IMPLEMENTASI SISTEM KEAMANAN JARINGAN BERBASIS WEB: LOGGING, DETEKSI ANOMALI DAN PEMBLOKIRAN OTOMATIS
DOI:
https://doi.org/10.23960/jitet.v14i1.8230Abstract Views: 71 File Views: 33
Keywords:
Logging; Deteksi Anomali; Pemblokiran Otomatis; Brute Force; Keamanan Web.Abstract
This research aims to implement a web-based network security system that integrates logging, anomaly detection, and automatic blocking capabilities against suspicious activities. The significance of this topic is underpinned by the increasing cyber threats, such as brute force and high request rate attacks, which directly jeopardize system availability. The system is designed using Python Flask and PostgreSQL as the server architecture, employing a Rule-Based detection method to identify specific attack patterns. Testing with Kali Linux simulations proved that the system was 100% effective in successfully providing alerts and effectively blocking attacker IPs. The successful implementation of this internal IPS (Intrusion Prevention System) is validated by the server's denial of access and the display of the message "IP Anda sedang diblokir sementara" ("Your IP is temporarily blocked") on the attacker's browser , demonstrating real-time mitigation. This implementation shows that the system can be an adaptive, proactive solution serving as an additional layer of security within web-based network environments.
Downloads
References
R. C. Tarumingkeng, Manajemen Risiko Siber. Rudyct E-Press, 2025
A. Kurniawan And L. M. Silalahi, "Analisis Keamanan Jaringan Menggunakan Intrusion Prevention System (Ips) Dengan Metode Traffic Behavior," Electrician - Jurnal Rekayasa Dan Teknologi Elektro, Vol. 11, No. 1, Pp. 1–16, 2023
D. Kiswanto, F. Ramadhani, N. M. Surbakti, And N. A. Nasution, "Pengembangan Dan Implementasi Sistem Deteksi Serangan Ddos Berbasis Algoritma Random Forest," Bulletin Of Information Technology (Bit), Vol. 6, No. 3, Pp. 247–256, 2025.
R. Nursiaga, N. Mulyana, H. Sanjaya, And G. Santoso, "Model Jaringan Neural Untuk Deteksi Anomali Pada Sistem Keamanan (Siber): Rancangan, Implementasi, Dan Analisis," Jarekom: Jurnal Jaringan Dan Rekayasa Komputer, Vol. 1, No. 1, Pp. 1–11, 2025.
A. R. Nisa, A. D. Wijayanto, A. P. J. Priana, And A. Setiawan, "Analisis Log Server Untuk Mendeteksi Serang Ddos Pada Keamaan Jaringan Di Website," Journal Of Internet And Software Engineering, Vol. 1, No. 3, Pp. 1–17, 2024.
J. U. Usla And A. Ikhwan, "Web Based Social Assistance Distribution Monitoring System Using Waterfall Method," Journal Of Computer Networks, Architecture And High Performance Computing, Vol. 5, No. 1, 2023.
S. Munawaroh, “Mengeksplorasi Database Postgresql Dengan Pgadmin Iii”, Jurnal Teknologi Informasi Dinamik, Vol. X, No. 2, Pp. 103-107, 2005.
P. A. C. Setiawan, I. A. D. Giriantari, And N. Indra, “Tinjauan Literatur: Deteksi Anomali Berbasis Analisis Waktu Pada Can Bus Kendaraan Listrik”, Jurnal Ilmiah Teknik Elektro, Vol. 6, No. 1, Pp. 72-84, 2025.
B. Arifwidodo, Y. Syuhada, And S. Ikhwan, "Analisis Kinerja Mikrotik Terhadap Serangan Brute Force Dan Ddos," Techno.Com, Vol. 20, No. 3, Pp. 392–399, Aug. 2021.
A.C. Darmawan, “Pengembangan Aplikasi Berbasis Web Dengan Python Flask Untuk Klasifikasi Data Menggunakan Metode Decision Tree C4.5”, Uii, Yogyakarta, 2023.
Y. T. Bota, N. Setiawati, “Pengembangan Sistem Informasi Perantara Bisnis Menggunakan Framework Flask”, Vol.3, No.2, Pp.79-93, 2022.
A. F. Oklilas And S. Pangestu, "Dashboard Monitoring Perangkat It Berbasis Website Pada Pt Kpi Ru Iii Plaju," Jitet (Jurnal Informatika Dan Teknik Elektro Terapan), Vol. 12, No. 3, Pp 3665-3674, 2024.
T. Yusnanto, M. A. Muin, And S. Wahyudiono, “Analisa Infrastruktur Jaringan Wireless Dan Local Area Network (Wlan) Meggunakan Wireshark Serta Metode Penetration Testing Kali Linux”, Journal On Education, Vol.4, No.04, pp 1470-1476, 2022.
A. M. A. Rudianto, E. S. Pramukantoro, And D. Kurnianingtyas, "Implementasi Sistem Deteksi Anomali Pada Jaringan Komputer Dengan Pendekatan Xgboost Dan Data Snmp," Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, Vol. 9, 2025.
Nurhayati, Atthariq, And Aswandi, "Implementasi Keamanan Jaringan Dengan Metode Web Application Firewall (Waf)," Jurnal Teknologi Rekayasa Informasi Dan Komputer, Vol. 8, No. 2, Pp. 48–56, 2022.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Jurnal Informatika dan Teknik Elektro Terapan

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.



