Analisis Keamanan Jaringan Menggunakan Metode Security Policy Development Life Cycle (SPDLC)


Authors

  • Yunanri W Universitas Teknologi Sumbawa, Sumbawa, Indonesia
  • Yuliadi Yuliadi Universitas Teknologi Sumbawa, Sumbawa, Indonesia
  • Shinta Esabella Universitas Teknologi Sumbawa, Sumbawa, Indonesia
  • Yasinta Bella Fitriana Universitas Muhammadiyah Papua, Jayapura, Indonesia

DOI:

https://doi.org/10.30865/klik.v4i1.1157

Keywords:

Analysis; Security; Firewall; Mikrotik; SPDLC

Abstract

Security is a system for carrying out prevention on a network that can be done using various methods, such as firewalls, port scanning, and DDoS. A firewall is a security system that can open or close certain port access through the firewall on the router according to the role that is built. One of the network security methods applied to Mikrotik Router OS is Port Knocking, which opens or closes certain port access through the firewall on the router according to the role that is built. However, a common problem that is often experienced in the provision of internet services such as the security network of the Tapangpass Cafe network is the problem of access rights. Several problems are encountered such as the need for internet in network security, so there is concern about hacking on the proxy network, therefore researchers will conduct an analysis on network security at Tangpass Cafe. Using the Security policy development life cycle method, then the results of this analysis researchers apply firewall network security from port scanning and denial of service attacks. The test results on the Tapangpass Café Mikrotik network are vulnerable to attack gaps, so security is needed on the firewall rules, Secure Routerboard RB941-2nD Settings, Periodic testing on the network used, and Upgrade the Operating System on Mikrotik

Downloads

Download data is not yet available.

References

R. Umar and A. P. Marsaid, “Analisis Keamanan Jaringan LAN Terhadap Kerentanan Jaringan Ancaman DDoS Menggunakan Metode Penetration Testing,” vol. 10, no. 1, pp. 317–329, 2023, doi: 10.30865/jurikom.v10i1.5835.

C. D. Berliana, T. A. Saputra, and I. Gunawan, “Analisis Serangan dan Keamanan pada Denial of Service (DOS): Sebuah Review Sistematik,” JIIFKOM (Jurnal Ilm. Inform. Komputer) STTR Cepu, vol. 1, no. 2, pp. 33–38, 2022, [Online]. Available: https://www.sttrcepu.ac.id/jurnal/index.php/jiifkom/article/view/229/140.

M. A. Ridho and M. Arman, “Analisis Serangan DDoS Menggunakan Metode Jaringan Saraf Tiruan,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 3, pp. 373–379, 2020, doi: 10.32736/sisfokom.v9i3.945.

I. Riadi, A. Yudhana, and Y. W, “Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment,” J. Teknol. Inf. dan Ilmu Komput., vol. 7, no. 4, p. 853, 2020, doi: 10.25126/jtiik.2020701928.

Yunanri. W and Yasinta Bella Fitriana, “Analisis Network Security Komputer Tingkat Desa Menggunakan Metode Security Policy Development Life Cycle (SPDLC),” J. Tek. Juara Aktif Glob. Optimis, vol. 1, no. 2, pp. 11–21, 2021, doi: 10.53620/jtg.v1i2.28.

M. Jufri and H. Heryanto, “Peningkatan Keamanan Jaringan Wireless Dengan Menerapkan Security Policy Pada Firewall,” JOISIE (Journal Inf. Syst. Informatics Eng., vol. 5, no. 2, pp. 98–108, 2021, doi: 10.35145/joisie.v5i2.1759.

Y. W, R. Anto, D. Teguh Yuwono, and Y. Yuliadi, “Deteksi Serangan Vulnerability Pada Open Jurnal System Menggunakan Metode Black-Box,” J. Inform. dan Rekayasa Elektron., vol. 4, no. 1, pp. 68–77, 2021, doi: 10.36595/jire.v4i1.365.

R. Yasuda and G. J. Augustine, “Teknologi informasi dan Komunikasi sebagai Media Pembelajaran,” Brain Cell Biol., vol. 36, no. 1–4, pp. 1–2, 2008, doi: 10.1007/s11068-008-9037-4.

T. H. Damayanti and I. R. Hikmah, “Network Forensic Serangan DoS pada Jaringan Cloud berdasarkan Generic Framework for Network Forensics (GFNF),” Edumatic J. Pendidik. Inform., vol. 6, no. 2, pp. 334–343, 2022, doi: 10.29408/edumatic.v6i2.6466.

F. Antony and R. Gustriansyah, “Deteksi Serangan Denial of Service pada Internet of Things Menggunakan Finite-State Automata,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., vol. 21, no. 1, pp. 43–52, 2021, doi: 10.30812/matrik.v21i1.1078.

J. Hu et al., “A memory-related vulnerability detection approach based on vulnerability features,” Tsinghua Sci. Technol., vol. 25, no. 5, pp. 604–613, 2020, doi: 10.26599/TST.2019.9010068.

D. Pasha, A. thyo Priandika, and Y. Indonesian, “Analisis Tata Kelola It Dengan Domain Dss Pada Instansi Xyz Menggunakan Cobit 5,” J. Ilm. Infrastruktur Teknol. Inf., vol. 1, no. 1, pp. 7–12, 2020, doi: 10.33365/jiiti.v1i1.268.

A. Ranitania and A. Fahmi, “Analisis Tata Kelola Proses Layanan Keamanan Kegiatan E-Procurement Pada Lpse Provinsi Jawa Tengah Berdasarkan Kerangka Kerja COBIT 5,” pp. 1–7, 2015.

A. Schröter, N. Bettenburg, and R. Premraj, “Do stack traces help developers fix bugs?,” Proc. - Int. Conf. Softw. Eng., pp. 118–121, 2010, doi: 10.1109/MSR.2010.5463280.

M. Alenezi, A. Agrawal, R. Kumar, and R. A. Khan, “Evaluating Performance of Web Application Security through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective,” IEEE Access, vol. 8, pp. 25543–25556, 2020, doi: 10.1109/ACCESS.2020.2970784.

R. Hermawan, “Analisis Konsep Dan Cara Kerja Serangan Komputer Distributed Denial of Service ( Ddos ),” Anal. Konsep Dan Cara Kerja Serangan Komput. Distrib. Denial Serv., vol. 5, no. 1, pp. 1–14, 2013.

M. A. Ridho and M. Arman, “Analisis Serangan DDoS Menggunakan Metode Jaringan Saraf Tiruan,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 3, pp. 373–379, 2020, doi: 10.32736/sisfokom.v9i3.945.

J. D. Santoso, “Keamanan Jaringan Nirkabel Menggunakan Wireless Intrusion Detection System,” Infos, vol. 1, no. 3, pp. 44–50, 2019.

T. Mahjabin, Y. Xiao, T. Li, and C. L. P. Chen, “Load Distributed and Benign-Bot Mitigation Methods for IoT DNS Flood Attacks,” IEEE Internet Things J., vol. 7, no. 2, pp. 986–1000, 2020, doi: 10.1109/JIOT.2019.2947659.

A. Alzahrani, A. Alqazzaz, N. Almashfi, H. Fu, and Y. Zhu, “Web Application Security Tools Analysis,” Stud. Media Commun., vol. 5, no. 2, p. 118, 2017, doi: 10.11114/smc.v5i2.2663.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Analisis Keamanan Jaringan Menggunakan Metode Security Policy Development Life Cycle (SPDLC)

ARTICLE HISTORY


Published: 2023-08-31
Abstract View: 31 times
PDF Download: 20 times