Pengembangan Sistem Keamanan berbasis Cloud dengan Analisis Efek Avalanche pada Jaringan Perusahaan yang Mengadopsi Infrastruktur Cloud
DOI:
https://doi.org/10.55606/jitek.v5i2.6913Keywords:
Keamanan jaringan, Cloud Computing, Efek avalanche, Sistem pertahanan, Infrastruktur CloudAbstract
By adding cloud infrastructure to the company's network, there are new challenges for data security, especially related to the increasing possibility of complex cyberattacks.The main weakness of traditional systems is their inability to detect small changes in data, which can lead to data breaches.The purpose of this article is to build a cloud-based network defense system that utilizes avalanche effect analysis to enhance anomaly detection.Cryptographic algorithms with high avalanche effects are used in the simulation of cloud-based corporate networks in this study.After simulating attacks on the tested system, data is collected and then analyzed to evaluate the effectiveness and sensitivity of detection.To conduct validation tests, metrics such as detection accuracy and response time are used to compare the system's performance with conventional methods.The research results show that the use of algorithms with significant avalanche effects can enhance the system's ability to detect small suspicious changes in data, thereby reducing the likelihood of hidden attacks.The results show that adding avalanche features to the cloud defense system can enhance the company's network defense against current threats.Additionally, it has been proven that the developed system enhances operational efficiency without compromising network performance.To enhance adaptation to new attack patterns and test the system on a real implementation scale, further research must be conducted.
References
[1] S. Nurul, S. Anggrainy, and S. Aprelyani, “FAKTOR-FAKTOR YANG MEMPENGARUHI KEAMANAN SISTEM IN-FORMASI: KEAMANAN INFORMASI, TEKNOLOGI INFORMASI DAN NETWORK (LITERATURE REVIEW SIM),” vol. 3, no. 5, 2022, doi: 10.31933/jemsi.v3i5.
[2] “PERAN TEKNOLOGI CLOUD COMPUTING DALAM TRANSFORMASI INFRASTRUKTUR TI PERUSAHAAN”.
[3] J. Pendidikan and D. Konseling, “Keamanan Data dan Transaksi dalam Pemanfaatan Cloud sebagai Service.”
[4] S. Bahri, “Perancangan Keamanan Jaringan Untuk Mencegah Terjadinya Serangan Bruteforce Pada Router,” INDOTECH Indone-sian Journal of Education And Computer Science, vol. 1, no. 3, p. 2023.
[5] J. S. G. Sinaga, Nehemia Sitorus, and Steven Lukas Samosir, “Analisis Kinerja Algoritma Hash pada Keamanan Data: Perbandingan Antara SHA-256, SHA-3, dan Blake2,” JURNAL QUANCOM: QUANTUM COMPUTER JURNAL, vol. 2, no. 2, pp. 9–16, Dec. 2024, doi: 10.62375/jqc.v2i2.432.
[6] R. Abi Assyarif, G. Eka Yuliastuti, and C. Nurina Prabiantissa Institut Teknologi Adi Tama Surabaya, “Implementasi Kombinasi Algoritma Rot13 dan Vernam Cipher untuk Keamanan Data Teks.”
[7] J. Informasi and P. Sains Dan Teknologi, “Perbandingan Kriptography Klasik Caesar Cipher Dengan Kriptography Modern Aes Dalam Tingkat Keamanan Jaringan Komputer”.
[8] J. Ferlyzon, I. Kanedi, and R. Supardi, “Penerapan Snort Sebagai Sistem Keamanan Jaringan,” Jl. Meranti Raya No. 32 Kota Bengkulu, vol. 21, no. 1, p. 341139, 2025.
[9] O. Keamanan Dan Monitoring Jaringan Infrastruktur Di Kantor DPRD Bekasi Faris Jawad, R. Amanda Amalia, T. Sutan Nad-zarudien, P. Sistem Informasi, and S. Tinggi Ilmu Komputer Cipta Karya Informatika, “Optimizing Security And Monitoring In-frastructure Networks At The Bekasi DPRD Office,” 2023.
[10] M. Rizal Yahya, “PENGARUH BUSINESS INTELLIGENCE DAN CLOUD COMPUTING TERHADAP KEAMANAN SISTEM INFORMASI (Studi Pada BUMN di Provinsi Aceh),” 2023.
[11] S. Aflia Alkadrie, S. Hidayatullah Jakarta, and T. Selatan, “Keamanan Cloud Computing di Era Industri 4.0: Systematic Literature Review,” 2024.
[12] M. F. Khoer and N. Heryana, “TINJAUAN SISTEMATIK LITERATUR TENTANG CLOUD COMPUTING DAN ANALISIS DATA: ARSITEKTUR DAN METODOLOGI,” Jurnal Informatika dan Teknik Elektro Terapan, vol. 12, no. 3, Aug. 2024, doi: 10.23960/jitet.v12i3.4989.
[13] R. Octian Nafis and M. Sidqon, “Jurnal Rekayasa Sistem Informasi dan Teknologi Volume 2, No 1-Agustus 2024 e-ISSN : 3025-888X RANCANG BANGUN SISTEM E-ARSIP BERBASIS WEBSITE MENGGUNAKAN METODE ENKRIPSI AES (Advanced Encryption Standard) STUDI KASUS KPU SIDOARJO.”
[14] H. Alabdulrazzaq and M. N. Alenezi, “Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 14, no. 1, Apr. 2022, doi: 10.17762/ijcnis.v14i1.5262.
[15] L. Biondi, N. Gomes, R. S. Maior, and S. C. Soares, “Revisiting ‘The Malicious Serpent’: Phylogenetically Threatening Stimulus Marked in the Human Brain,” Emotion Review, Apr. 2024, doi: 10.1177/17540739241277942.
[16] B. R. Allo et al., “PERAN TEKNOLOGI CLOUD COMPUTING DALAM TRANSFORMASI INFRASTRUKTUR TI PE-RUSAHAAN: STUDI ANALISIS IMPLEMENTASI DI INDUSTRI MANUFAKTUR.”
[17] A. Jacovi, A. Caciularu, O. Goldman, and Y. Goldberg, “Stop Uploading Test Data in Plain Text: Practical Strategies for Mitigating Data Contamination by Evaluation Benchmarks,” May 2023, [Online]. Available: http://arxiv.org/abs/2305.10160
[18] M. Li, L. Wilke, J. Wichelmann, T. Eisenbarth, R. Teodorescu, and Y. Zhang, “A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP,” 2022, doi: 10.1109/SP46214.2022.00112.
[19] R. Abi Assyarif, G. Eka Yuliastuti, and C. Nurina Prabiantissa Institut Teknologi Adi Tama Surabaya, “Implementasi Kombinasi Algoritma Rot13 dan Vernam Cipher untuk Keamanan Data Teks.”
[20] T. Indriyani, P. Dinasti Airlangga, F. Jaka, I. T. Adhi, and T. Surabaya, “Enkripsi Data Dengan Mengunakan Metode ECC (Elliptic Curve Cryptography).”
[21] A. F. Kusuma, S. Agustini, M. Hakimah, M. Kurniawan, I. T. Adhi, and T. Surabaya, “SNESTIK Seminar Nasional Teknik Elektro, Sistem Informasi, dan Teknik Informatika Implementasi Algoritma Caesar Cipher dan Rivest Shamir Adleman Super Enkripsi Teks Pesan dengan Karakter ASCII”, doi: 10.31284/p.snestik.2024.5714.
[22] K. Marlin, K. Mere, A. Fitri, D. Santyo Nugroho, and D. Koerniawati, “PERAN TEKNOLOGI CLOUD COMPUTING DA-LAM MENINGKATKAN EFISIENSI DAN KEAMANAN PROSES AKUNTANSI: TINJAUAN TERHADAP PERU-BAHAN PARADIGMA DALAM MANAJEMEN DATA KEUANGAN,” Jurnal Darma Agung, no. 2, pp. 1044–1055, 2024, doi: 10.46930/ojsuda.v32i2.4152.
[23] “PERENCANAAN IMPLEMENTASI KOMPUTASI AWAN PADA INFRASTRUKTUR TEKNOLOGI DAN SISTEM INFORMASI DI UMPR”.
[24] F. P. Eka Putra, Amir Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” Jurnal Sistim Informasi dan Teknologi, pp. 82–87, Jan. 2024, doi: 10.60083/jsisfotek.v5i4.329.
[25] D. Setiawan, M. Charlie Pratama, and D. Arisandi, “IMPLEMENTASI SISTEM KEAMANAN JARINGAN MENGGUNAKAN RULE-BASED IDS PADA PT NETKRIDA TUAH CAKRAWALA,” JOISIE Journal Of Information System And Informatics Engi-neering, vol. 7, no. 2, pp. 381–389, 2023.
[26] S. A. Calix, “cloud-computing-security-for-multi-cloud-service-providers-controls-and-techniques-in-our-modern-threat-landscape”, doi: 10.5281/zenodo.7084251.
[27] D. Ardiani, A. H. Jatmika, and A. Zubaidi, “Modifikasi Protokol Routing DSDV Menggunakan Algoritma Dynamic-power transmission untuk Mengurangi Interferensi Sinyal dalam Pengiriman Data Berdasarkan Tingkat Kepadatan Node di Jaringan MANET Modification of DSDV Routing Protocol Using Dynamic-power transmission Algorithm to Reduce Signal Interference in Data Delivery Based on Node Density Level in MANET.” [Online]. Available: http://jcosine.if.unram.ac.id/
[28] J. Informasi and P. Sains Dan Teknologi, “Perbandingan Kriptography Klasik Caesar Cipher Dengan Kriptography Modern Aes Dalam Tingkat Keamanan Jaringan Komputer”.
[29] N. Dharmawan, Gani Indriyanta, and I Kadek Dendy Senapartha, “ANALISIS KEAMANAN JARINGAN UNIVERSITAS KRISTEN DUTA WACANA DENGAN SERANGAN SSL/TLS,” Jurnal Terapan Teknologi Informasi, vol. 6, no. 2, pp. 121–130, Oct. 2022, doi: 10.21460/jutei.2022.62.214.
[30] R. Soepeno, “Wireshark: An Effective Tool for Network Analysis”, doi: 10.13140/RG.2.2.34444.69769.
[31] B. W. Aulia, M. Rizki, P. Prindiyana, and S. Surgana, “Peran Krusial Jaringan Komputer dan Basis Data dalam Era Digital,” JUS-TINFO | Jurnal Sistem Informasi dan Teknologi Informasi, vol. 1, no. 1, pp. 9–20, Dec. 2023, doi: 10.33197/justinfo.vol1.iss1.2023.1253.
[32] C. A. Pinuyut, E. Utami, and A. H. Muhammad, “ANALISIS KINERJA ALGORITMA ADVANCED ENCRYPTION STANDARD (AES) TERMODIFIKASI DALAM ENRKIPSI DAN DEKRIPSI DATA (PERFORMANCE ANALYSIS OF MODIFIED ADVANCED ENCRYPTION STANDART (AES) ALGORITHM FOR ENCRYPTING AND DECRYPTING DATA ).”
[33] R. Panji Anugrah, I. Yatini, and M. Agung Nugroho, “IMPLEMENTASI OPENSTACK UNTUK INFRASTRUKTUR PRI-VATE CLOUD COMPUTING (STUDI KASUS UNTUK FASILITAS MAHASISWA UTDI).”
[34] A. P. Meriani, “Perbandingan Data Warehouse Cloud Computing Menggunakan Konvensional Berbasis Kriptopgafi.” [Online]. Available: https://www.researchgate.net/publication/369001529
[35] R. Fauzi, Y. Muhyidin, and D. Singasatia, “Sistem Keamanan Jaringan Komputer Berbasis Teknik Intrusion Detection System (IDS) Untuk Mendeteksi Serangan Distrubuted Denial Of Service (DDOS),” 2023.
[36] A. Fauzi, A. Maharani Putri, F. Fitriyani, R. Astriyani, V. Arisana, and Y. Indah Cahyani, “Tinjauan Ancaman dan Risiko pada Sistem Keamanan Internet of Things, Berbasis Cloud Computing dalam Penggunaan E-Commerce dan Rencana Strategis”, doi: 10.38035/jkmt.v2i2.
[37] S. Pitriyani and R. Firdaus, “Pengembangan Data Base Terdistribusi untuk Aplikasi Cloud Computing”.
[38] M. Dzaky Nurfaishal and Y. Akbar, “Analisis Efektivitas Keamanan Jaringan Layer 2: Port Security, VLAN Hopping, DHCP Snooping,” 2024. [Online]. Available: https://journal.stmiki.ac.id
[39] D. Ramalinda and A. Rachmat Raharja, “Strategi Perlindungan Data Menggunakan Sistem Kriptografi Dalam Keamanan Infor-masi,” Journal of International Multidisciplinary Research, [Online]. Available: https://journal.banjaresepacific.com/index.php/jimr
[40] J. S. G. Sinaga, Nehemia Sitorus, and Steven Lukas Samosir, “Analisis Kinerja Algoritma Hash pada Keamanan Data: Perbandingan Antara SHA-256, SHA-3, dan Blake2,” JURNAL QUANCOM: QUANTUM COMPUTER JURNAL, vol. 2, no. 2, pp. 9–16, Dec. 2024, doi: 10.62375/jqc.v2i2.432.
[41] M. A. Gunawan and S. Wardhana, “Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network),” vol. 6, no. 1.
[42] P. S. Curlin, J. Heiges, C. Chan, and T. S. Lehman, “A Survey of Hardware-Based AES SBoxes: Area, Performance, and Security,” ACM Comput Surv, vol. 57, no. 9, pp. 1–37, Sep. 2025, doi: 10.1145/3724114.
[43] M. Bima, P. Sansaya, and A. Farisi, “2 ND MDP STUDENT CONFERENCE (MSC) 2023 PERBANDINGAN KINERJA ALGORITMA KANDIDAT AES DALAM ENKRIPSI DAN DEKRIPSI FILE DOKUMEN”.
[44] M. Rizal Yahya, “PENGARUH BUSINESS INTELLIGENCE DAN CLOUD COMPUTING TERHADAP KEAMANAN SISTEM INFORMASI (Studi Pada BUMN di Provinsi Aceh),” 2023.
[45] P. Ananda Khairunnisa et al., “Perancangan Sistem Keamanan Jaringan Berbasis Cybersecurity untuk Mitigasi Ancaman Siber pada Infrastruktur TI: Studi Kasus di Indonesia,” Jurnal Ilmu Teknik dan Informatika, vol. 4, pp. 9–16, doi: 10.51903/teknik.
[46] E. P. Silmina, A. Firdonsyah, and R. A. A. Amanda, “ANALISIS KEAMANAN JARINGAN SISTEM INFORMASI SEKOLAH MENGGUNAKAN PENETRATION TEST DAN ISSAF,” Transmisi, vol. 24, no. 3, pp. 83–91, Aug. 2022, doi: 10.14710/transmisi.24.3.83-91.
[47] “Analisis Keamanan dan Kenyamanan pada Cloud Computing Dwina Satrinia #1 , Syifa Nurgaida Yutia #2 , Iik Muhamad Malik Matin #3”, doi: 10.52661.
[48] K. Tauhid and ; | Juroihan, “Integrasi Cloud Computing untuk Analisis Big Data,” 2024.
[49] M. Kaleem et al., “New Efficient Cryptographic Techniques For Cloud Computing Security Migration Letters New Efficient Cryptographic Techniques For Cloud Computing Security,” vol. 21, no. S11, pp. 13–28, 2024, [Online]. Available: www.migrationletters.com
[50] I. Dwiputra and I. Afrianto, “Evaluasi berbagai Keamanan Sistem Cloud Computing: Suatu Tinjauan Literatur.”
[51] H. Risky Kurniawan, I. Nur Sofiyanto, and M. Faqih Habiburrohman, “Analisis Risiko Keamanan Data pada Platform Cloud Computing,” pp. 18–2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Jurnal Informatika Dan Tekonologi Komputer (JITEK)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.