Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware

View through CrossRef
Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime. This is very dangerous and causes huge losses. In addition, the most commonly found cybercrimes are malware threats, phishing, DDoS, and others. In this study, the implementation of the Paloalto firewall is carried out by configuring the firewall, as is the attack testing stage using malware such as Eicar, ransomware, Trojans, Dos, and web filtering. The results of this test aim to prevent the risk of data loss, material loss, and the paralysis of public services. And to be efficient and effective in scanning for a variety of attacks without affecting network performance. The implications of the results found are expected to solve the problem at hand perfectly. NGFW performs prevention by blocking access to malware that enters its network traffic. This research also implements NGFW, where firewall configuration is carried out, namely by creating a rule policy on the firewall. In this study, an evaluation of network performance was carried out after the implementation of NGFW and firewall configuration. The results show that the use of NGFW and rule policies on firewalls can improve network security efficiently and effectively. It is hoped that these results can overcome the paralysis of public services due to malware attacks and improve network performance.
Title: Implementasi Perangkat Next Generation Firewall untuk Melindungi Aplikasi dari Serangan Malware
Description:
Based on the rapid development of technology, which has positive and negative impacts, one of the negative impacts is data leakage, called cybercrime.
This is very dangerous and causes huge losses.
In addition, the most commonly found cybercrimes are malware threats, phishing, DDoS, and others.
In this study, the implementation of the Paloalto firewall is carried out by configuring the firewall, as is the attack testing stage using malware such as Eicar, ransomware, Trojans, Dos, and web filtering.
The results of this test aim to prevent the risk of data loss, material loss, and the paralysis of public services.
And to be efficient and effective in scanning for a variety of attacks without affecting network performance.
The implications of the results found are expected to solve the problem at hand perfectly.
NGFW performs prevention by blocking access to malware that enters its network traffic.
 This research also implements NGFW, where firewall configuration is carried out, namely by creating a rule policy on the firewall.
In this study, an evaluation of network performance was carried out after the implementation of NGFW and firewall configuration.
The results show that the use of NGFW and rule policies on firewalls can improve network security efficiently and effectively.
It is hoped that these results can overcome the paralysis of public services due to malware attacks and improve network performance.

Related Results

Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
The need to mitigate malware attacks cannot be overemphasized, as they pose serious threats to the critical information assets in cyberspace. Understanding and utilizing appropriat...
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware
At this time Internet services have become a necessity no longer to provide information services, but have become important so there are many cases of websites being hacked by atta...
Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website
Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya un...
MCPDS: image-based malware classification method using PE metadata alone
MCPDS: image-based malware classification method using PE metadata alone
Abstract In response to the increasing threat posed by the exponential growth of malware in cybersecurity, researchers have developed a numbe...
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Latar Belakang: Dua komponen utama pada analisismalware adalah analisis malware statis yang melibatkan pemeriksaan struktur dasar malware yang dapat dieksekusi tanpa mengeksekusiny...
Malware and Windows APIs: A Dangerous Duo
Malware and Windows APIs: A Dangerous Duo
This paper introduces its interaction with malware and Windows APIs (application programming interface). The first section describes malware and investigates various types such as ...
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Potensi wisata Kelurahan Serangan dinilai cukup tinggi. Berdasarkan hasil wawancara singkat dengan salah satu Kepala Lingkungan Kelurahan Serangan, ditemukan bahwa Serangan mengede...
PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN
PEMANFAATAN NOTIFIKASI TELEGRAM UNTUK MONITORING JARINGAN
Pemantauan   server   jaringan   komputer   sangat   penting   dilakukan   untuk   mempermudah seorang administrator dalam mengamati dan mengontrol sistem jaringan ...

Back to Top