Optimization of Computer Network Security System Against Malware Attacks Using Firewall Filtering with Port Blocking Method
DOI:
https://doi.org/10.55123/jomlai.v1i2.816Keywords:
Security System, Computer Network, Malware, Firewall, Blocking PortAbstract
Computer networks have an important role in teaching and learning activities in schools, but there are also negative impacts. One of them is prone to attack by malware such as viruses and so on, as is the case at the Satria Mandiri Private Vocational School in Bandar Huluan. So far, the computer network at the school is very easy to attack by malware. The negative impact of malware on the network is bandwidth traffic overload, causing bandwidth constraints to run out quickly or data transfer traffic to be slower than usual. The reliability of a network can be determined from the security factor of the network itself. Some routers have firewall settings that are quite capable but need to be managed more specifically based on the needs of the 1500 Kbps network scale and available bandwidth. Creating good rules in the firewall will make it easier to filter network traffic and bandwidth so that it can create security and convenience for network and bandwidth users. Port blocking allows users or users to interact with the proxy server on the local network, where the connected user has gone through verification that can filter malware activity with embedded rules
References
W. F. Fatoni et al., “Jurnal Mahasiswa Ilmu Komputer ( JMIK ) DENGAN METODE PORT KNOCKING PADA Jurnal Mahasiswa Ilmu Komputer ( JMIK ),” vol. 03, no. 01, 2022.
Rahmat, R. Wiji Wahyuningrum, E. Haerullah, and Sodikin, “Analisis Monitoring Sistem Jaringan Komputer Menggunakan Aplikasi Spiceworks,” Jurnal PROSISKO, vol. 9, no. 1, pp. 44–52, 2022.
A. Wanto, J. T. Hardinata, H. F. Silaban, and W. Saputra, “Analisis Dan Pemodelan Posisi Access Point Pada Jaringan Wi-Fi Menggunakan Metode Simulate Annealing,” Jurnal Sains Komputer dan Informatika (JSAKTI), vol. 1, no. 1, pp. 134–143, 2017.
A. Pariddudin and M. Syawaludin, “Penerapan Algoritma Rivest Shamir Adleman untuk Meningkatkan Keamanan Virtual Private Network,” Teknois : Jurnal Ilmiah Teknologi Informasi dan Sains, vol. 11, no. 2, pp. 73–84, 2021.
Allwine and A. O. D. Aritonang, “Keamanan Jaringan Terpusat Mengunakan Intrusion Detection System (IDS) di STMIK Methodist Binjai,” Jurnal Armada Informatika, vol. 1, no. 2, pp. 1–11, 2020.
P. Riska, P. Sugiartawan, and I. Wiratama, “Sistem Keamanan Jaringan Komputer Dan Data Dengan Menggunakan Metode Port Knocking,” Jurnal Sistem Informasi dan Komputer Terapan Indonesia (JSIKTI), vol. 1, no. 2, pp. 53–64, 2018.
M. R. Lubis et al., Pengenalan Teknologi Informasi, 1st ed. Medan: Yayasan Kita Menulis, 2020.
M. Amin et al., Teknologi Jaringan Nirkabel, 1st ed. Medan: Yayasan Kita Menulis, 2022.
I. Y. Sari et al., Keamanan Data dan Informasi, 1st ed. Medan: Yayasan Kita Menulis, 2020.
Sartomo and W. Sulistyo, “Model Keamanan Jaringan Menggunakan Firewall Port Blocking,” Krea-TIF: Jurnal Teknik Informatika, vol. 10, no. 1, pp. 10–18, 2022.
R. Rizal, R. Ruuhwan, and K. A. Nugraha, “Implementasi Keamanan Jaringan Menggunakan Metode Port Blocking dan Port Knocking Pada Mikrotik RB-941,” Jurnal ICT : Information Communication & Technology, vol. 19, no. 1, pp. 1–8, 2020.
T. Brades and I. Irwansyah, “Pemanfaatan Metode Port Knocking dan Blocking Untuk Kamanan Jaringan BPKAD Provinsi Sumsel,” Prosiding Semhavok, vol. 3, no. 2, pp. 99–107, 2022.
K. Al Fikri and Djuniadi, “Keamanan Jaringan Menggunakan Switch Port Security,” InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan, vol. 5, no. 2, pp. 302–307, 2021.
D. A. Juhana, Soecipto, and A. Amaliyah, “Perancangan Sistem Keamanan Jaringan Menggunakan Mikrotik Router Pada Management Bandwidth di CV . Algi Pin Bandung,” Telematika, vol. 3, no. 1, pp. 29–44, 2021.
M. Ryansyah and M. S. Maulana, “Malware Security Menggunakan Filtering Firewall Dengan Metode Port Blocking Pada Mikrotik RB 1100AHx2,” Jurnal Sistem dan Teknologi Informasi (JUSTIN), vol. 6, no. 3, pp. 116–120, 2018.
P. Akbar, “Metode Block Access Serta Memanejemen Bandwith Pada MikroTik RB951Ui dan MikroTik RB 941-2nD di Caffe Ready Jombang Jawa Timur,” Jurnal Teknologi Dan Sistem Informasi Bisnis, vol. 4, no. 1, pp. 398–406, 2022.
I. Marzuki, “Perancangan dan Implementasi Sistem Keamanan Jaringan Komputer Menggunakan Metode Port Knocking Pada Sistem Operasi Linux,” Jurnal Teknologi Informasi Indonesia (JTII), vol. 2, no. 2, pp. 18–24, 2019.
M. S. Maulana and M. Ryansyah, “Malware Security Menggunakan Filtering Firewall Dengan Metode Port Blocking Pada Mikrotik RB 1100AHx2,” Jurnal Sistem dan Teknologi Informasi (JUSTIN), vol. 6, no. 3, p. 112, 2018.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Andri Andri, Indra Gunawan, Ika Okta Kirana

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright (c) 2022 The authors. Published by Yayasan Literasi Indonesia
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License
The author(s) whose article is published in the JOMLAI journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JOMLAI, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:their article is original, written by the mentioned author(s),
- has never been published before,
- does not contain statements that violate the law, and
- does not violate the rights of others, is subject to copyright held exclusively by the author(s), and is free from the rights of third parties, and that the necessary written permission to quote from other sources has been obtained by the author(s).
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
- Copyright and other proprietary rights related to the article, such as patents,
- The right to use the substance of the article in its own future works, including lectures and books,
- The right to reproduce the article for its own purposes,
- The right to archive all versions of the article in any repository, and
- The right to enter into separate additional contractual arrangements for the non-exclusive distribution of published versions of the article (for example, posting them to institutional repositories or publishing them in a book), acknowledging its initial publication in this journal (JOMLAI: Journal of Machine Learning and Artificial Intelligence).
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JOMLAI will not be held responsible for anything that may arise because of the writer's internal dispute. JOMLAI will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets, and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JOMLAI allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JOMLAI to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published



















