Implementasi Firewall Untuk Keamanan Dan Pencegahan Serangan Siber Di SMAI Kepanjen Kabupaten Malang

Authors

  • Yuri Ariyanto Politeknik Negeri Malang
  • Yan Watequlis Syaifudin Politeknik Negeri Malang
  • Budi Harijanto Politeknik Negeri Malang
  • Chandrasena Setiadi Politeknik Negeri Malang
  • M Hasyim Ratsanjani Politeknik Negeri Malang
  • Hendra Pradibta Politeknik Negeri Malang
  • Ali Ridho Muladawila Politeknik Negeri Malang
  • Didik Sunariyanto SMA Islam Kepanjen Kabupaten Malang

DOI:

https://doi.org/10.33795/abdimas.v12i2.7637

Keywords:

Wazuh, Network Security, Community Service Program, Cyber Threat, Network Infrastructure

Abstract

The implementation of a firewall-based network security system has become increasingly important in maintaining data integrity and availability within educational institutions. The Community Service Program (PPM) conducted by Politeknik Negeri Malang aims to enhance the network security infrastructure at SMA Islam Kepanjen, Malang Regency, through the implementation of Wazuh as a cybersecurity solution. This approach includes the installation and configuration of network infrastructure, security audits, and training for IT staff on independent firewall management. The implementation methodology involves site surveys, network topology design, hardware and software installation, system testing, and technical mentoring. The outcomes achieved include increased awareness of cybersecurity issues and improved capacity of partner personnel in managing the network infrastructure. With the implementation of Wazuh, it is expected that SMA Islam Kepanjen will be able to proactively address cyber threats and serve as a model for information technology implementation in other schools across Malang Regency.

Author Biography

Yuri Ariyanto, Politeknik Negeri Malang

Jurnal Pengabdian Kepada Masyarakat <strong>(J-ABDIMAS)</strong> merupakan jurnal pengabdian kepada masyarkat yang diterbitkan oleh (UPT) Penelitian dan Pengabdian Masyarakat (P2M) dan dikelola oleh Jurusan Administrasi Niaga Politeknik Negeri Malang dengan Nomor Registrasi ISSN 2407-4357 (Print) dan 2807-9353 (Online). Terbit pertama kali bulan Desember 2014, dan diterbitkan 2 kali dalam setahun yaitu pada bulan (Juni dan Desember). Setiap manuskrip yang dikirimkan akan melalui proses peer-review dengan metode double-blind. <strong>J-ABDIMAS</strong> diharapakan mampu menjadi media komunikasi dan sosialisasi seluruh civitas akademika terkait dengan hasil inovasi dan solusi dalam berbagai permasalahan yang terjadi di masyarakat. Redaktur mengundang para penulis untuk menyumbangkan artikel hasil Pengabdian Kepada Masyarakat dalam bidang IpTek , Bisnis dan Umum.

References

Abu, M. S., Selamat, S. R., Ariffin, A., & Yusof, R. (2018). Cyber threat intelligence–issue and challenges. Indonesian Journal of Electrical Engineering and Computer Science, 10(1), 371–379.

Amami, R., Charfeddine, M., & Masmoudi, S. (2024). Exploration of Open Source SIEM Tools and Deployment of an Appropriate Wazuh-Based Solution for Strengthening Cyberdefense. 2024 10th International Conference on Control, Decision and Information Technologies (CoDIT), 1–7.

Ariyanto, Y. (2023). Single Server-Side and Multiple Virtual Server-Side Architectures: Performance Analysis on Proxmox Ve for E-Learning Systems. Journal of Engineering and Technology for Industrial Applications, 9(44), 25–34. https://doi.org/10.5935/jetia.v9i44.903

Ariyanto, Y., Harijanto, B., Firdaus, V. A. H., & Arief, S. N. (2020). Performance analysis of Proxmox VE firewall for network security in cloud computing server implementation. IOP Conference Series: Materials Science and Engineering, 732(1). https://doi.org/10.1088/1757-899X/732/1/012081

Ariyanto, Y., Syaifudin, Y. W., Ratsanjani, M. H., Muladawila, A. R., Fatmawati, T., Saputra, P. Y., & Setiadi, C. (2025). Cyber Threat Detection and Automated Response Using Wazuh and Telegram API. MATRIK : Jurnal Manajemen, Teknik Informatika Dan Rekayasa Komputer, 25(1), 173–188. https://doi.org/10.30812/matrik.v25i1.5610

Ashiq, H., Gul, N., Haleema, N., & Hameed, U. B. A. (2024). Cyber Anomalies Detection of using ML with Wazuh/ELK (CADM).

Azzahra, N. S., Tambunan, A. M., Aulia, N. N., Binarsih, A., & Saepudin, T. H. (2024). Tinjauan Literatur Tentang Ancaman Cybercrime Dan Implementasi Keamanan Siber Di Industri Perbankan. HUMANITIS: Jurnal Homaniora, Sosial Dan Bisnis, 2(7), 692–700.

Bhasin, V., Kumar, S., Saxena, P. C., & Katti, C. P. (2020). Security architectures in wireless sensor networks. International Journal of Information Technology, 12(1), 261–272.

Dumitrasc, V. (2023). Anomaly Detection Through User Behaviour Analysis. Universitat Politécnica de Catalunya.

Khan, A. W., Zaib, S., Khan, F., Tarimer, I., Seo, J. T., & Shin, J. (2022). Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approach. IEEE Access, 10, 65044–65054. https://doi.org/10.1109/ACCESS.2022.3179822

Khraisat, A., & Alazab, A. (2021). A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4(1). https://doi.org/10.1186/s42400-021-00077-7

Malik, P., Nautiyal, L., & Ram, M. (2022). Machine Learning for Cyber Security. In Machine Learning for Cyber Security. https://doi.org/10.1515/9783110766745

Moiz, S., Majid, A., Basit, A., Ebrahim, M., Abro, A. A., & Naeem, M. (2024). Security and threat detection through cloud-based Wazuh deployment. 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC), 1–5.

Pérez, A., Moltó, G., Caballer, M., & Calatrava, A. (2018). Serverless computing for container-based architectures. Future Generation Computer Systems, 83, 50–59. https://doi.org/10.1016/j.future.2018.01.022

Pujiantoro, M. A. R., & Nugraha, I. F. (2025). MARITIME CYBERSECURITY: TANTANGAN DALAM PENGELOLAAN INFRASTRUKTUR KABEL BAWAH LAUT PADA PERAIRAN INTERNASIONAL. Jurnal Integrasi Pengetahuan Disiplin, 6(1).

Stanković, S., Gajin, S., & Petrović, R. (2022). A review of Wazuh tool capabilities for detecting attacks based on log analysis. No Nama Agent Integrity File Added Delete Modified, 1.

Sun, N., Ding, M., Jiang, J., Xu, W., Mo, X., Tai, Y., & Zhang, J. (2023). Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Communications Surveys & Tutorials, 25(3), 1748–1774.

Sun, P. J. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160,https://doi.org/10.1016/j.jnca.2020.102642

Downloads

Published

2025-12-31