Optimization of Computer Network Security System Against Malware Attacks Using Firewall Filtering with Port Blocking Method

Authors

  • Andri Andri STIKOM Tunas Bangsa, Pematangsiantar, Indonesia
  • Indra Gunawan STIKOM Tunas Bangsa, Pematangsiantar, Indonesia
  • Ika Okta Kirana STIKOM Tunas Bangsa, Pematangsiantar, Indonesia

DOI:

https://doi.org/10.55123/jomlai.v1i2.816

Keywords:

Security System, Computer Network, Malware, Firewall, Blocking Port

Abstract

Computer networks have an important role in teaching and learning activities in schools, but there are also negative impacts. One of them is prone to attack by malware such as viruses and so on, as is the case at the Satria Mandiri Private Vocational School in Bandar Huluan. So far, the computer network at the school is very easy to attack by malware. The negative impact of malware on the network is bandwidth traffic overload, causing bandwidth constraints to run out quickly or data transfer traffic to be slower than usual. The reliability of a network can be determined from the security factor of the network itself. Some routers have firewall settings that are quite capable but need to be managed more specifically based on the needs of the 1500 Kbps network scale and available bandwidth. Creating good rules in the firewall will make it easier to filter network traffic and bandwidth so that it can create security and convenience for network and bandwidth users. Port blocking allows users or users to interact with the proxy server on the local network, where the connected user has gone through verification that can filter malware activity with embedded rules

References

W. F. Fatoni et al., “Jurnal Mahasiswa Ilmu Komputer ( JMIK ) DENGAN METODE PORT KNOCKING PADA Jurnal Mahasiswa Ilmu Komputer ( JMIK ),” vol. 03, no. 01, 2022.

Rahmat, R. Wiji Wahyuningrum, E. Haerullah, and Sodikin, “Analisis Monitoring Sistem Jaringan Komputer Menggunakan Aplikasi Spiceworks,” Jurnal PROSISKO, vol. 9, no. 1, pp. 44–52, 2022.

A. Wanto, J. T. Hardinata, H. F. Silaban, and W. Saputra, “Analisis Dan Pemodelan Posisi Access Point Pada Jaringan Wi-Fi Menggunakan Metode Simulate Annealing,” Jurnal Sains Komputer dan Informatika (JSAKTI), vol. 1, no. 1, pp. 134–143, 2017.

A. Pariddudin and M. Syawaludin, “Penerapan Algoritma Rivest Shamir Adleman untuk Meningkatkan Keamanan Virtual Private Network,” Teknois : Jurnal Ilmiah Teknologi Informasi dan Sains, vol. 11, no. 2, pp. 73–84, 2021.

Allwine and A. O. D. Aritonang, “Keamanan Jaringan Terpusat Mengunakan Intrusion Detection System (IDS) di STMIK Methodist Binjai,” Jurnal Armada Informatika, vol. 1, no. 2, pp. 1–11, 2020.

P. Riska, P. Sugiartawan, and I. Wiratama, “Sistem Keamanan Jaringan Komputer Dan Data Dengan Menggunakan Metode Port Knocking,” Jurnal Sistem Informasi dan Komputer Terapan Indonesia (JSIKTI), vol. 1, no. 2, pp. 53–64, 2018.

M. R. Lubis et al., Pengenalan Teknologi Informasi, 1st ed. Medan: Yayasan Kita Menulis, 2020.

M. Amin et al., Teknologi Jaringan Nirkabel, 1st ed. Medan: Yayasan Kita Menulis, 2022.

I. Y. Sari et al., Keamanan Data dan Informasi, 1st ed. Medan: Yayasan Kita Menulis, 2020.

Sartomo and W. Sulistyo, “Model Keamanan Jaringan Menggunakan Firewall Port Blocking,” Krea-TIF: Jurnal Teknik Informatika, vol. 10, no. 1, pp. 10–18, 2022.

R. Rizal, R. Ruuhwan, and K. A. Nugraha, “Implementasi Keamanan Jaringan Menggunakan Metode Port Blocking dan Port Knocking Pada Mikrotik RB-941,” Jurnal ICT : Information Communication & Technology, vol. 19, no. 1, pp. 1–8, 2020.

T. Brades and I. Irwansyah, “Pemanfaatan Metode Port Knocking dan Blocking Untuk Kamanan Jaringan BPKAD Provinsi Sumsel,” Prosiding Semhavok, vol. 3, no. 2, pp. 99–107, 2022.

K. Al Fikri and Djuniadi, “Keamanan Jaringan Menggunakan Switch Port Security,” InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan, vol. 5, no. 2, pp. 302–307, 2021.

D. A. Juhana, Soecipto, and A. Amaliyah, “Perancangan Sistem Keamanan Jaringan Menggunakan Mikrotik Router Pada Management Bandwidth di CV . Algi Pin Bandung,” Telematika, vol. 3, no. 1, pp. 29–44, 2021.

M. Ryansyah and M. S. Maulana, “Malware Security Menggunakan Filtering Firewall Dengan Metode Port Blocking Pada Mikrotik RB 1100AHx2,” Jurnal Sistem dan Teknologi Informasi (JUSTIN), vol. 6, no. 3, pp. 116–120, 2018.

P. Akbar, “Metode Block Access Serta Memanejemen Bandwith Pada MikroTik RB951Ui dan MikroTik RB 941-2nD di Caffe Ready Jombang Jawa Timur,” Jurnal Teknologi Dan Sistem Informasi Bisnis, vol. 4, no. 1, pp. 398–406, 2022.

I. Marzuki, “Perancangan dan Implementasi Sistem Keamanan Jaringan Komputer Menggunakan Metode Port Knocking Pada Sistem Operasi Linux,” Jurnal Teknologi Informasi Indonesia (JTII), vol. 2, no. 2, pp. 18–24, 2019.

M. S. Maulana and M. Ryansyah, “Malware Security Menggunakan Filtering Firewall Dengan Metode Port Blocking Pada Mikrotik RB 1100AHx2,” Jurnal Sistem dan Teknologi Informasi (JUSTIN), vol. 6, no. 3, p. 112, 2018.

Downloads

Published

2022-08-16

How to Cite

Andri, A., Gunawan, I., & Kirana, I. O. (2022). Optimization of Computer Network Security System Against Malware Attacks Using Firewall Filtering with Port Blocking Method. JOMLAI: Journal of Machine Learning and Artificial Intelligence, 1(2), 133–142. https://doi.org/10.55123/jomlai.v1i2.816

Issue

Section

Articles