IMPLIKASI R-WALL UNTUK PENDETEKSIAN DAN PENGAMANAN SERANGAN SIBER PADA SERVER

(STUDI KASUS PADA SERVER INFORMATION COMMUNICATION & TECHNOLOGY AKADEMI ILMU KOMPUTER TERNATE)

  • Abdul Djalil Djayali(1*)
    Akademi Ilmu Komputer
  • Rifaldi Nurdin(2)
    Akademi Ilmu Komputer
  • Rachmat Saleh Sukur(3)
    Akademi Ilmu Komputer
  • (*) Corresponding Author
Keywords: Cybercrime, Monitoring, System Security, Server, R-Wall

Abstract

Security is inversely proportional to comfort, the more comfortable the application of technology will have an impact on the security side of the system. The Server is an important infrastructure in managing data. It is important to prevent attacks on Servers. Firewall implementation can minimize attacks that harm the Server. One of them is by implementing an Intrusion Detection System (IDS) application such as Snort which has the ability to detect attacks that occur on Server systems. In this study, the authors developed a system called R-Wall. The implementation of R-Wall aims to be able to monitor and secure Servers against several attack methods, including port scanning, DDoS ping of death SSH brute force, and FTP brute force type. The results of this implementation are able to provide attack notifications sent via Telegram robot with a total of 247 DDoS pings of deadly attacks, 8 port scanning attacks, 247 FTP brute force attacks, and 208 SSH brute force attacks. R-Wall is also able to restrict access to attackers.

Downloads

Download data is not yet available.

References

Tashia, “Keamanan Jaringan Internet dan Firewall,” Direktorat Jenderal Aplikasi Informatika, 2017.

S. Andrews, “Statistical software for teaching: relevant, appropiate and affordable,” 2010. [Online]. Available: http://www.mcafee.com/uk/resources/reports/rp-quarterly-threats-nov-2015.pdf.

Abdurrahman, Soni, and A. Hafid, “Keyword : Proxmox , Virtualization , Resources , Server , Operating System Sistem Operasi,” vol. 9, no. 2, pp. 369–376, 2019.

O. Suryana, “Server dan Web Server,” no. August, pp. 14–23, 2018.

R. Jumardi, “Kajian Kebijakan Keamanan Sistem Informasi Sebagai Bentuk Perlindungan Kerahasiaan Pribadi Karyawan Perusahaan XYZ,” Kajian Kebijakan Keamanan Sistem Informasi Sebagai Bentuk Perlindungan Kerahasiaan Pribadi Karyawan Perusahaan XYZ, p. 6, 2016.

D. Howard, An Analysis of security incidents on the internet. 1997.

H. A. Erwin Gunadhi, “KEAMANAN KOMUNIKASI DATA SMS PADA ANDROID DENGAN MENGGUNAKAN APLIKASI KRIPTOGRAPI ADVANCE ENCRYPTION STANDARD (AES),” STT-Garut, vol. 12, no. 2, pp. 296–300, 2015, [Online]. Available: http://library1.nida.ac.th/termpaper6/sd/2554/19755.pdf.

K. Anom and B. Utama, “Keamanan Komputer & Sistem Informasi.” .

Y. P. PHS, “KEAMANAN SISTEM INFORMASI,” STMIK El Rahma – Yogyakarta, pp. 1–14, 2016.

D. N. Awangga, H. Sajati, and Y. Astuti, “Pemanfaatan Intrusion Detection System (Ids) Sebagai Otomatisasi Konfigurasi Firewall Berbasis Web Service Menggunakan Arsitektur Representational State Transfer (Rest),” Compiler, vol. 2, no. 2, pp. 79–88, 2013, doi: 10.28989/compiler.v2i2.49.

M. Ulfa, J. Jenderal, A. Yani, and N. Palembang, “Di Jaringan Internet Universitas Bina Darma,” no. 12, pp. 105–118.

B. Sudradjat, “Sistem Pendeteksian dan Pencegahan Penyusup Pada Jaringan Komputer Dengan Menggunakan Snort dan Firewall,” JISAMAR (Journal Inf. Syst. Applied, Manag. Account. Res., vol. 1, no. 1, pp. 10–24, 2017.

G. Sondakh, M. E. I. Najoan, and A. S. Lumenta, “Perancangan Filtering Firewall Menggunakan Iptables Di Jaringan Pusat Teknologi Informasi Unsrat,” J. Tek. Elektro dan Komput., vol. 3, no. 4, pp. 19–27, 2018.

G. W. Setiawan, “Pengujian Perangkat Lunak Menggunakan Metode Black Box Studi Kasus Exelsa Universitas Sanata Dharma,” p. 286, 2011.

K. Joesyiana, “Penerapan Metode Pembelajaran Observasi Lapangan Pada Mata Kuliah Manajemen Operasional,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, 2019.

PlumX Metrics

Published
2021-03-10
How to Cite
[1]
A. Djayali, R. Nurdin, and R. Sukur, “IMPLIKASI R-WALL UNTUK PENDETEKSIAN DAN PENGAMANAN SERANGAN SIBER PADA SERVER”, jicon, vol. 9, no. 1, pp. 45-55, Mar. 2021.
Section
Articles

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.