA and WAF |
Time |
|||||
Password / Information Not
Encrypted |
1 |
0 |
3 |
0 |
1 |
0 |
|||||
Sensitive Data Exposure |
1 |
0 |
4 |
0 |
1 |
0 |
|||||
Insecure Deserialization |
1 |
87 |
3 |
90 |
1 |
91 |
|||||
Security Misconfiguration |
1 |
0 |
1 |
0 |
1 |
0 |
|||||
Using Components with Known
Vulnerabilities |
1 |
88 |
3 |
90 |
4 |
92 |
|||||
Insufficient Logging and
Monitoring |
1 |
0 |
1 |
0 |
4 |
0 |
|||||
Broken Access Control |
1 |
0 |
4 |
0 |
1 |
0 |
|||||
Password / Information Not
Encrypted |
1 |
0 |
3 |
0 |
1 |
0 |
|||||
Table
7
Score
Of The First Web Application Without Any Security
Features
Cyber-attack Scenario |
Without Security Features |
Time (ms) |
SQL / Blind Injection |
1 Point |
87 |
XML Injection |
1 Point |
89 |
Code Injection LFI |
1 Point |
84 |
Code Injection RFI |
1 Point |
86 |
CSRF Injection |
1 Point |
83 |
XSS Injection |
1 Point |
89 |
Host Header Injection |
1 Point |
80 |
OS Command Injection |
1 Point |
85 |
Password / Information Not Encrypted |
1 Point |
0 |
Sensitive Data Exposure |
1 Point |
0 |
Insecure Deserialization |
1 Point |
87 |
Security Misconfiguration |
1 Point |
0 |
Using Components with Known Vulnerabilities |
1 Point |
88 |
Insufficient Logging and Monitoring |
1 Point |
0 |
Broken Access Control |
1 Point |
0 |
Injection |
8 Point |
68 |
Broken Auth |
8 Point |
175 |
Total |
16 Point |
858 |
Average |
8 Point |
429 |
The second web application
object is implemented with the Hardening Broken Authentication (HBA) method, 3
out of 8 injection types of cyber-attack scenarios were successfully launched
with the acquisition of 1 point, the cyber-attack scenario carried out are Code
Injection RFI, Code Injection LFI, and OS Command Injection, with HBA methods
there is no four-point acquisition for each cyber-attack scenarios. While in
Table 5 for the cyber-attack type of broken authentication, HBA methods
successfully secure 2 out of 8 cyber-attacks with four-point acquisition namely
Access Broken Control and Sensitive Data Exposure. The second web application
object has 443.5ms network access time with needed 14ms differentiation
compared to the first web application objects. The total score of the second
web application in both cyber-attack is 37 points with 20 points on broken
authentication cyber-attack type and 17 points on Injection cyber-attack type.
The third web application
object is implemented with WAF security features, the third web application is
able to secure 2 out of 8 cyber-attack injection types were successfully
launched with the methods acquisition point of 1 the cyber-attack namely CSRF
Injection and Code Injection RFI. However, the WAF security methods
successfully secure 6 out 8 cyber-attack scenarios with an acquisition point of
4 with a total point collected 26 Points it�s surprisingly higher than the two
web application objects above. As for broken auth cyber-attack type, the WAF
method suffers vulnerability with a total collected point is 14 where 6 out 8
cyber-attack scenarios successfully launch with security point acquisition of
1.
The average network access
is 2.5ms, but the overall score improves from 37 points to 40 points. the
fourth web application is implemented with concurrent use of hardening broken
authentication and web application firewall security features, this proposed
security method and features are able to improve the total security point
collected from 37 to 40 points to 53 points, the total security point of the
fourth web application is partly coming from 29 point with cyber-attack
injection type and 24 points from cyber-attack broken authentication type see
Table 6. These two-point collected are the highest compared to the first,
second, and third web applications, where the methods are able to secure 7 out
8 cyber-attack injection types with an acquisition point of 4. As for the
broken auth cyber-attack type, the methods are able to secure 6 out of 8 cyber-attacks
broken auth type.
Conclusion
The third web application
object is implemented with WAF security features, the third web application is
able to secure 2 out of 8 cyber-attack injection types were successfully
launched with the methods acquisition point of 1 the cyber-attack namely CSRF
Injection and Code Injection RFI. However, the WAF security methods
successfully secure 6 out 8 cyber-attack scenarios with an acquisition point of
4 with a total point collected 26 Points it�s surprisingly higher than the two
web application objects above. As for broken auth cyber-attack type, the WAF
method suffers vulnerability with a total collected point is 14 where 6 out 8
cyber-attack scenarios successfully launch with security point acquisition of
1. The average network access is 2.5ms, but the overall score improves from 37
points to 40 points. Current development, the experiment result proves that the
combination of web application firewall and hardening broken authentication
method are needed as standard to protect web application in backend system and frontend
system.
The authors would like to
thank you the Bina Nusantara University especially the BINUS Graduate Program �
Master of Computer Science Program for helping the authors in the process of
learning and explore the cyber security topics and National Police of Republic
Indonesia as my workplace to express idea and develop this research.
BIBLIOGRAPHY
Statista.com, �Global digital population as of January 2021,�
2021. https://www.statista.com/statistics/617136/digital-population-worldwide/
(accessed Oct. 23, 2021).
Datareportal.com, �Digital 2021: Indonesia,� 2021.
https://datareportal.com/reports/digital-2021-indonesia (accessed Oct. 23,
2021).
BSSN, �Rekap Serangan Siber,� 2020. https://bssn.go.id/rekap-serangan-siber-januari-april-2020/
(accessed Oct. 23, 2021).
L. Sun, H. Zhang, and C. Fang, �Data security governance in
the era of big data: status, challenges, and prospects,� Data Sci. Manag.,
vol. 2, pp. 41�44, Jun. 2021, doi: 10.1016/j.dsm.2021.06.001.
D. Wichers and J. Williams, �Owasp top-10 2017,� OWASP
Found., 2017.
Ibor and J. Obidinnu, �System Hardening Architecture for
Safer Access to Critical Business Data,� Niger. J. Technol., vol. 34, no.
4, p. 788, Oct. 2015, doi: 10.4314/njt.v34i4.17.
M. Aydos, �. Aldan, E. Coşkun, and A. Soydan, �Security
testing of web applications: a systematic mapping of the literature,� J.
King Saud Univ. Inf. Sci., 2021.
F. �. S�nmez, �Security qualitative metrics for open web
application security project compliance,� Procedia Comput. Sci., vol.
151, pp. 998�1003, 2019, doi: https://doi.org/10.1016/j.procs.2019.04.140.
Robinson, M. Akbar, and M. A. Fadhly Ridha, �SQL Injection
and Cross Site Scripting Prevention using OWASP ModSecurity Web Application
Firewall,� JOIV� Int. J. Informatics
Vis., vol. 2, no. 4, p. 286, Aug. 2018, doi: 10.30630/joiv.2.4.107.
M. A. Calles, �Authentication and Authorization,� in Serverless
Security, Berkeley, CA: Apress, 2020, pp. 229�256.
Sunardi, I. Riadi, and P. Ananda, �Vulnerability Analysis of
E-voting Application using Open Web Application Security Project (OWASP)
Framework,� Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 11, 2019, doi:
10.14569/IJACSA.2019.0101118.
H. Poston, �Mapping the OWASP Top Ten to Blockchain,� Procedia
Comput. Sci., vol. 177, pp. 613�617, 2020, doi:
10.1016/j.procs.2020.10.087.
J. D�Hoinne, A. Hils, and C. Neiva, �Magic quadrant for web
application firewalls,� Technical report, Gartner, Stamford, CT, 2014.
Anderies, B. A. Jabar, R. Yunanda, and A. A. S. Gunawan,
.�The development of a smart door decision system, based on pir sensor,
embedded face recognition and server request using ttgo esp 32,� ICIC
Express Lett. Part B Appl., vol. 12, no. 10, pp. 965�970, 2021, doi: 10.24507/icicelb.12.10.965.
N. M. Thang, �Improving efficiency of web application
firewall to detect code injection attacks with random forest method and
analysis attributes HTTP request,� Program. Comput. Softw., vol. 46, no.
5, pp. 351�361, 2020.
Appelt, C. D. Nguyen, and L. Briand, �Behind an application
firewall, are we safe from SQL injection attacks?,� 2015, doi:
10.1109/ICST.2015.7102581.
Appelt, C. D. Nguyen, A. Panichella, and L. C. Briand, �A
Machine-Learning-Driven Evolutionary Approach for Testing Web Application
Firewalls,� IEEE Trans. Reliab., vol. 67, no. 3, pp. 733�757, 2018, doi:
10.1109/TR.2018.2805763.
M. Ceccato, C. D. Nguyen, D. Appelt, and L. C. Briand,
�SOFIA: An automated security oracle for black-box testing of SQL-injection
vulnerabilities,� in 2016 31st IEEE/ACM International Conference on
Automated Software Engineering (ASE), 2016, pp. 167�177.
D. Kar, S. Panigrahi, and S. Sundararajan, �SQLiGoT: Detecting
SQL injection attacks using graph of tokens and SVM,� Comput. Secur.,
vol. 60, pp. 206�225, 2016.
S. K. Choi, C.-H. Yang, and J. Kwak, �System Hardening and
Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities
and Threats,� KSII Trans. Internet Inf. Syst., vol. 12, no. 2, pp.
906�918, Feb. 2018, doi: 10.3837/tiis.2018.02.022.
J. Saleem and M. Hammoudeh, �Defense methods against social
engineering attacks,� in Computer and network security essentials,
Springer, 2018, pp. 603�618.
H. Cavusoglu, B. Mishra, and S. Raghunathan, �A model for
evaluating IT security investments,� Commun. ACM, vol. 47, no. 7, pp.
87�92, 2004.
Copyright
holder: Dimas Charis Suryo
Nugroho, Muhammad Fadlan Hidayat,
Benfano Soewito (2022) |
First
publication right: Syntax
Literate: Jurnal Ilmiah
Indonesia |
This article is
licensed under: |