Implementasi Firewall Untuk Keamanan Dan Pencegahan Serangan Siber Di SMAI Kepanjen Kabupaten Malang
DOI:
https://doi.org/10.33795/abdimas.v12i2.7637Keywords:
Wazuh, Network Security, Community Service Program, Cyber Threat, Network InfrastructureAbstract
The implementation of a firewall-based network security system has become increasingly important in maintaining data integrity and availability within educational institutions. The Community Service Program (PPM) conducted by Politeknik Negeri Malang aims to enhance the network security infrastructure at SMA Islam Kepanjen, Malang Regency, through the implementation of Wazuh as a cybersecurity solution. This approach includes the installation and configuration of network infrastructure, security audits, and training for IT staff on independent firewall management. The implementation methodology involves site surveys, network topology design, hardware and software installation, system testing, and technical mentoring. The outcomes achieved include increased awareness of cybersecurity issues and improved capacity of partner personnel in managing the network infrastructure. With the implementation of Wazuh, it is expected that SMA Islam Kepanjen will be able to proactively address cyber threats and serve as a model for information technology implementation in other schools across Malang Regency.
References
Abu, M. S., Selamat, S. R., Ariffin, A., & Yusof, R. (2018). Cyber threat intelligence–issue and challenges. Indonesian Journal of Electrical Engineering and Computer Science, 10(1), 371–379.
Amami, R., Charfeddine, M., & Masmoudi, S. (2024). Exploration of Open Source SIEM Tools and Deployment of an Appropriate Wazuh-Based Solution for Strengthening Cyberdefense. 2024 10th International Conference on Control, Decision and Information Technologies (CoDIT), 1–7.
Ariyanto, Y. (2023). Single Server-Side and Multiple Virtual Server-Side Architectures: Performance Analysis on Proxmox Ve for E-Learning Systems. Journal of Engineering and Technology for Industrial Applications, 9(44), 25–34. https://doi.org/10.5935/jetia.v9i44.903
Ariyanto, Y., Harijanto, B., Firdaus, V. A. H., & Arief, S. N. (2020). Performance analysis of Proxmox VE firewall for network security in cloud computing server implementation. IOP Conference Series: Materials Science and Engineering, 732(1). https://doi.org/10.1088/1757-899X/732/1/012081
Ariyanto, Y., Syaifudin, Y. W., Ratsanjani, M. H., Muladawila, A. R., Fatmawati, T., Saputra, P. Y., & Setiadi, C. (2025). Cyber Threat Detection and Automated Response Using Wazuh and Telegram API. MATRIK : Jurnal Manajemen, Teknik Informatika Dan Rekayasa Komputer, 25(1), 173–188. https://doi.org/10.30812/matrik.v25i1.5610
Ashiq, H., Gul, N., Haleema, N., & Hameed, U. B. A. (2024). Cyber Anomalies Detection of using ML with Wazuh/ELK (CADM).
Azzahra, N. S., Tambunan, A. M., Aulia, N. N., Binarsih, A., & Saepudin, T. H. (2024). Tinjauan Literatur Tentang Ancaman Cybercrime Dan Implementasi Keamanan Siber Di Industri Perbankan. HUMANITIS: Jurnal Homaniora, Sosial Dan Bisnis, 2(7), 692–700.
Bhasin, V., Kumar, S., Saxena, P. C., & Katti, C. P. (2020). Security architectures in wireless sensor networks. International Journal of Information Technology, 12(1), 261–272.
Dumitrasc, V. (2023). Anomaly Detection Through User Behaviour Analysis. Universitat Politécnica de Catalunya.
Khan, A. W., Zaib, S., Khan, F., Tarimer, I., Seo, J. T., & Shin, J. (2022). Analyzing and Evaluating Critical Cyber Security Challenges Faced by Vendor Organizations in Software Development: SLR Based Approach. IEEE Access, 10, 65044–65054. https://doi.org/10.1109/ACCESS.2022.3179822
Khraisat, A., & Alazab, A. (2021). A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4(1). https://doi.org/10.1186/s42400-021-00077-7
Malik, P., Nautiyal, L., & Ram, M. (2022). Machine Learning for Cyber Security. In Machine Learning for Cyber Security. https://doi.org/10.1515/9783110766745
Moiz, S., Majid, A., Basit, A., Ebrahim, M., Abro, A. A., & Naeem, M. (2024). Security and threat detection through cloud-based Wazuh deployment. 2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC), 1–5.
Pérez, A., Moltó, G., Caballer, M., & Calatrava, A. (2018). Serverless computing for container-based architectures. Future Generation Computer Systems, 83, 50–59. https://doi.org/10.1016/j.future.2018.01.022
Pujiantoro, M. A. R., & Nugraha, I. F. (2025). MARITIME CYBERSECURITY: TANTANGAN DALAM PENGELOLAAN INFRASTRUKTUR KABEL BAWAH LAUT PADA PERAIRAN INTERNASIONAL. Jurnal Integrasi Pengetahuan Disiplin, 6(1).
Stanković, S., Gajin, S., & Petrović, R. (2022). A review of Wazuh tool capabilities for detecting attacks based on log analysis. No Nama Agent Integrity File Added Delete Modified, 1.
Sun, N., Ding, M., Jiang, J., Xu, W., Mo, X., Tai, Y., & Zhang, J. (2023). Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Communications Surveys & Tutorials, 25(3), 1748–1774.
Sun, P. J. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160,https://doi.org/10.1016/j.jnca.2020.102642
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Jurnal Pengabdian kepada Masyarakat

This work is licensed under a Creative Commons Attribution 4.0 International License.




