Implementasi Threat Mitigation dan Traffic Policy Menggunakan Utm pada Jaringan Tcp/Ip

Penulis

  • M. Reza Hidayat Universitas Jenderal Achmad Yani, Cimahi
  • Ruben Saragih Universitas Jenderal Achmad Yani, Cimahi
  • Sofyan Basuki Universitas Jenderal Achmad Yani, Cimahi
  • Atik Charisma Universitas Jenderal Achmad Yani, Cimahi
  • Antrisha Daneraici Setiawan Universitas Jenderal Achmad Yani, Cimahi

DOI:

https://doi.org/10.25126/jtiik.20241127528

Abstrak

Penelitian bertujuan merancang Unified Threat Management (UTM) berbasis aplikasi open-source yang mampu melakukan Threat Mitigation dan menerapkan manajemen trafik pada jaringan TCP/IP. Metoda Threat Mitigation menggunakan SNORT sebagai Intrusion Prevention System (IPS) untuk melakukan tindakan terhadap ancaman serta melakukan monitoring trafik yang diintegrasikan dengan aplikasi Splunk sebagai Security Information and Event Management (SIEM). Metoda Traffic Policy menggunakan SQUID sebagai Proxy untuk melakukan manajemen trafik. Pengujian perfomansi jaringan dilakukan dengan mengukur parameter Quality of Service (QOS) terlebih dahulu pada setiap perangkat akses untuk melihat performansi jaringan saat terjadi serangan sebelum dan sesudah implementasi UTM. Serangan Distributed Denial of Service (DDOS) berupa Internet Control Message Protocol (ICMP) Flood dan SYN Flood. Setelah melakukan simulasi serangan DDOS selama 5 menit, Threat Mitigation mampu melakukan drop terhadap paket yang berasal dari serangan DDOS sebanyak 232409 paket dengan nilai throughput maksimum 1,823 Mbps, lebih baik dari throughput yang dihasilkan serangan DDOS sebelum implementasi UTM yaitu 869 Mbps. Hasil indeks parameter QOS setiap perangkat akses jaringan memiliki nilai indeks 4, lebih baik dari indeks parameter QOS sebelum implementasi UTM yaitu 2,843. Traffic Policy pada UTM mampu melakukan efisiensi bandwidth sebesar 4,66% atau 943,6645 MB dari total volume cache 20,23 GB, dengan menerapkan web cache untuk akses Hyper Text Transfer Proctocol (HTTP) dan limitasi throughput sebesar 300 KB pada ekstensi file image, audio, video dan executeable berukuran diatas 20 MB.

 

Abstract

This final project aims to design Unified Threat Management (UTM) based on open-source application that capable to mitigate threat and implement traffic management on TCP/IP network. Threat Mitigation method uses SNORT as Intrusion Prevention System (IPS) and integrated with Splunk as Security Information and Event Management (SIEM). Traffic Policy method use SQUID as Proxy to implement traffic management. Network performance testing will be carried out by measuring the QOS parameters on each access device to be able to see network performance when an attack occurs before and after UTM implementation. The Denial Distributed of Service attacks was simulated with Internet Control Message Protocol (ICMP) Flood and SYN Flood. After simulating DDOS attack for 5 minutes, Threat Mitigation was able to drop 232409 packet that originating from DDOS attack with a maximum throughput value 1.823 Mbps, was better before implementation of UTM which is 869 Mbps. The result of the QOS index parameters for each access device has an index value is 4, was better than before implementation of UTM, which is 2.843. Traffic Policy was able to perform bandwidth efficiency of 4.66% or 943.6645 MB from a total cache volume of 20.23 GB, by implementing web cache for Hyper Text Transfer Protocol (HTTP) access and limiting throughput of 300 KB of image, audio, video and executable file size above 20 MB.

Downloads

Download data is not yet available.

Referensi

A. HAFIZ & D. SUSIANTO, “Analysis of Internet Service Quality Using Internet Control Message Protocol,” J. Phys. Conf. Ser., vol. 1338, no. 1, 2019, doi: 10.1088/1742-6596/1338/1/012055.

ALISYA ALIFAH & ANTRISHA DANERAICI SETIAWAN, “Performansi Jaringan VOIP Terhadap Peningkatan Pengguna Pada Variasi Bandwidth Menggunakan GNS3 dan Wireshark” Journal of Electrical Engineering and Information Technology., vol. 18, no. 3, E-ISSN: 2745-5688, P-ISSN:1693-4989 , Desember 2020.

B. HERU & W. HENTO, “KEAMANAN JARINGAN MENGGUNAKAN UNIFIED THREAT MANAGEMENT PADA SERVER BERBASISKAN LINUX,” pp. 48–59. BROUGHTON, J.M., 2002a. The Brettow Woods Proposal: a Brief Look. Political Science Quarterly, 42(6), p.564.

E. RISYAD, M. DATA, & E. S. PRAMUKANTORO, “Perbandingan Performa Intrusion Detection System ( IDS ) Snort Dan Suricata Dalam Mendeteksi Serangan TCP SYN Flood,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 9, pp. 2615–2624, 2018.GOALIE, D. 2008. Remote Sensing Technology for Modern Soccer. Popular science and Technology, [online] Tersedia di: <http://www.popsci.com/b012378/soccer.html> [Diakses 1 Juli 2009]

IMPERVA, “DDoS Attacks,” 2021. https://www.imperva.com/learn/ddos/ddos-attacks/.

J. M. SNYDER, “Unified Threat Management Agenda : Unified Threat Management.”

M. KOR, J. LÁMER, & F. JAKAB, “I NTRUSION P REVENTION / I NTRUSION D ETECTION S YSTEM ( IPS / IDS ) F OR W I F I N ETWORKS,” vol. 6, no. 4, pp. 77–89, 2014.CAKRANINGRAT, R., 2011. Sistem pendukung Keputusan untuk UMKM. [ebook]. UBX Press. Tersedia melalui: Perpustakaan Universitas BX <http://perpustakaan.ubx.ac.id> [Diakses 1 Juli 2013]

P. ENGEBRETSON, The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. Elsevier, 2013.

S. S.KADAM & Y. C. KULKARNI, “Improving the Performance of Squid Proxy Server by using SCSI HDD and Blocking the Media Streaming,” Int. J. Comput. Appl., vol. 47, no. 25, pp. 38–41, 2012, doi: 10.5120/7540-0547.

W. SUGENG, J. E. ISTIYANTO, K. MUSTOFA, & A. ASHARI, “The Impact of QoS Changes towards Network Performance,” Int. J. Comput. Networks Commun. Secur., vol. 3, no. 2, pp. 48–53,2015,[Online].Available:http://www.ijcncs.org/published/volume3/issue2/p5_3-2.pdf.

Unduhan

Diterbitkan

25-04-2024

Terbitan

Bagian

Ilmu Komputer

Cara Mengutip

Implementasi Threat Mitigation dan Traffic Policy Menggunakan Utm pada Jaringan Tcp/Ip. (2024). Jurnal Teknologi Informasi Dan Ilmu Komputer, 11(2), 437-446. https://doi.org/10.25126/jtiik.20241127528