Main Article Content
Security is inversely proportional to comfort, the more comfortable the application of technology will have an impact on the security side of the system. The Server is an important infrastructure in managing data. It is important to prevent attacks on Servers. Firewall implementation can minimize attacks that harm the Server. One of them is by implementing an Intrusion Detection System (IDS) application such as Snort which has the ability to detect attacks that occur on Server systems. In this study, the authors developed a system called R-Wall. The implementation of R-Wall aims to be able to monitor and secure Servers against several attack methods, including port scanning, DDoS ping of death SSH brute force, and FTP brute force type. The results of this implementation are able to provide attack notifications sent via Telegram robot with a total of 247 DDoS pings of deadly attacks, 8 port scanning attacks, 247 FTP brute force attacks, and 208 SSH brute force attacks. R-Wall is also able to restrict access to attackers.
This work is licensed under a Creative Commons Attribution 4.0 International License.
The author who submits the manuscript must understand and agree that if accepted for publication, the copyright of the article belongs to JICON and Nusa Cendana University as the journal publisher. Copyright (copyright) includes the exclusive right to reproduce and provide articles in all forms and media, including reprints, photographs, microfilm and any other similar reproductions, as well as translations. The author has the right for the following:
1. reproduce all or part of published material for the author's own use as classroom teaching materials or oral presentation materials in various forums;
2. reuse part or all of the material as compilation material for the author's written work;
2. make copies of published material for distribution within the institution where the author works.
JICON and Nusa Cendana University and Editors make every effort to ensure that no data, opinion or statement is wrong or misleading to be published in this journal. The content of articles published on JICON is the sole and exclusive responsibility of their respective authors.
 S. Andrews, “Statistical software for teaching: relevant, appropiate and affordable,” 2010. [Online]. Available: http://www.mcafee.com/uk/resources/reports/rp-quarterly-threats-nov-2015.pdf.
 Abdurrahman, Soni, and A. Hafid, “Keyword : Proxmox , Virtualization , Resources , Server , Operating System Sistem Operasi,” vol. 9, no. 2, pp. 369–376, 2019.
 O. Suryana, “Server dan Web Server,” no. August, pp. 14–23, 2018.
 R. Jumardi, “Kajian Kebijakan Keamanan Sistem Informasi Sebagai Bentuk Perlindungan Kerahasiaan Pribadi Karyawan Perusahaan XYZ,” Kajian Kebijakan Keamanan Sistem Informasi Sebagai Bentuk Perlindungan Kerahasiaan Pribadi Karyawan Perusahaan XYZ, p. 6, 2016.
 D. Howard, An Analysis of security incidents on the internet. 1997.
 H. A. Erwin Gunadhi, “KEAMANAN KOMUNIKASI DATA SMS PADA ANDROID DENGAN MENGGUNAKAN APLIKASI KRIPTOGRAPI ADVANCE ENCRYPTION STANDARD (AES),” STT-Garut, vol. 12, no. 2, pp. 296–300, 2015, [Online]. Available: http://library1.nida.ac.th/termpaper6/sd/2554/19755.pdf.
 K. Anom and B. Utama, “Keamanan Komputer & Sistem Informasi.” .
 Y. P. PHS, “KEAMANAN SISTEM INFORMASI,” STMIK El Rahma – Yogyakarta, pp. 1–14, 2016.
 D. N. Awangga, H. Sajati, and Y. Astuti, “Pemanfaatan Intrusion Detection System (Ids) Sebagai Otomatisasi Konfigurasi Firewall Berbasis Web Service Menggunakan Arsitektur Representational State Transfer (Rest),” Compiler, vol. 2, no. 2, pp. 79–88, 2013, doi: 10.28989/compiler.v2i2.49.
 M. Ulfa, J. Jenderal, A. Yani, and N. Palembang, “Di Jaringan Internet Universitas Bina Darma,” no. 12, pp. 105–118.
 B. Sudradjat, “Sistem Pendeteksian dan Pencegahan Penyusup Pada Jaringan Komputer Dengan Menggunakan Snort dan Firewall,” JISAMAR (Journal Inf. Syst. Applied, Manag. Account. Res., vol. 1, no. 1, pp. 10–24, 2017.
 G. Sondakh, M. E. I. Najoan, and A. S. Lumenta, “Perancangan Filtering Firewall Menggunakan Iptables Di Jaringan Pusat Teknologi Informasi Unsrat,” J. Tek. Elektro dan Komput., vol. 3, no. 4, pp. 19–27, 2018.
 G. W. Setiawan, “Pengujian Perangkat Lunak Menggunakan Metode Black Box Studi Kasus Exelsa Universitas Sanata Dharma,” p. 286, 2011.
 K. Joesyiana, “Penerapan Metode Pembelajaran Observasi Lapangan Pada Mata Kuliah Manajemen Operasional,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, 2019.