Analis Perancangan Dan Penerapan Keamanan Jaringan Menggunakan Metode Intrusion Detection System (IDS), Intrusion Prevention System (IPS) Dan Demilitarized Zone (DMZ) Pada PT. Maha Digital Indonesia (Mahapay)
Keywords:
Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Demilitarized Zone (DMZ), firewall, Network Security, ServerAbstract
Network security systems, in recent years have become the main focus in the world of securing other important data, this is due to the high number of suspicious threats (Suspicious Threats) and attacks from the Internet. Network security involves efforts to protect data and computer systems from detrimental threats, such as cyberattacks, malware, and data theft. The existence of increasingly complex and evolving threats has increased awareness of the need for strong network security. PT. Maha Digital Indonesia (Mahapay) is a company operating in the field of EDC Field Service where it is very important that client data is kept confidential. This requires good network security to maintain the confidentiality of the data. So the aim of this research is to implement network security using the Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Demilitarized Zone (DMZ) methods as network security at PT . Maha Digital Indonesia (Mahapay). The results of this research are the formation of connections between networks in the topology along with the successful functioning of the Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) detecting and preventing suspicious activities carried out by attackers and the operation of rules for the DMZ area. Success in the application is tested again by carrying out several attack methods that will be analyzed such as Syn Flood Attack, Ping Of Death and Port Scanning which will be handled by the configuration that has been applied to the network and server.
References
[1] A. Elanda and D. R. R. Simamora, “Audit dan Investigasi Intrusion Detection System (IDS) pada Infrastruktur Jaringan Kampus dengan menggunakan Metode Indeks KAMI (Studi Kasus: STMIK Rosma),” 2021. [Online]. Available: https://e-journal.rosma.ac.id/index.php/inotek/article/view/128
[2] W. W. Widiyanto, “SIMRS Network Security Simulation Using Snort IDS and IPS Methods,” Indones. Heal. Inf. Manag. J., vol. 10, no. 1, pp. 10–17, Jun. 2022, doi: 10.47007/inohim.v10i1.396.
[3] P. B. Pramudya, “Implementation of signature-based intrusion detection system using SNORT to prevent threats in network servers,” J. Soft Comput. Explor., vol. 3, no. 2, pp. 93–98, 2022, doi: 10.52465/joscex.v3i2.80.
[4] N. Nuroji, “Penerapan Intrusion Detection and Prevention System (IDPS) pada Jaringan komputer sebagai pencegahan serangan Port-Scanning,” J. Data Sci. Inf. Syst., vol. 1, no. 2, pp. 41–49, 2023, [Online]. Available: https://doi.org/10.58602/dimis.v1i2.44
[5] F. T. Anugrah et al., “Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection,” Techné J. Ilm. Elektrotek., vol. 21, p. 12, 2022.
[6] E. Suteja, E. N. Kumalasari, and S. Raharjo, “PERANCANGAN SISTEM KEAMANAN JARINGAN UNTUK MENGURANGI KEJAHATAN CYBER MENGGUNAKAN TEKNIK DEMILITARIZED ZONE (DMZ) DAN FIREWALL RULES (Studi Kasus: Laboratorium Basis Data IST AKPRIND),” 2021.
[7] D. Hidayat, “Mengoptimalkan Pencegahan Serangan Brute Force pada Linux melalui Penerapan Metode Aplikasi IDS Snort,” JITEKH, vol. 11, no. 2, 2023, doi: 10.35447/jitekh.v11i2.764.
[8] Y. Arta, A. Syukur, and R. Kharisma, “Simulasi Implementasi Intrusion Prevention System (IPS) Pada Router Mikrotik,” IT J. Res. Dev., vol. 3, no. 1, pp. 104–114, Aug. 2018, doi: 10.25299/itjrd.2018.vol3(1).1346.
[9] J. A. Dharma and Rino, “Network Attack Detection Using Intrusion Detection System Utilizing Snort Based on Telegram,” bit-Tech, vol. 6, no. 2, pp. 118–126, 2023, doi: 10.32877/bt.v6i2.943.
[10] T. Rahman and R. M. Adha, “Keamanan Jaringan dengan Metode Access List Demilitarized Zone pada Cisco RV042,” Keamanan Jar. dengan Metod. Access List Demilitarized Zo. pada Cisco RV042 Taufik, vol. 6, no. 2, p. 11, 2021.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Evan Trijanitra, Arya Adhyaksa Waskita, Taswanda Taryo
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.