IMPLIKASI R-WALL UNTUK PENDETEKSIAN DAN PENGAMANAN SERANGAN SIBER PADA SERVER
(STUDI KASUS PADA SERVER INFORMATION COMMUNICATION & TECHNOLOGY AKADEMI ILMU KOMPUTER TERNATE)
Abstract
Security is inversely proportional to comfort, the more comfortable the application of technology will have an impact on the security side of the system. The Server is an important infrastructure in managing data. It is important to prevent attacks on Servers. Firewall implementation can minimize attacks that harm the Server. One of them is by implementing an Intrusion Detection System (IDS) application such as Snort which has the ability to detect attacks that occur on Server systems. In this study, the authors developed a system called R-Wall. The implementation of R-Wall aims to be able to monitor and secure Servers against several attack methods, including port scanning, DDoS ping of death SSH brute force, and FTP brute force type. The results of this implementation are able to provide attack notifications sent via Telegram robot with a total of 247 DDoS pings of deadly attacks, 8 port scanning attacks, 247 FTP brute force attacks, and 208 SSH brute force attacks. R-Wall is also able to restrict access to attackers.
Downloads
References
Tashia, “Keamanan Jaringan Internet dan Firewall,” Direktorat Jenderal Aplikasi Informatika, 2017.
S. Andrews, “Statistical software for teaching: relevant, appropiate and affordable,” 2010. [Online]. Available: http://www.mcafee.com/uk/resources/reports/rp-quarterly-threats-nov-2015.pdf.
Abdurrahman, Soni, and A. Hafid, “Keyword : Proxmox , Virtualization , Resources , Server , Operating System Sistem Operasi,” vol. 9, no. 2, pp. 369–376, 2019.
O. Suryana, “Server dan Web Server,” no. August, pp. 14–23, 2018.
R. Jumardi, “Kajian Kebijakan Keamanan Sistem Informasi Sebagai Bentuk Perlindungan Kerahasiaan Pribadi Karyawan Perusahaan XYZ,” Kajian Kebijakan Keamanan Sistem Informasi Sebagai Bentuk Perlindungan Kerahasiaan Pribadi Karyawan Perusahaan XYZ, p. 6, 2016.
D. Howard, An Analysis of security incidents on the internet. 1997.
H. A. Erwin Gunadhi, “KEAMANAN KOMUNIKASI DATA SMS PADA ANDROID DENGAN MENGGUNAKAN APLIKASI KRIPTOGRAPI ADVANCE ENCRYPTION STANDARD (AES),” STT-Garut, vol. 12, no. 2, pp. 296–300, 2015, [Online]. Available: http://library1.nida.ac.th/termpaper6/sd/2554/19755.pdf.
K. Anom and B. Utama, “Keamanan Komputer & Sistem Informasi.” .
Y. P. PHS, “KEAMANAN SISTEM INFORMASI,” STMIK El Rahma – Yogyakarta, pp. 1–14, 2016.
D. N. Awangga, H. Sajati, and Y. Astuti, “Pemanfaatan Intrusion Detection System (Ids) Sebagai Otomatisasi Konfigurasi Firewall Berbasis Web Service Menggunakan Arsitektur Representational State Transfer (Rest),” Compiler, vol. 2, no. 2, pp. 79–88, 2013, doi: 10.28989/compiler.v2i2.49.
M. Ulfa, J. Jenderal, A. Yani, and N. Palembang, “Di Jaringan Internet Universitas Bina Darma,” no. 12, pp. 105–118.
B. Sudradjat, “Sistem Pendeteksian dan Pencegahan Penyusup Pada Jaringan Komputer Dengan Menggunakan Snort dan Firewall,” JISAMAR (Journal Inf. Syst. Applied, Manag. Account. Res., vol. 1, no. 1, pp. 10–24, 2017.
G. Sondakh, M. E. I. Najoan, and A. S. Lumenta, “Perancangan Filtering Firewall Menggunakan Iptables Di Jaringan Pusat Teknologi Informasi Unsrat,” J. Tek. Elektro dan Komput., vol. 3, no. 4, pp. 19–27, 2018.
G. W. Setiawan, “Pengujian Perangkat Lunak Menggunakan Metode Black Box Studi Kasus Exelsa Universitas Sanata Dharma,” p. 286, 2011.
K. Joesyiana, “Penerapan Metode Pembelajaran Observasi Lapangan Pada Mata Kuliah Manajemen Operasional,” J. Chem. Inf. Model., vol. 53, no. 9, pp. 1689–1699, 2019.
Copyright (c) 2021 J-Icon : Jurnal Komputer dan Informatika
This work is licensed under a Creative Commons Attribution 4.0 International License.
The author submitting the manuscript must understand and agree that if accepted for publication, authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work’s authorship and initial publication in this journal.