Firewall Implementation as a Computer Network Security Strategy for Data Protection
DOI:
https://doi.org/10.47709/brilliance.v5i1.6162Keywords:
Network Security, Firewall, Computer Network, Data ProtectionAbstract
Computer network security plays a crucial role in ensuring the integrity, confidentiality, and availability of data in the modern digital era. One of the primary tools used to safeguard networks from unauthorized access and external threats is the firewall. This paper explores the significance of firewalls in protecting network systems by examining their functions, various types, and capability to regulate data traffic. Firewalls work by enforcing specific rules to limit access, effectively reducing the risk of cyber threats such as malware, hacking attempts, and unauthorized intrusions. The study also involves practical observation of firewall implementation in a real network setup to evaluate their efficiency in mitigating security risks. Findings indicate that properly configured firewalls can considerably strengthen a network’s defense. Nevertheless, relying solely on firewalls is insufficient. They should be supported by additional security technologies and best practices to achieve comprehensive network protection. In conclusion, firewalls are essential elements in upholding the reliability and safety of computer networks.
References
Affandi, M. (2022). Implementasi virtual private network (VPN) OpenVPN dengan keamanan sertifikat SSL pada network attached storage (NAS) FreeNAS. Jurnal Impresi Indonesia, 1(12), 1329–1341. https://doi.org/10.58344/jii.v1i12.748
Syahab, A. S. (2023). Analisis audit keamanan informasi website menggunakan metode Network Mapper dan Qualys SSL. Jurnal Manajemen Informatika dan Sistem Informasi, 6(1), 39–47. https://doi.org/10.36595/misi.v6i1.742
Alfredo, M. J., & Sulistyo, W. (2023). Perancangan sistem keamanan jaringan berbasis hierarchical network design. IT-Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi, 2(1), 48–62. https://doi.org/10.24246/itexplore.v2i1.2023.pp48-62
Arbie, F. R., & Raharjo, M. (2024). Implementasi keamanan jaringan dengan metode security profiles menggunakan Fortigate pada Komisi Aparatur Sipil Negara. Jurnal Informatika Terpadu, 10(1), 27–34. https://doi.org/10.54914/jit.v10i1.1060
Ariyadi, T., & Pohan, M. R. (2023). Implementation of penetration testing tools to test Wi-Fi security levels at the Directorate of Innovation and Business Incubators. Jurnal Penelitian Pendidikan IPA, 9(12), 10768–10775. https://doi.org/10.29303/jppipa.v9i12.5551
Asian, J., Erlangga, D., & Ayu, M. (2024). Data exfiltration anomaly detection on enterprise networks using deep packet inspection. MATRIK: Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, 22(3), 665–672. https://doi.org/10.30812/matrik.v22i3.3089
Eka Putra, F. P., Hamzah, A., Agel, W., & Kusuma, R. O. F. (2024a). Impelementasi sistem keamanan jaringan Mikrotik menggunakan firewall filtering dan port knocking. Jurnal Sistim Informasi dan Teknologi, 5(4), 82–87. https://doi.org/10.60083/jsisfotek.v5i4.329
Fajrin, B. S., Priatno, P., & Effendi, M. R. (2014). Penerapan sistem keamanan jaringan menggunakan VPN dengan metode PPTP pada PT Hinoka Sinergi Tanyo. Jurnal Sistem Informasi Universitas Suryadarma, 11(2). https://doi.org/10.35968/jsi.v11i2.1252
Gamaliel, F., & Arliyanto, P. Y. D. (2023). Perancangan jaringan WiFi dengan menggunakan top down network design. Jurnal Informatika dan Rekayasa Elektronik, 6(2), 140–147. https://doi.org/10.36595/jire.v6i2.819
Gunawan, A., Rahmah, R., & Iskandar, A. (2023). Rancang bangun jaringan hotspot menggunakan LINUX ClearOS dengan konsep security gateway. JTIM: Jurnal Teknologi Informasi dan Multimedia, 4(4), 272–280. https://doi.org/10.35746/jtim.v4i4.251
Haris, A. I., Riyanto, B., Surachman, F., & Ramadhan, A. A. (2022). Analisis pengamanan jaringan menggunakan router Mikrotik dari serangan DoS dan pengaruhnya terhadap performansi. Komputika: Jurnal Sistem Komputer, 11(1), 67–76. https://doi.org/10.34010/komputika.v11i1.5227
Herdiantoro, H. R., & Islami, M. R. R. (2023). Implementasi two-factor authentication (2FA) dan firewall policies dalam mengamankan website. Jurnal Mahasiswa Ilmu Komputer, 4(1), 1–9. https://doi.org/10.24127/ilmukomputer.v4i1.3300
Innuddin, M., Irfan, P., & Hammad, R. (2023). Meningkatkan keamanan web server Nginx dengan NAXSI sebagai web application firewall. Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM), 4(2), 148–156. https://doi.org/10.31102/jatim.v4i2.2310
Insani, P. P., Kanedi, I., & Akbar, A. A. (2023). Implementation of Snort as a wireless network security detection tool using Linux Ubuntu. Jurnal Komputer, Informasi dan Teknologi, 3(2). https://doi.org/10.53697/jkomitek.v3i2.1488
Liu, Y., Tantithamthavorn, C., Li, L., & Liu, Y. (2022). Deep learning for Android malware defenses: A systematic literature review. ACM Computing Surveys, 55(8). https://doi.org/10.1145/3544968
Maulana, A., Suharto, N., & Hariyadi, A. (2023). Application of MikroTik firewall for website access restriction and prevention of DoS (Denial of Service) attacks on internet networks Al-Mahrusiyah Vocational School Lirboyo. Jartel, 13(1). https://doi.org/10.33795/jartel.v13i1.547
Mendrofa, Y., & Fauzi, R. (2023). Implementasi keamanan jaringan menggunakan port knocking. Computer and Science Industrial Engineering (COMASIE), 9(7), 30. https://doi.org/10.33884/comasiejournal.v9i7.7890
Ilham, M., Gunawan, I., & Siregar, Z. A. (2022). Keamanan jaringan WLAN dengan metode firewall filtering menggunakan Mikrotik pada SMP Negeri 1 Dolok Merawan. Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer, 2(3), 01–16. https://doi.org/10.55606/juisik.v2i3.309
Mohamed, M., & Alosman, K. (2024). A comprehensive machine learning framework for robust security management in cloud-based Internet of Things systems. Jurnal Kejuruteraan, 36(3), 1055–1065. https://doi.org/10.17576/jkukm-2024-36(3)-18
Mohammadzadeh, A., Taghavifar, H., Zhang, Y., & Zhang, W. (2024). A fast nonsingleton Type-3 fuzzy predictive controller for nonholonomic robots under sensor and actuator faults and measurement errors. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 54(7), 4175–4187. https://doi.org/10.1109/TSMC.2024.3375812
Naufal, F. M., Vahlevi, M. R., Widayana, A., Zulfa, M. L., & Juardi, D. (2022). Implementasi keamanan hotspot menggunakan proxy dan firewall dalam mengatasi resiko ancaman serangan. Jurnal Ilmiah Rekayasa dan Manajemen Sistem Informasi, 8(2), 148. https://doi.org/10.24014/rmsi.v8i2.17691
Nurdin Prasetiyawan, A., Stiyo Budi, B., Abdillah, M. F., & Riyadi, S. (2024). Sistem keamanan jaringan deteksi dan blok trafic Browsec VPN melalui Mikrotik. Jurnal Sistem Informasi Aplikasi Teknologi Informasi, 1(2). https://doi.org/10.53567/josiati.v1i2.17
Peniarsih, P., & Iswandir, I. (2014). Firewall dan iptables pada jaringan komputer. Jurnal Sistem Informasi Universitas Suryadarma, 11(2). https://doi.org/10.35968/jsi.v11i2.1241
Permana, H., & Mitro, S. (2024). Proteksi internet di SMKN 3 Pandeglang menggunakan firewall. Power Elektronik: Jurnal Orang Elektro, 12(3), 192–195. https://doi.org/10.30591/polektro.v12i3.6073
Putri, H. A., Djibran, N., & Tulloh, R. (2023). Implementation of next-generation firewalls to protect applications from malware attacks. Jurnal Indonesia Sosial Teknologi, 4(11), 1961–1970. https://doi.org/10.59141/jist.v4i11.797
Puntadheva, S. A., Kusumaningsih, R. Y. R., & Triyono, J. (2023). Perancangan keamanan jaringan komputer menggunakan firewall intrusion detection system (IDS) terhadap serangan brute force dan implementasi ARP list. Jurnal Jarkom, 10(2), 32–37. https://doi.org/10.34151/jarkom.v10i2.4482
Sari, Y. N., Irfan, D., & Huda, A. (2022). Network security analysis using virtual private network in vocational school. Jurnal Paedagogy, 9(3), 582. https://doi.org/10.33394/jp.v9i3.5346
Satria, A., & Ramadhani, F. (2023). Analisis keamanan jaringan komputer dengan menggunakan switch port security di Cisco Packet Tracer. Sudo Jurnal Teknik Informatika, 2(2), 52–60. https://doi.org/10.56211/sudo.v2i2.260
Styorini, W., Azwar, H., & Susantok, M. (2024). Implementasi firewall pada laboratorium jaringan komputer SMAIT AL-ITTIHAD. JITER-PM (Jurnal Inovasi Terapan - Pengabdian Masyarakat), 2(1), 38–44. https://doi.org/10.35143/jiter-pm.v2i1.6162
Subakti, A. J. (2023). Analysis of Lapan security access based on firewall log in Center Eight. Jurnal Manajemen Informatika Medicom (JMI), 11(1), 26–31. https://doi.org/10.35335/jmi.v11i1.52
Syafi’i Bachtiar, M., Rahaningsih, N., & Danar Dana, R. (2024). Firewall filtering berbasis deep packet inspection dalam mendeteksi dan mencegah ancaman malware. JATI (Jurnal Mahasiswa Teknik Informatika), 8(1), 399–405. https://doi.org/10.36040/jati.v8i1.8387
Syamsu, M., & Widodo, W. (2022). Implementasi arsitektur firewall sebagai sistem keamanan jaringan WiFi 802.11ax Aruba Software Defined WAN (SD-WAN). Jurnal Teknologi Informasi (JUTECH), 3(2), 141–157. https://doi.org/10.32546/jutech.v3i2.2033
Syaputera, A., Riska, R., & Mardiana, Y. (2023). Hotspot network security system from brute force attack using pfSense external firewall (Case study of Wifi-Ku.Net Hotspot). Jurnal Komputer, Informasi dan Teknologi, 3(1). https://doi.org/10.53697/jkomitek.v3i1.1286
Wadly, F., Septian, R., & Ramadhan, Z. (2023). Strategi penanggulangan kelemahan terhadap ancaman keamanan pada jaringan wireless. Jurnal Nasional Teknologi Komputer, 3(2), 59–67. https://doi.org/10.61306/jnastek.v3i2.89
Wang, S., Xu, W., & Liu, Y. (2023). Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things. Computer Networks, 235, 109982. https://doi.org/10.1016/j.comnet.2023.109982
Wang, X., Wu, Z., Jia, M., Xu, T., Pan, C., Qi, X., & Zhao, M. (2023). Lightweight SM-YOLOv5 tomato fruit detection algorithm for plant factory. Sensors, 23(6), Article 3336. https://doi.org/10.3390/s23063336
Wowor, H. G. A., Sudirman, A., & Hakiki, F. (2024). China’s Great Firewall: Cybersecurity as strategy for building world cyberpower. JISPO: Jurnal Ilmu Sosial dan Ilmu Politik, 13(2), 193–232. https://doi.org/10.15575/jispo.v13i2.27713
Yuliandari, D., Walim, W., Raja, B. K., Ningsih, R., & Wahidin, A. J. (2023). Simulasi penerapan sistem monitoring jaringan Snort NIDS pada web server menggunakan metode SPDLC. Jurnal Infortech, 5(2), 133–138. https://doi.org/10.31294/infortech.v5i2.17338
Yusril Amru, & Ermadi Satriya Wijaya. (2022). Analisis penerapan Sangfor NGAF firewall sebagai keamanan pada jaringan internet Universitas Muhammadiyah Purwokerto. Jurnal Sistem Informasi (JUSIN), 3(2), 55–66. https://doi.org/10.32546/jusin.v3i2.1959
Zhou, L., Leng, S., Wang, Q., & Liu, Q. (2023). Integrated sensing and communication in UAV swarms for cooperative multiple targets tracking. IEEE Transactions on Mobile Computing, 22(11), 6526–6542. https://doi.org/10.1109/TMC.2022.3193499
Zulmy Alhamri, R., Eliyen, K., & Heriadi, A. (2023). Pengembangan aplikasi remote berbasis Android untuk konfigurasi intrusion prevention system memanfaatkan Internet of Things. Jurnal Mnemonic, 6(2), 135–148. https://doi.org/10.36040/mnemonic.v6i2.6727
Zy, A. T., Isarianto, Rifai, A. M., Nugroho, A., & Ghofir, A. (2025). Enhancing network security: Evaluating SDN-enabled firewall solutions and clustering analysis using K-means through data-driven insights. Jurnal RESTI, 9(1), 69–76. https://doi.org/10.29207/resti.v9i1.6056
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Fauzan Prasetyo Eka Putra, Mohammat Dafid, Imam Syafi’i

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.















