Firewall Implementation as a Computer Network Security Strategy for Data Protection

Authors

  • Fauzan Prasetyo Eka Putra Universitas Madura, Indonesia
  • Mohammat Dafid Universitas Madura, Indonesia
  • Imam Syafi’i Universitas Madura, Indonesia

DOI:

https://doi.org/10.47709/brilliance.v5i1.6162

Keywords:

Network Security, Firewall, Computer Network, Data Protection

Abstract

Computer network security plays a crucial role in ensuring the integrity, confidentiality, and availability of data in the modern digital era. One of the primary tools used to safeguard networks from unauthorized access and external threats is the firewall. This paper explores the significance of firewalls in protecting network systems by examining their functions, various types, and capability to regulate data traffic. Firewalls work by enforcing specific rules to limit access, effectively reducing the risk of cyber threats such as malware, hacking attempts, and unauthorized intrusions. The study also involves practical observation of firewall implementation in a real network setup to evaluate their efficiency in mitigating security risks. Findings indicate that properly configured firewalls can considerably strengthen a network’s defense. Nevertheless, relying solely on firewalls is insufficient. They should be supported by additional security technologies and best practices to achieve comprehensive network protection. In conclusion, firewalls are essential elements in upholding the reliability and safety of computer networks.

References

Affandi, M. (2022). Implementasi virtual private network (VPN) OpenVPN dengan keamanan sertifikat SSL pada network attached storage (NAS) FreeNAS. Jurnal Impresi Indonesia, 1(12), 1329–1341. https://doi.org/10.58344/jii.v1i12.748

Syahab, A. S. (2023). Analisis audit keamanan informasi website menggunakan metode Network Mapper dan Qualys SSL. Jurnal Manajemen Informatika dan Sistem Informasi, 6(1), 39–47. https://doi.org/10.36595/misi.v6i1.742

Alfredo, M. J., & Sulistyo, W. (2023). Perancangan sistem keamanan jaringan berbasis hierarchical network design. IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi, 2(1), 48–62. https://doi.org/10.24246/itexplore.v2i1.2023.pp48-62

Arbie, F. R., & Raharjo, M. (2024). Implementasi keamanan jaringan dengan metode security profiles menggunakan Fortigate pada Komisi Aparatur Sipil Negara. Jurnal Informatika Terpadu, 10(1), 27–34. https://doi.org/10.54914/jit.v10i1.1060

Ariyadi, T., & Pohan, M. R. (2023). Implementation of penetration testing tools to test Wi-Fi security levels at the Directorate of Innovation and Business Incubators. Jurnal Penelitian Pendidikan IPA, 9(12), 10768–10775. https://doi.org/10.29303/jppipa.v9i12.5551

Asian, J., Erlangga, D., & Ayu, M. (2024). Data exfiltration anomaly detection on enterprise networks using deep packet inspection. MATRIK: Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, 22(3), 665–672. https://doi.org/10.30812/matrik.v22i3.3089

Eka Putra, F. P., Hamzah, A., Agel, W., & Kusuma, R. O. F. (2024a). Impelementasi sistem keamanan jaringan Mikrotik menggunakan firewall filtering dan port knocking. Jurnal Sistim Informasi dan Teknologi, 5(4), 82–87. https://doi.org/10.60083/jsisfotek.v5i4.329

Fajrin, B. S., Priatno, P., & Effendi, M. R. (2014). Penerapan sistem keamanan jaringan menggunakan VPN dengan metode PPTP pada PT Hinoka Sinergi Tanyo. Jurnal Sistem Informasi Universitas Suryadarma, 11(2). https://doi.org/10.35968/jsi.v11i2.1252

Gamaliel, F., & Arliyanto, P. Y. D. (2023). Perancangan jaringan WiFi dengan menggunakan top down network design. Jurnal Informatika dan Rekayasa Elektronik, 6(2), 140–147. https://doi.org/10.36595/jire.v6i2.819

Gunawan, A., Rahmah, R., & Iskandar, A. (2023). Rancang bangun jaringan hotspot menggunakan LINUX ClearOS dengan konsep security gateway. JTIM: Jurnal Teknologi Informasi dan Multimedia, 4(4), 272–280. https://doi.org/10.35746/jtim.v4i4.251

Haris, A. I., Riyanto, B., Surachman, F., & Ramadhan, A. A. (2022). Analisis pengamanan jaringan menggunakan router Mikrotik dari serangan DoS dan pengaruhnya terhadap performansi. Komputika: Jurnal Sistem Komputer, 11(1), 67–76. https://doi.org/10.34010/komputika.v11i1.5227

Herdiantoro, H. R., & Islami, M. R. R. (2023). Implementasi two-factor authentication (2FA) dan firewall policies dalam mengamankan website. Jurnal Mahasiswa Ilmu Komputer, 4(1), 1–9. https://doi.org/10.24127/ilmukomputer.v4i1.3300

Innuddin, M., Irfan, P., & Hammad, R. (2023). Meningkatkan keamanan web server Nginx dengan NAXSI sebagai web application firewall. Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM), 4(2), 148–156. https://doi.org/10.31102/jatim.v4i2.2310

Insani, P. P., Kanedi, I., & Akbar, A. A. (2023). Implementation of Snort as a wireless network security detection tool using Linux Ubuntu. Jurnal Komputer, Informasi dan Teknologi, 3(2). https://doi.org/10.53697/jkomitek.v3i2.1488

Liu, Y., Tantithamthavorn, C., Li, L., & Liu, Y. (2022). Deep learning for Android malware defenses: A systematic literature review. ACM Computing Surveys, 55(8). https://doi.org/10.1145/3544968

Maulana, A., Suharto, N., & Hariyadi, A. (2023). Application of MikroTik firewall for website access restriction and prevention of DoS (Denial of Service) attacks on internet networks Al-Mahrusiyah Vocational School Lirboyo. Jartel, 13(1). https://doi.org/10.33795/jartel.v13i1.547

Mendrofa, Y., & Fauzi, R. (2023). Implementasi keamanan jaringan menggunakan port knocking. Computer and Science Industrial Engineering (COMASIE), 9(7), 30. https://doi.org/10.33884/comasiejournal.v9i7.7890

Ilham, M., Gunawan, I., & Siregar, Z. A. (2022). Keamanan jaringan WLAN dengan metode firewall filtering menggunakan Mikrotik pada SMP Negeri 1 Dolok Merawan. Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer, 2(3), 01–16. https://doi.org/10.55606/juisik.v2i3.309

Mohamed, M., & Alosman, K. (2024). A comprehensive machine learning framework for robust security management in cloud-based Internet of Things systems. Jurnal Kejuruteraan, 36(3), 1055–1065. https://doi.org/10.17576/jkukm-2024-36(3)-18

Mohammadzadeh, A., Taghavifar, H., Zhang, Y., & Zhang, W. (2024). A fast nonsingleton Type-3 fuzzy predictive controller for nonholonomic robots under sensor and actuator faults and measurement errors. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 54(7), 4175–4187. https://doi.org/10.1109/TSMC.2024.3375812

Naufal, F. M., Vahlevi, M. R., Widayana, A., Zulfa, M. L., & Juardi, D. (2022). Implementasi keamanan hotspot menggunakan proxy dan firewall dalam mengatasi resiko ancaman serangan. Jurnal Ilmiah Rekayasa dan Manajemen Sistem Informasi, 8(2), 148. https://doi.org/10.24014/rmsi.v8i2.17691

Nurdin Prasetiyawan, A., Stiyo Budi, B., Abdillah, M. F., & Riyadi, S. (2024). Sistem keamanan jaringan deteksi dan blok trafic Browsec VPN melalui Mikrotik. Jurnal Sistem Informasi Aplikasi Teknologi Informasi, 1(2). https://doi.org/10.53567/josiati.v1i2.17

Peniarsih, P., & Iswandir, I. (2014). Firewall dan iptables pada jaringan komputer. Jurnal Sistem Informasi Universitas Suryadarma, 11(2). https://doi.org/10.35968/jsi.v11i2.1241

Permana, H., & Mitro, S. (2024). Proteksi internet di SMKN 3 Pandeglang menggunakan firewall. Power Elektronik: Jurnal Orang Elektro, 12(3), 192–195. https://doi.org/10.30591/polektro.v12i3.6073

Putri, H. A., Djibran, N., & Tulloh, R. (2023). Implementation of next-generation firewalls to protect applications from malware attacks. Jurnal Indonesia Sosial Teknologi, 4(11), 1961–1970. https://doi.org/10.59141/jist.v4i11.797

Puntadheva, S. A., Kusumaningsih, R. Y. R., & Triyono, J. (2023). Perancangan keamanan jaringan komputer menggunakan firewall intrusion detection system (IDS) terhadap serangan brute force dan implementasi ARP list. Jurnal Jarkom, 10(2), 32–37. https://doi.org/10.34151/jarkom.v10i2.4482

Sari, Y. N., Irfan, D., & Huda, A. (2022). Network security analysis using virtual private network in vocational school. Jurnal Paedagogy, 9(3), 582. https://doi.org/10.33394/jp.v9i3.5346

Satria, A., & Ramadhani, F. (2023). Analisis keamanan jaringan komputer dengan menggunakan switch port security di Cisco Packet Tracer. Sudo Jurnal Teknik Informatika, 2(2), 52–60. https://doi.org/10.56211/sudo.v2i2.260

Styorini, W., Azwar, H., & Susantok, M. (2024). Implementasi firewall pada laboratorium jaringan komputer SMAIT AL-ITTIHAD. JITER-PM (Jurnal Inovasi Terapan - Pengabdian Masyarakat), 2(1), 38–44. https://doi.org/10.35143/jiter-pm.v2i1.6162

Subakti, A. J. (2023). Analysis of Lapan security access based on firewall log in Center Eight. Jurnal Manajemen Informatika Medicom (JMI), 11(1), 26–31. https://doi.org/10.35335/jmi.v11i1.52

Syafi’i Bachtiar, M., Rahaningsih, N., & Danar Dana, R. (2024). Firewall filtering berbasis deep packet inspection dalam mendeteksi dan mencegah ancaman malware. JATI (Jurnal Mahasiswa Teknik Informatika), 8(1), 399–405. https://doi.org/10.36040/jati.v8i1.8387

Syamsu, M., & Widodo, W. (2022). Implementasi arsitektur firewall sebagai sistem keamanan jaringan WiFi 802.11ax Aruba Software Defined WAN (SD-WAN). Jurnal Teknologi Informasi (JUTECH), 3(2), 141–157. https://doi.org/10.32546/jutech.v3i2.2033

Syaputera, A., Riska, R., & Mardiana, Y. (2023). Hotspot network security system from brute force attack using pfSense external firewall (Case study of Wifi-Ku.Net Hotspot). Jurnal Komputer, Informasi dan Teknologi, 3(1). https://doi.org/10.53697/jkomitek.v3i1.1286

Wadly, F., Septian, R., & Ramadhan, Z. (2023). Strategi penanggulangan kelemahan terhadap ancaman keamanan pada jaringan wireless. Jurnal Nasional Teknologi Komputer, 3(2), 59–67. https://doi.org/10.61306/jnastek.v3i2.89

Wang, S., Xu, W., & Liu, Y. (2023). Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things. Computer Networks, 235, 109982. https://doi.org/10.1016/j.comnet.2023.109982

Wang, X., Wu, Z., Jia, M., Xu, T., Pan, C., Qi, X., & Zhao, M. (2023). Lightweight SM-YOLOv5 tomato fruit detection algorithm for plant factory. Sensors, 23(6), Article 3336. https://doi.org/10.3390/s23063336

Wowor, H. G. A., Sudirman, A., & Hakiki, F. (2024). China’s Great Firewall: Cybersecurity as strategy for building world cyberpower. JISPO: Jurnal Ilmu Sosial dan Ilmu Politik, 13(2), 193–232. https://doi.org/10.15575/jispo.v13i2.27713

Yuliandari, D., Walim, W., Raja, B. K., Ningsih, R., & Wahidin, A. J. (2023). Simulasi penerapan sistem monitoring jaringan Snort NIDS pada web server menggunakan metode SPDLC. Jurnal Infortech, 5(2), 133–138. https://doi.org/10.31294/infortech.v5i2.17338

Yusril Amru, & Ermadi Satriya Wijaya. (2022). Analisis penerapan Sangfor NGAF firewall sebagai keamanan pada jaringan internet Universitas Muhammadiyah Purwokerto. Jurnal Sistem Informasi (JUSIN), 3(2), 55–66. https://doi.org/10.32546/jusin.v3i2.1959

Zhou, L., Leng, S., Wang, Q., & Liu, Q. (2023). Integrated sensing and communication in UAV swarms for cooperative multiple targets tracking. IEEE Transactions on Mobile Computing, 22(11), 6526–6542. https://doi.org/10.1109/TMC.2022.3193499

Zulmy Alhamri, R., Eliyen, K., & Heriadi, A. (2023). Pengembangan aplikasi remote berbasis Android untuk konfigurasi intrusion prevention system memanfaatkan Internet of Things. Jurnal Mnemonic, 6(2), 135–148. https://doi.org/10.36040/mnemonic.v6i2.6727

Zy, A. T., Isarianto, Rifai, A. M., Nugroho, A., & Ghofir, A. (2025). Enhancing network security: Evaluating SDN-enabled firewall solutions and clustering analysis using K-means through data-driven insights. Jurnal RESTI, 9(1), 69–76. https://doi.org/10.29207/resti.v9i1.6056

Downloads

Published

2025-07-01

How to Cite

Putra, F. P. E., Dafid, M., & Syafi’i, I. (2025). Firewall Implementation as a Computer Network Security Strategy for Data Protection. Brilliance: Research of Artificial Intelligence, 5(1), 291–297. https://doi.org/10.47709/brilliance.v5i1.6162

Most read articles by the same author(s)

1 2 > >> 

Similar Articles

<< < 10 11 12 13 14 15 16 17 18 19 > >> 

You may also start an advanced similarity search for this article.