Nunukan State Court's Computer Network Security Improvement Using Centralized Next-Generation Firewall
Abstract
The Nunukan District Court currently uses technology and information systems to improve services to the community. However, the use of technology and information systems is not accompanied by the application of technology and information system security. This makes the Nunukan District Court vulnerable to attacks and threats such as viruses, phishing, DDoS and others. To overcome this, in this research, a design was made for the implementation of the Next-Generation Firewall which functions to protect information technology and systems in the Nunukan District Court from threats and attacks on technology and information systems. From the results of tests conducted at the Nunukan District Court, the Next-Generation Firewall can prevent attacks and threats carried out in testing. Not only that, this study also found an increase in network performance at the Nunukan District Court. Several features were implemented, such as web filters, antivirus, IPS and antiDDoS, which were seen to be able to prevent attacks and threats to the information system used at the Nunukan District Court. The implementation of the applied design also makes the firewall resource device at the Nunukan District Court unburdened because it offloads the security scanning function to the NGFW device in the cloud which causes an increase in internet access performance.
Keywords
Full Text:
PDFReferences
Andry, J.F., Honni. (2017). Using Backup and Restore Automation from Disaster in University Information Systems. Advances in Social Science, Education and Humanities Research.134.1-5
Ayeni, B. K., Sahalu, J. B., & Adeyanju, K. R. (2018). Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System. 2018. 1-10
Baishya, A., Kakoty, S. (2019). A Review on Web Content Filtering, Its Technique and Prospects. International Journal of Computer Science Trends and Technology (IJCST). 7(3). 37-40
Chakravarthi, Maoj R. (2016). Next-Generation Firewall-A Review. International Journal of Computer Science and Information Technology. 1. 1212-1215
Eian, I.C.; Lim, K.Y., Yeap, M.X.L., Yeo, H.Q., Z, Fatima. (2020). Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges. Preprints 2020
Fortinet. (2020). FortiOS Cookbook Version 6.2.0. [Online]. Available at: https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/725397/web-content-filter [Accessed 06 August 2021]
Hasbullah, Hatta, M., and Arifin, Z. (2018). Communication Pattern of Wilayatul Hisbah, Lhokseumawe City in Implementing Amar Makruf Nahi Mungkar. Budapest International Research and Critics Institure Journal, Vol. 1, No. 4, 194-205.
Hsu, F., Lee C., Luo T., Chang T., Wu. (2019). A Cloud-Based Real-Time Mechanism to Protect End Hosts against Malware. Applied Science. 9(18). 3748
Khan, R., Hasan M. (2018). Network Threats, Attacks and Securityy Measures: A Review. International Journal of Advanced Research in Computer Science. 8(8).116-120
Kiernet, C., Bouzefrane, S., Thoniel P., (2015). Digital Identity Management. Elsevier. 95-135
Labonne, M. (2020). Anomaly-based Network Intrusion Detection Using Machine Learning.Perancis: Institut Polytechnique de Paris.
Mohammad, R.M., Thabtah, F., McCluskey, L. (2015). Tutorial and Critical Analysis of Phising Websites Methods. Computer Science Review. 17. 1-24
Patil, M dan Savita Mohurle. (2017). The Empirical Study of the Evolution of the Next Generation Firewalls. International Journal of Trend in Scientific Research and Development (IJTSRD). 1(5). 193-196
Rosenberg, J. (2017). Embeded Security. United State: Draper Laboratory, Cambridge
Sergey, B. (2016). Intrusion Detection System and Intrusion Prevention System with Snort provided by Security Onion. Finand: Xamk University of Applied Sciences
Smith, D. J., Simpson, K.G.L. (2020). The Safety Critical Handbook (Fifth Edition). Oxford: Butterworth-Heinemann.
Yunuhs, M.A.M.Y., Brohan, M.Z., Nawi, Z.M., Surin, E.S.M., Najib, N.A.M., Liang, C.W. (2016). Review of SQL Injection: Problems and Prevention. The international Journal on Informatics Visualization. 2. 215-219
Zeeshan, A. (2018). Virtual Private Network in Theory and Practice. Atlanta: Schoolar’s Press.
DOI: https://doi.org/10.33258/birci.v5i2.4842
Article Metrics
Abstract view : 105 timesPDF - 33 times
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.