MAULANA, RIZKY (2024) IMPLEMENTASI SISTEM KEAMANAN JARINGAN PADA SERVER MIKROTIK DENGAN PENERAPAN METODE FIREWALL DAN INTRUSION DETECTION SYSTEM BERBASIS SNORT (Studi Kasus : PT. PRESTASI PIRANTI INFORMASI). S1 thesis, Universitas Mercu Buana Jakarta.
|
Text (HAL COVER)
01 Cover.pdf Download (499kB) | Preview |
|
|
Text (ABSTRAK)
02 Abstrak.pdf Download (204kB) | Preview |
|
Text (BAB I)
03 Bab 1.pdf Restricted to Registered users only Download (199kB) |
||
Text (BAB II)
04 Bab 2.pdf Restricted to Registered users only Download (550kB) |
||
Text (BAB III)
05 Bab 3.pdf Restricted to Registered users only Download (335kB) |
||
Text (BAB IV)
06 Bab 4.pdf Restricted to Registered users only Download (1MB) |
||
Text (BAB V)
07 Bab 5.pdf Restricted to Registered users only Download (171kB) |
||
Text (DAFTAR PUSTAKA)
08 Daftar Pustaka.pdf Restricted to Registered users only Download (221kB) |
||
Text (LAMPIRAN)
09 Lampiran.pdf Restricted to Registered users only Download (2MB) |
Abstract
In today's digital era, network security is very important and crucial in the information technology environment, especially for companies engaged in the internet service industry. With the increase in increasingly complex network security threats such as DDoS, TCP, UDP, and ICMP attacks. Every company needs to implement effective solutions to protect network infrastructure and network systems, this research aims to implement a network security system for PT Prestasi Piranti Informasi on a MikroTik server using the firewall method and a Snort-based Intrusion Detection System (IDS). The firewall method integrated with Snort-based IDS is expected to provide a stronger layer of protection and faster response to threats. This research assesses the effectiveness of a network security system using a MikroTik server configured with a Snort-based firewall and IDS. Data was collected through monitoring and logging network traffic as well as system responses to cyberattacks such as DDoS, TCP, UDP, and ICMP. The results show that the MikroTik firewall is effective in blocking suspicious traffic, while the Snort IDS successfully detects intrusions in real-time and provides detailed information on the type and source of attacks. Recommendations include strengthening the security configuration, optimizing the IDS, and improving network monitoring and logging to enhance overall security. In addition, this implementation provides flexibility for network administrators to manage security policies and take preventive actions proactively. Thus, this study concludes that the combination of MikroTik firewall and Snort IDS is an effective solution in improving network security and protecting servers from various cyber threats. Keywords: Network Security, MikroTik, Firewall, Snort, Intrusion Detection System (IDS) Pada era digital saat ini, keamanan jaringan menjadi sangat penting dan krusial dalam lingkungan teknologi informasi, terutama bagi perusahaan yang bergerak di industri layanan internet. Dengan meningkatnya acaman keamanan jaringan yang semakin kompleks seperti seranga DDoS, TCP, UDP, dan ICMP. Setiap perusahaan perlu adanya implementasi solusi efektif untuk melindungi infrastuktur jaringan serta sistem jaringan, penelitian ini bertujuan untuk mengimplementasikan sistem keamanan jaringan PT. Prestasi Piranti Informasi pada server MikroTik dengan menggunakan metode firewall dan Intrusion Detection System (IDS) berbasis Snort. Metode firewall yang diintegrasikan dengan IDS berbasis Snort diharapkan mampu memberikan lapisan perlindungan yang lebih kuat dan respons yang lebih cepat terhadap ancaman. Penelitian ini menilai efektivitas sistem keamanan jaringan dengan menggunakan server MikroTik yang dikonfigurasi dengan firewall dan IDS berbasis Snort. Data dikumpulkan melalui pemantauan dan logging lalu lintas jaringan serta respon sistem terhadap serangan siber seperti DDoS, TCP, UDP, dan ICMP. Hasilnya menunjukkan bahwa firewall MikroTik efektif dalam memblokir lalu lintas mencurigakan, sementara IDS Snort berhasil mendeteksi intrusi secara real-time dan memberikan informasi detail mengenai jenis dan sumber serangan. Rekomendasi mencakup penguatan konfigurasi keamanan, optimisasi IDS, serta Selain itu, implementasi ini memberikan fleksibilitas bagi administrator jaringan untuk mengelola kebijakan keamanan dan melakukan tindakan pencegahan secara proaktif. Dengan demikian, penelitian ini menyimpulkan bahwa kombinasi firewall MikroTik dan Snort IDS merupakan solusi efektif dalam meningkatkan keamanan jaringan dan melindungi server dari berbagai ancaman siber. Kata Kunci : Keamanan Jaringan, MikroTik, Firewall, Snort, Intrusion Detection System (IDS)
Actions (login required)
View Item |