ANALISIS DAN PERANCANGAN PRIVATE CLOUD STORAGE MENGGUNAKAN METODE IDS(INTRUSION DETECTION SYSTEM) DAN IPS(INTRUSION PREVENTION SYSTEM) STUDI KASUS DINAS KOMUNIKASI DAN INFORMATIKA KOTA PADANG PANJANG

Authors

  • Irzon Meiditra Universitas Putra Indonesia "YPTK" Padang
  • Yuhandri Universitas Putra Indonesia "YPTK" Padang
  • Sumijan Universitas Putra Indonesia "YPTK" Padang

DOI:

https://doi.org/10.30606/rjocs.v9i2.1781

Keywords:

Cloud Computing, Vmware, Proxmox, Ids, Ips

Abstract

The Office of Communication and Informatics of the City of Padang Panjang is an executive element of government affairs in the field of communication, informatics, coding and statistics and has the task of carrying out government affairs in the field of communication and informatics.  And the Communication and Informatics Office has a server storage service with lots of data. The development of a cloud computing server will be a solution.  Cloud computing is a form of technological progress that has developed along with the times, this has spurred the increasing use of the internet.  Using internet technology that is capable of implementing virtual/online servers, which has the goal of building a cloud computing server at the Padang Panjang City Communication and Information Service Operating System (OS) Proxmox VE (Virtual Environment). Cloud computing is a form of technological progress that has developed along with  progress of the times, this spurred the use of the internet which is increasing.  By using internet technology that is capable of implementing virtual/online servers, the aim is to build a cloud computing server at the Padang Panjang City Communication and Information Service Operating System (OS) Proxmox VE (Virtual Environment) 6.4.  Cloud computing is able to provide storage services that can be used simultaneously.  The results of this study produce a cloud Storage server that implements a security system using the ids (intrusion detection system) and ips (intrusion prevention system) methods that is capable of carrying out data storage processes (storage), using software simultaneously in the network, and using infrastructure within the scope of  cloud computing network at the Padang Panjang City Communication and Information Service using the private cloud Storage service model.

Downloads

Download data is not yet available.

References

S. Al-Ridwan Iqbaal, A. Maulana, and N. Sulistiyowati, “Analisis Quality Of Service (QOS) Pada Jaringan Internet Yayasan Rumah,” J. Ilm. Wahana Pendidik., vol. 8, no. 16, pp. 276–280, 2022, [Online]. Available: https://doi.org/10.5281/zenodo.7067627

Wawan Setiawan, Nurul Fajriyah, and Tobias Duha, “Analisa Layanan Cloud Computing Di Era Digital,” J. Inform., vol. 1, no. 1, 2022.

D. Satrinia, S. N. Yutia, and I. M. M. Matin, “Analisis Keamanan dan Kenyamanan pada Cloud Computing Dwina Satrinia #1 , Syifa Nurgaida Yutia #2 , Iik Muhamad Malik Matin #3,” J. Informatics Commun. Technol., vol. 4, no. 1, pp. 85–91, 2022.

E. Prasetyo, J. Dedy Irawan, and F. X. Ariwibisono, “Rancang Bangun Sistem Monitoring Server Virtual Berbasis Web Menggunakan Script Monitoring Pada Proxmox Virtual Environment,” JATI (Jurnal Mhs. Tek. Inform., vol. 6, no. 1, pp. 179–185, 2022, doi: 10.36040/jati.v6i1.4550.

D. Diana, I. Seprina, and S. O. Kunang, “Pelatihan Manajemen Penyimpanan Online (Cloud Storage) pada Guru SMP Al-Hamidiyah Palembang,” J. Pengabdi. Pada …, vol. 6, no. 4, pp. 1259–1267, 2021, doi: 10.30653/002.202164.841.

S. Khadafi, Y. D. Pratiwi, and E. Alfianto, “Keamanan Ftp Server Berbasiskan Ids Dan Ips Menggunakan Sistem Operasi Linux Ubuntu,” Netw. Eng. Res. Oper., vol. 6, no. 1, p. 11, 2021, doi: 10.21107/nero.v6i1.190.

F. Tanang Anugrah, S. Ikhwan, and J. Gusti A.G, “Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection,” Techné J. Ilm. Elektrotek., vol. 21, no. 2, pp. 199–210, 2022, doi: 10.31358/techne.v21i2.320.

M. Fadhlurrohman, A. Muliawati, and B. Hananto, “Analisis Kinerja Intrusion Detection System pada Deteksi Anomali dengan Metode Decision Tree Terhadap Serangan Siber Analysis of Intrusion Detection System Performance on Anomaly Detection with Decision Tree Method Against Cyber Attacks,” J. Ilmu Komput. Agri-Informatika, vol. 8, no. Pratomo 2016, pp. 90–94, 2021.

T. Widodo and A. S. Aji, “Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS),” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 7, no. 1, pp. 46–55, 2022, doi: 10.14421/jiska.2022.7.1.46-55.

R. Susanto, “Rancang Bangun Jaringan Vlan dengan Menggunakan Simulasi Cisco Packet Tracer,” J. Nas. Inform. dan Teknol. Jar., vol. 4, no. 2, pp. 1–6, 2020.

Z. Munawar, M. Kom, and N. I. Putri, “Keamanan Jaringan Komputer Pada Era Big Data,” J. Sist. Informasi-J-SIKA, vol. 02, pp. 14–20, 2020.

D. Santoso, A. Noertjahyana, and J. Andjarwirawan, “Implementasi dan Analisa Snort dan Suricata Sebagai IDS dan IPS Untuk Mencegah Serangan DOS dan DDOS,” J. Infra, vol. 10, no. 1, pp. 1–6, 2022, [Online]. Available: https://publication.petra.ac.id/index.php/teknik-informatika/article/view/12033

Muh. Miftakhun Nizar, R. Alit, and F. Prima Aditiawan, “Implementasi Metode Moora Pada Sistem Pendukung Keputusan Pemilihan Smartwatch Terbaik,” J. Inform. dan Sist. Inf., vol. 2, no. 1, pp. 34–42, 2021, doi: 10.33005/jifosi.v2i1.269.

R. Nindyasari, A. C. Murti, and M. I. Ghozali, “ANALISIS QoS (Quality of Service) JARINGAN UNBK DENGAN MENGGUNAKAN MICROTIC ROUTER (Studi Kasus : Jaringan UNBK SMAN 1 Jakenan Pati),” Netw. Eng. Res. Oper., vol. 4, no. 2, pp. 109–116, 2019, doi: 10.21107/nero.v4i2.126.

Additional Files

Published

31-07-2023

How to Cite

[1]
I. Meiditra, Yuhandri, and Sumijan, “ANALISIS DAN PERANCANGAN PRIVATE CLOUD STORAGE MENGGUNAKAN METODE IDS(INTRUSION DETECTION SYSTEM) DAN IPS(INTRUSION PREVENTION SYSTEM) STUDI KASUS DINAS KOMUNIKASI DAN INFORMATIKA KOTA PADANG PANJANG”, RJOCS , vol. 9, no. 2, pp. 124–133, Jul. 2023.