Jurnal Jaringan Komputer dan Keamanan (JJKK)
|Jurnal Jaringan Komputer dan Keamanan |JJKK| is a peer-reviewed journal devoted to publish multidisciplinary issues related to Computer Network and Security – | Computer Network and Architecture – design, topology, protocols, software-defined networking (SDN), network function virtualization (NFV), wireless and mobile networks, sensor networks, and cloud-edge infrastructures | Information and Cyber Security – cryptography, network security, ethical hacking, intrusion detection and prevention systems, blockchain-based security, digital forensics, and privacy-preserving computation | Infrastructure Systems and Digital Services – cloud computing, distributed systems, virtualization, smart infrastructure, data centers, and scalable service-oriented architectures | Communication Network Architectures and Protocols – 5G/6G, IoT communication, ad-hoc and mesh networking, satellite and optical networks, and next-generation internet technologies | Network Services and Applications – content delivery networks (CDN), streaming systems, e-Government, e-Learning, e-Health, smart city applications, and intelligent network applications | Network Operation, Management, and Optimization – network monitoring, automation, quality of service (QoS), traffic engineering, performance analysis, and green computing for sustainable digital infrastructure| Artificial Intelligence and Machine Learning for Networks and Security – AI-based network management, deep learning for intrusion detection, federated learning, reinforcement learning for routing and optimization, and intelligent cyber defense systems| Data Analytics and Big Data Infrastructure – network data mining, log analysis, predictive analytics, distributed data pipelines, and security analytics for large-scale systems| Discrete Algorithms and Discrete Modeling – combinatorial optimization, graph theory, simulation modeling, game theory applications, and algorithmic approaches for network security and efficiency | Human–Technology Interaction and Digital Ethics – behavioral cybersecurity, human factors in information systems, socio-technical impacts of digital transformation, and ethics in AI-based networks | Information Policy, Governance, and Law – data protection law, cybersecurity regulations, governance frameworks (GRC), risk assessment, compliance, and national/international digital security policy | Multidisciplinary Issues in Computer Networks and Security – integration of computer science, information systems, psychology, education, law, business, and public policy in advancing secure and intelligent networked societies|. JJKK is a triannual, open access, peer-reviewed, and international e-journal, published in Indonesia. We accept unpublished, high quality, and original research manuscripts in English. JJKK is published three times per year by Institute of Information Technology and Social Science (IITSS). All research articles appearing in JJKK have undergone a thoroughly blind peer-review.
Articles
55 Documents
Implementation of a Private Cloud for Sales Data Management Using Nextcloud at Dvapor Palembang
Achmad Alende Hudhuri
Jurnal Jaringan Komputer dan Keamanan Vol 5 No 1 (2024): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v5i1.238
The implementation of Nextcloud on Ubuntu provides an effective solution for building a secure and flexible private cloud storage system. As an open-source platform for file storage and collaboration, Nextcloud offers a robust and cost-efficient alternative to commercial cloud services. The implementation process on Ubuntu involves several essential steps, including system preparation, installation of required dependencies, and configuration of Nextcloud along with user access settings. These steps include installing LAMP (Linux, Apache, MySQL, PHP), downloading and installing Nextcloud, and configuring security parameters and access controls. In addition, backup setup and routine maintenance are necessary to ensure data integrity and operational continuity. Through Nextcloud, users can take advantage of features such as file synchronization, file sharing, and online collaboration while retaining full control over stored data. This implementation provides a customizable solution for organizations or individuals, enhancing operational efficiency and data security.
Analysis of Wireless Network Range In The Housing And Settlement Office of South Sumatra Province Based on Wifi Area Coverage
Imam Al Akbar
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 2 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i2.239
WiFi technology widely used today is based on the IEEE 802.11a/b/g standard, which operates in the 2.4 GHz frequency band. This technology is commonly found in government institutions, private companies, entertainment centers, and educational environments. Wi-Fi (wireless fidelity) has become essential due to the increasing number of modern devices equipped with wireless capability, enabling unrestricted internet access within coverage areas. A field survey conducted at the Housing and Settlement Office of South Sumatra Province revealed that all computers rely on wireless connectivity; however, improper placement of access points has resulted in suboptimal network performance. This study aims to evaluate the range and quality of Wi-Fi signals in the office to improve wireless network accessibility. The research applies an action research methodology consisting of four stages: diagnosis, action planning, action taking, and evaluation. Findings indicate variations in signal strength and channel interference across rooms, highlighting the need for better access point placement and channel configuration.
Monitoring The Utilization of Hotspots at Universitas Bina Darma as Facilities for Lecturers and Staff
Andri Rio Saputra
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 2 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i2.240
Information and communication technology plays a crucial role in the educational sector, with the internet functioning as the primary medium for accessing academic resources. Universitas Bina Darma provides hotspot facilities for lecturers and staff to support operational activities such as file sharing, internet access, and campus promotion. Monitoring and analysis of hotspot usage during academic breaks are necessary to understand utilization patterns and ensure the effectiveness of the facility. This study aims to evaluate hotspot utilization by lecturers and staff by identifying the most frequently accessed websites and services. A case study approach was employed, incorporating tools such as Wireshark, Network Miner, and Advanced IP Scanner to monitor network activity. The findings indicate that academic breaks are predominantly used for campus promotion and work-related communication via social media. The proportion of social media usage relative to total Wi-Fi activity was 49% on Day 1, 51% on Day 2, 50% on Day 3, 61% on Day 4, 40% on Day 5, 52% on Day 6, and 45% on Day 7.
Tarpit Firewall Implementation for Network Security Optimization in the IT Service Division of PT Pusri Palembang Using the NIST SP 800-86 Forensic Method
Ardiansyah
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 2 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i2.241
The KP Room of the IT Service Division at PT Pusri Palembang has experienced recurring network disruptions that frequently lead to downtime, adversely impacting the performance of interns and employees. The underlying cause of these disturbances had not been determined, necessitating an investigation using an Intrusion Detection System (IDS) through Snort IDS. This study applies the NIST SP 800-86 forensic method consisting of collection, examination, analysis, and reporting to identify the source of attacks. The collection phase successfully detected indications of Distributed Denial-of-Service (DDoS) attacks. Subsequent examination and attack simulations validated that these vulnerabilities resulted from DDoS activities. To address this issue, a Tarpit Firewall was implemented on the router. The Tarpit Firewall effectively reduced the impact of DDoS attacks by slowing incoming malicious connections and terminating attack attempts, thereby improving the network’s resilience against DDoS, brute-force, and port-scanning attacks.
Implementation of a Network Security System Against SYN Flood Attacks and Unauthorized Access Blocking Using Firewall Filtering in the IT Service Department of PT Pupuk Sriwidjaja Palembang
M. Syaiful Huda Mubarok
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 2 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i2.242
The Information Technology Services Department of PT Pupuk Sriwidjaja (PUSRI) Palembang relies heavily on internet network access to support a wide range of operational activities and to provide Information Technology (IT) services for various departments within the company. However, internet access within the IT Services Department must be tightly regulated and secured. One of the network security mechanisms applied is the firewall filtering method. Firewall filtering is used to protect network systems from SYN Flood attacks, prevent unauthorized access, and block potential threats from hacker activities. The firewall filtering mechanism inspects all incoming TCP connections, opens or blocks network ports such as ports 22 and 80, and filters source IP addresses, port ranges, and suspicious traffic patterns. By implementing a network security system against SYN Flood attacks, the network becomes more stable and secure and can operate normally without concerns about SYN-based disruptions or other forms of illegal access.
Next-Generation Firewall Design Using an Intrusion Prevention System (IPS) Method for Securing the Web Portal Server of Universitas Bina Darma
Viren Pranata
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 2 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i2.243
Network security is a crucial requirement for digital communication systems, particularly for institutions that rely heavily on web-based services. The design and implementation of network security systems must address increasing cyber threats, particularly unauthorized access, malware infiltration, and Distributed Denial-of-Service (DDoS) attacks that disrupt service availability. This study aims to design a Next-Generation Firewall (NGFW) using an Intrusion Prevention System (IPS) to detect and prevent potential attacks on the Universitas Bina Darma web portal server. The research applies the Action Research Method through four structured stages: Diagnosing, Planning Action, Taking Action, and Evaluating Action. The system was developed and tested through vulnerability assessments, firewall configuration, and IPS rule implementation. The results show that the NGFW with IPS effectively blocks cyberattacks, secures system vulnerabilities, and provides real-time intrusion detection capabilities. The study concludes that implementing an NGFW with IPS significantly enhances server security and performance.
Design of Data Security for Remote Access Using IPsec- and SSL-Based VPN
Ahmad Fikri
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 3 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i3.244
The rapid advancement of digital communication technologies has increased the need for secure remote access within corporate environments. This study develops and implements a secure network architecture for PT Tanjungenim Lestari Pulp & Paper using Virtual Private Network (VPN) mechanisms based on Internet Protocol Security (IPsec) and Secure Socket Layer (SSL). The existing network, which utilizes a star topology and file-sharing mechanisms, was found to lack sufficient security, particularly in protecting data transmission to external partner companies. The proposed system integrates IPsec-based VPN tunneling to ensure encrypted communication channels and SSL certificates to safeguard FTP authentication processes. Data were collected through action research and document studies, followed by network design, IP addressing, router configuration, VPN deployment, FTP server installation (VSFTPD), and file transfer testing. The results demonstrate successful establishment of secure tunnels, encrypted data exchange, and protection against credential interception during authentication. This study concludes that implementing IPsec VPN and SSL-secured FTP significantly enhances remote access security, maintains data confidentiality, and strengthens the overall network infrastructure of PT Tanjungenim Lestari Pulp & Paper.
Network Security Implementation Against Sniffing Attacks in the IT Services Department of PT Pupuk Sriwidjaja (PUSRI) Palembang
Ardiansyah
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 3 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i3.245
Network security is a crucial aspect of maintaining data integrity, confidentiality, and availability within organizations. Sniffing attacks, in which an attacker intercepts and monitors data transmitted over a network, pose a significant threat to data protection. This study aims to analyze the performance of the network security system of the IT Services Department at PT Pupuk Sriwidjaja (PUSRI) Palembang against sniffing threats. The research includes evaluating existing security systems, testing potential sniffing attacks, and implementing and analyzing the effectiveness of various security mechanisms such as encryption, network segmentation, and intrusion detection. The results indicate that appropriate security mechanisms substantially reduce the risk of sniffing attacks. This study also provides recommendations for further improvements, including staff training on cybersecurity best practices and strengthening real-time network monitoring.
Implementation of Radius Server–Based User Management on the WLAN Network of Dinas PUBMTR South Sumatra Province Using RADIUSdesk
Rizky Widiansyah
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 3 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i3.246
Wireless Local Area Network (WLAN) technology is widely utilized across government offices, private companies, schools, and healthcare institutions. The Dinas Pekerjaan Umum, Bina Marga, dan Tata Ruang (PUBMTR; Office of Public Works, Highways, and Spatial Planning) of South Sumatra Province is one of the government institutions relying on WLAN technology to support operational activities and internet-based services. However, the agency frequently encounters challenges in managing and authenticating WLAN users, resulting in the absence of differentiation between employee and non-employee access. This condition causes network instability, bandwidth degradation, and operational disruptions during peak usage. This study proposes the implementation of a Radius Server–based user-management system to provide differentiated authentication for employees and ensure more secure, stable WLAN operations. The research methodology includes problem analysis, system design, Radius Server implementation using RADIUSdesk, and WLAN testing. The results indicate that the deployment of Radius Server–based user management using RADIUSdesk successfully improves WLAN management efficiency, simplifies user administration, and enhances network security.
IoT-Based Server Room Temperature and Humidity Monitoring
Asti Triwulanda
Jurnal Jaringan Komputer dan Keamanan Vol 6 No 3 (2025): Jurnal Jaringan Komputer dan Keamanan
Publisher : Institute of Information Technology and Social Science (IITSS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61346/jjkk.v6i3.247
Monitoring the environmental conditions of server rooms is essential to ensuring optimal hardware performance, maintaining system reliability, and preventing device failure. This study proposes an Internet of Things (IoT)-based monitoring system for temperature and humidity control using a NodeMCU ESP8266 microcontroller combined with a DHT22 sensor. The system measures environmental conditions in real time and transmits the collected data over a Wi-Fi network to the Blynk platform for visualization and remote monitoring. Alerts are generated when temperature or humidity exceeds predefined thresholds, enabling preventive action to avoid equipment damage. The implementation demonstrated that the system effectively monitors server-room environmental parameters, provides accurate and real-time data visualization, and enhances the overall management of server-room conditions.