Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware

Authors

  • Herika Andini Putri Telkom University
  • Rohmat Tulloh Telkom University
  • Nazel Djibran PT. Datacomm Diangraha

DOI:

https://doi.org/10.32493/informatika.v8i2.33656

Keywords:

Cybercrime, Next Generation Firewall, Malware, Paloalto, Testing

Abstract

Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime. This is very dangerous and causes huge losses. In addition, the most commonly found cybercrimes are malware threats, phishing, DDoS, and others. In this study, the implementation of the Paloalto firewall is carried out by configuring the firewall, as is the attack testing stage using malware such as Eicar, ransomware, Trojans, Dos, and web filtering. The results of this test aim to prevent the risk of data loss, material loss, and the paralysis of public services. And to be efficient and effective in scanning for a variety of attacks without affecting network performance. The implications of the results found are expected to solve the problem at hand perfectly. NGFW performs prevention by blocking access to malware that enters its network traffic. This research also implements NGFW, where firewall configuration is carried out, namely by creating a rule policy on the firewall. In this study, an evaluation of network performance was carried out after the implementation of NGFW and firewall configuration. The results show that the use of NGFW and rule policies on firewalls can improve network security efficiently and effectively. It is hoped that these results can overcome the paralysis of public services due to malware attacks and improve network performance.

References

Almeida, P. R. (2021). Next-Generation Firewall Concept, Features, and Their . no. doi: 10.31112/kriativ-tech-2021-.

Khalisah, A. M., & Kirana, P. (2022). Implementasi Norma Hukum Terhadap Tindak Pidana Peretasan (Hacking) di Indonesia. Jurist-Diction, 5(6), 2117–2132. https://doi.org/10.20473/jd.v5i6.40073

Pengamanan Sistem Jaringan Komputer Dengan Teknologi Firewall I Gede Suputra Widharma and The A Team. (n.d.).

https://www.researchgate.net/publication/346965331

Ramos Brandao, P., & Almeida, J. (2021). Next-Generation Firewalls: Concept, Features, and Their Benefits. https://doi.org/10.31112/kriativ-tech-2021-10-59

Yasin, M. A. (n.d.). Respon Insiden dan Deteksi Terhadap Zero-Day.

Jr, R. M. (2008). Keamanan sistem ionformasi. Sistem Informasi Salemba.

Kirana, A. M. (2022). Implementasi Norma Hukum Terhadap Tindak Pidana Peretasan (Hacking) di Indonesia.

Labone, M. (2020). Anomaly-based network intrusion detection using machine learning, . Institut polytechnique de Paris.

Sitorus, V. P. (2022). Nunukan State Court’s Computer Network Security Improvement Using Centralized Next-Generation Firewall, Budapest International Research and Critics .

Team, I. G. (2021). Pengamanan Sistem Jaringan Komputer Dengan Teknologi Firewall.

Ramos Brandao, P., & Almeida, J. (2021). Next-Generation Firewalls: Concept, Features,

Downloads

Published

2023-06-30