Javascript must be enabled to continue!
Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware
View through CrossRef
Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime. This is very dangerous and causes huge losses. In addition, the most commonly found cybercrimes are malware threats, phishing, DDoS, and others. In this study, the implementation of the Paloalto firewall is carried out by configuring the firewall, as is the attack testing stage using malware such as Eicar, ransomware, Trojans, Dos, and web filtering. The results of this test aim to prevent the risk of data loss, material loss, and the paralysis of public services. And to be efficient and effective in scanning for a variety of attacks without affecting network performance. The implications of the results found are expected to solve the problem at hand perfectly. NGFW performs prevention by blocking access to malware that enters its network traffic. This research also implements NGFW, where firewall configuration is carried out, namely by creating a rule policy on the firewall. In this study, an evaluation of network performance was carried out after the implementation of NGFW and firewall configuration. The results show that the use of NGFW and rule policies on firewalls can improve network security efficiently and effectively. It is hoped that these results can overcome the paralysis of public services due to malware attacks and improve network performance.
Universitas Pamulang
Title: Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware
Description:
Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime.
This is very dangerous and causes huge losses.
In addition, the most commonly found cybercrimes are malware threats, phishing, DDoS, and others.
In this study, the implementation of the Paloalto firewall is carried out by configuring the firewall, as is the attack testing stage using malware such as Eicar, ransomware, Trojans, Dos, and web filtering.
The results of this test aim to prevent the risk of data loss, material loss, and the paralysis of public services.
And to be efficient and effective in scanning for a variety of attacks without affecting network performance.
The implications of the results found are expected to solve the problem at hand perfectly.
NGFW performs prevention by blocking access to malware that enters its network traffic.
This research also implements NGFW, where firewall configuration is carried out, namely by creating a rule policy on the firewall.
In this study, an evaluation of network performance was carried out after the implementation of NGFW and firewall configuration.
The results show that the use of NGFW and rule policies on firewalls can improve network security efficiently and effectively.
It is hoped that these results can overcome the paralysis of public services due to malware attacks and improve network performance.
Related Results
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
At this time Internet services have become a necessity no longer to provide information services, but have become important so there are many cases of websites being hacked by atta...
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Latar Belakang: Dua komponen utama pada analisismalware adalah analisis malware statis yang melibatkan pemeriksaan struktur dasar malware yang dapat dieksekusi tanpa mengeksekusiny...
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Potensi wisata Kelurahan Serangan dinilai cukup tinggi. Berdasarkan hasil wawancara singkat dengan salah satu Kepala Lingkungan Kelurahan Serangan, ditemukan bahwa Serangan mengede...
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
PENGEMBANGAN APLIKASI REMOTE BERBASIS ANDROID UNTUK KONFIGURASI INTRUSION PREVENTION SYSTEM MEMANFATKAN INTERNET OF THINGS
PENGEMBANGAN APLIKASI REMOTE BERBASIS ANDROID UNTUK KONFIGURASI INTRUSION PREVENTION SYSTEM MEMANFATKAN INTERNET OF THINGS
Router MikroTik mampu untuk dikonfigurasi sebagai Intrusion Prevention System (IPS) sehingga dapat menolak paket data yang memiliki perilaku sebagai serangan Port Scanning, Brute F...
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
The current high rate of malware variant production each day produces hundreds of thousands of new variants making signature detection methods ineffective. Deep learning patterns s...
MATAKULIAH "PROJEK PERANGKAT LUNAK" UNTUK MENGATASI KESENJANGAN TEORI DAN PRAKTIK PEMBANGUNAN PERANGKAT LUNAK
MATAKULIAH "PROJEK PERANGKAT LUNAK" UNTUK MENGATASI KESENJANGAN TEORI DAN PRAKTIK PEMBANGUNAN PERANGKAT LUNAK
Kemajuan teknologi pada dekade kini menunjukkan bahwa pemanfaatan peralatan elektronika seperti personal komputer, pembangkit kontrol manufaktur, dan peralatan otomatisasi lainnya ...

