RANCANG BANGUN SISTEM LOGGING JARINGAN BERBASIS WEB DENGAN VISUALISASI INTERAKTIF GRAFANA UNTUK ANALISIS AKTIVITAS IP MENCURIGAKAN
DOI:
https://doi.org/10.23960/jitet.v14i1.8200Abstract Views: 49 File Views: 30
Keywords:
Brute Force, PLG Stack, Grafana, Log jaringanAbstract
Perkembangan teknologi jaringan meningkatkan ancaman siber seperti brute force dan port scanning, yang sulit dideteksi karena analisis log masih dilakukan secara manual. Penelitian ini merancang Sistem Logging Jaringan Berbasis Web dengan visualisasi interaktif menggunakan Grafana untuk menganalisis aktivitas IP mencurigakan secara real-time. Metode yang digunakan adalah Research and Development (R&D) dengan arsitektur PLG Stack (Promtail, Loki, Grafana) yang dijalankan pada Docker Compose di Ubuntu Server. Log dari Rsyslog dikumpulkan dan divisualisasikan menggunakan LogQL. Hasil menunjukkan sistem berjalan stabil dengan waktu respon 3–5 detik dan akurasi deteksi brute force sebesar 98,5%. Sistem ini efektif sebagai early warning system ringan, memberikan visualisasi cepat dan efisien dalam membantu administrator mendeteksi ancaman keamanan jaringan.
Downloads
References
A. Rahman, “Network Security Threats and Mitigation Strategies in Cloud-Based Infrastructure,” IEEE Access, vol. 12, pp. 95567–95580, 2024.
D. Kiswanto, R. Surbakti, A. Y. Ritonga, and H. A. Nasution, “Pengembangan dan Implementasi Sistem Deteksi Serangan DDoS Berbasis Algoritma Random Forest,” Bulletin of Information Technology (BIT), vol. 6, no. 3, pp. 247–256, 2025.
F. Arifin and S. Lestari, “Implementasi Containerization untuk Efisiensi Sistem Monitoring Jaringan,” Jurnal Teknologi Informasi dan Komunikasi Terapan, vol. 9, no. 2, pp. 45–53, 2024.
D. Nuraini, R. Hidayat, and L. Santoso, “Real-Time Network Monitoring using Prometheus and Grafana Integration,” International Journal of Computer Applications, vol. 182, no. 14, pp. 21–28, 2022.
M. Prasetyo and A. Ramadhan, “Hybrid Log Analysis for Threat Visualization in Network Infrastructure,” Journal of Information Security and Data Systems, vol. 8, no. 3, pp. 89–97, 2023.
L. Chen, “Docker-Based Modular Infrastructure for Scalable Network Monitoring Systems,” Applied Computing and Informatics, vol. 20, no. 1, pp. 12–20, 2024.
M. A. Zeeshan, “Network Monitoring Using Grafana: An Integrated Approach for Enterprise Infrastructure
Management,” International Journal of Engineering Research and Applications, vol. 15, no. 8, pp. 1–5, 2025.
R. Nugraha and F. Kurniawan, “Real-Time Network Behavior Analysis for Malware Detection Using Flow Monitoring,” Jurnal Teknologi Informasi dan Keamanan Siber, vol. 9, no. 1, pp. 22–30, 2024.
S. Akhter, M. Rahman, and T. Alam, “Docker Performance Evaluation across Operating Systems,” Applied Sciences, vol.
, no. 15, p. 6672, 2024.
M. Hidayat and D. Rahmawati, “Analysis of Docker Container Implementation in SIEM Infrastructure,” Journal of Applied Informatics and Computing, Politeknik Negeri Batam, 2023.
M. D. Elradi, “Prometheus & Grafana: A Metrics-Focused Monitoring Stack,” Journal of Computer Allied Intelligence, vol. 3, no. 3, pp. 28–39, 2025.
M. Marwan, M. Khalid, and N. Azmi, “The Analysis of Honeypot Performance Using Grafana Loki and ELK Stack Visualization,” Info Sains: Jurnal Ilmiah Teknologi Informasi, vol. 5, no. 3, pp. 12–20, 2023.
J. González, L. Pacheco, and D. Vega, “How Qonto Used Grafana Loki to Build Its Network Observability Platform,” Grafana Labs Technical Report, 2023. [Online]. Available: https://grafana.com/blog/2023/08/11/howqonto-used-grafana-loki-to-build-itsnetwork-observability-platform/
M. Bajpai, “Building Time-Series Data Monitoring Pipeline from the Cloud to Grafana,” International Journal for Multidisciplinary Research (IJFMR), vol. 5, no. 1, pp. 1–5, 2023.
Rachman, D. A., Muhyidin, Y., & Sunandar, M. A. (2023). Analysis Quality of Service of Internet Network Fiber to the Home Service PT. XYZ Using Wireshark. Jurnal Informatika dan Teknik Elektro Terapan (JITET), 11(3S1), 997–1006. https://doi.org/10.23960/jitet.v11i3s1.3436
I. Rahmadani, M. Yusuf, and P. Andika, “Integrating Data Stream Processing for Real-Time Network Analysis Using Grafana,” Jurnal Ilmu Komputer Terapan, vol. 8, no. 1, pp. 45–53, 2025.
W. Seo and W. Pak, “Real-Time Network Intrusion Prevention System Based on Hybrid Machine Learning,” IEEE Access, vol. 9, pp. 46386–46397, 2021.
R. Pratama and D. Sari, “Centralized LogBased Detection of Anomalous IP Activity in Local Networks,” Jurnal Teknologi Informasi dan Komputer, vol. 10, no. 2, pp. 56–63, 2024.
H. Li, K. Zhang, and L. Yu, “Network Intrusion Detection Using Deep
Autoencoder Models,” IEEE Access, vol.
, pp. 101233–101245, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Jurnal Informatika dan Teknik Elektro Terapan

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.



