Implementasi Keamanan Jaringan Menggunakan Firewall dan Intrusion Detection System (IDS) pada Infrastruktur Jaringan Skala Kecil–Menengah
DOI:
https://doi.org/10.62671/jikum.v2i1.184Keywords:
Firewall, IDS, Keamanan Jaringan, Penyaringan Paket, Deteksi IntrusiAbstract
Network security plays a vital role in ensuring the confidentiality, integrity, and availability of data in small- to medium-scale network infrastructures. This study aims to implement and evaluate the effectiveness of a layered network security system using a Firewall and an Intrusion Detection System (IDS). The methods employed include system design, firewall rule configuration using iptables and pfSense, deployment of IDS Snort/Suricata, traffic monitoring, and performance evaluation. The testing scenarios involve normal traffic, port scanning, brute force attempts, and simulated Distributed Denial of Service (DDoS) attacks. The results indicate that the implementation of firewall and IDS significantly enhances network protection by filtering malicious traffic, improving attack detection accuracy, and maintaining network stability. These findings suggest that the integration of firewall and IDS provides an optimal and efficient security solution for small- to medium-scale network environments.
References
Cheswick, W. R., Bellovin, S. M., & Rubin, A. D. (2003). Firewalls and Internet Security: Repelling the Wily Hacker. Addison Wesley.
Stallings, W. (2017). Network Security Essentials. Pearson.
Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication.
Sharma, A., & Sahay, S. (2016). A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and MANETs. Journal of Network and Computer Applications.
Roesch, M. (1999). Snort – Lightweight Intrusion Detection for Networks. USENIX.
Sanders, C. (2015). Practical Packet Analysis. No Starch Press.
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network Anomaly Detection: Methods, Systems and Tools. IEEE Communications Surveys and Tutorials.
Behl, R. (2018). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford.
Zhang, Y., et al. (2019). Next-Generation Firewall Technologies. IEEE Access.
Almubairik, A. (2020). Performance Analysis of IDS in Enterprise Networks. Journal of Network Security.
Sommer, R., & Paxson, V. (2020). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305–316.
Buczak, A. L., & Guven, E. (2020). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153–1176.
Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2020). A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications, 84, 25–37.
Alqahtani, S., Alshamrani, A., & Alshehri, M. (2021). Network security enhancement using integrated firewall and intrusion detection system. International Journal of Advanced Computer Science and Applications, 12(3), 432–438.
Mishra, P., Varadharajan, V., Tupakula, U., & Pilli, E. S. (2022). A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys & Tutorials, 21(1), 686–728.










