Nunukan State Court's Computer Network Security Improvement Using Centralized Next-Generation Firewall

Victor Parlindungan Sitorus, Suzzana Lamria Siregar

Abstract


The Nunukan District Court currently uses technology and information systems to improve services to the community. However, the use of technology and information systems is not accompanied by the application of technology and information system security. This makes the Nunukan District Court vulnerable to attacks and threats such as viruses, phishing, DDoS and others. To overcome this, in this research, a design was made for the implementation of the Next-Generation Firewall which functions to protect information technology and systems in the Nunukan District Court from threats and attacks on technology and information systems. From the results of tests conducted at the Nunukan District Court, the Next-Generation Firewall can prevent attacks and threats carried out in testing. Not only that, this study also found an increase in network performance at the Nunukan District Court. Several features were implemented, such as web filters, antivirus, IPS and antiDDoS, which were seen to be able to prevent attacks and threats to the information system used at the Nunukan District Court. The implementation of the applied design also makes the firewall resource device at the Nunukan District Court unburdened because it offloads the security scanning function to the NGFW device in the cloud which causes an increase in internet access performance.


Keywords


technology and system information security; next-generation firewall; computer network

Full Text:

PDF

References


Andry, J.F., Honni. (2017). Using Backup and Restore Automation from Disaster in University Information Systems. Advances in Social Science, Education and Humanities Research.134.1-5

Ayeni, B. K., Sahalu, J. B., & Adeyanju, K. R. (2018). Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System. 2018. 1-10

Baishya, A., Kakoty, S. (2019). A Review on Web Content Filtering, Its Technique and Prospects. International Journal of Computer Science Trends and Technology (IJCST). 7(3). 37-40

Chakravarthi, Maoj R. (2016). Next-Generation Firewall-A Review. International Journal of Computer Science and Information Technology. 1. 1212-1215

Eian, I.C.; Lim, K.Y., Yeap, M.X.L., Yeo, H.Q., Z, Fatima. (2020). Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges. Preprints 2020

Fortinet. (2020). FortiOS Cookbook Version 6.2.0. [Online]. Available at: https://docs.fortinet.com/document/fortigate/6.2.0/cookbook/725397/web-content-filter [Accessed 06 August 2021]

Hasbullah, Hatta, M., and Arifin, Z. (2018). Communication Pattern of Wilayatul Hisbah, Lhokseumawe City in Implementing Amar Makruf Nahi Mungkar. Budapest International Research and Critics Institure Journal, Vol. 1, No. 4, 194-205.

Hsu, F., Lee C., Luo T., Chang T., Wu. (2019). A Cloud-Based Real-Time Mechanism to Protect End Hosts against Malware. Applied Science. 9(18). 3748

Khan, R., Hasan M. (2018). Network Threats, Attacks and Securityy Measures: A Review. International Journal of Advanced Research in Computer Science. 8(8).116-120

Kiernet, C., Bouzefrane, S., Thoniel P., (2015). Digital Identity Management. Elsevier. 95-135

Labonne, M. (2020). Anomaly-based Network Intrusion Detection Using Machine Learning.Perancis: Institut Polytechnique de Paris.

Mohammad, R.M., Thabtah, F., McCluskey, L. (2015). Tutorial and Critical Analysis of Phising Websites Methods. Computer Science Review. 17. 1-24

Patil, M dan Savita Mohurle. (2017). The Empirical Study of the Evolution of the Next Generation Firewalls. International Journal of Trend in Scientific Research and Development (IJTSRD). 1(5). 193-196

Rosenberg, J. (2017). Embeded Security. United State: Draper Laboratory, Cambridge

Sergey, B. (2016). Intrusion Detection System and Intrusion Prevention System with Snort provided by Security Onion. Finand: Xamk University of Applied Sciences

Smith, D. J., Simpson, K.G.L. (2020). The Safety Critical Handbook (Fifth Edition). Oxford: Butterworth-Heinemann.

Yunuhs, M.A.M.Y., Brohan, M.Z., Nawi, Z.M., Surin, E.S.M., Najib, N.A.M., Liang, C.W. (2016). Review of SQL Injection: Problems and Prevention. The international Journal on Informatics Visualization. 2. 215-219

Zeeshan, A. (2018). Virtual Private Network in Theory and Practice. Atlanta: Schoolar’s Press.




DOI: https://doi.org/10.33258/birci.v5i2.4842

Article Metrics

Abstract view : 105 times
PDF - 30 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.