Combination of Filtering and Switching Methods for Network Security from Pornographic Content

Yunif Lukman Hakim, Hendro Wijayanto

Abstract


The internet provides convenience in various aspects of human life. Internet penetration in Indonesia has grown by 66.5% of the total population of 278.7 million people. This shows that 185.3 million people are active internet users. Based on the report of the Ministry of Communication and Information (Kemenkominfo), it has handled negative content since 2016 to 2023 with a total of 1.9 million contents. With the most access through website media. MikroTikRouter Os as a tool used to support computer network communication, is expected to minimize access to this negative content. Configuration in MikroTik devices with Layer7 Protocol and Firewall Rules is used to prevent access to negative content from the client side. A firewall is a network security tool that monitors incoming and outgoing network traffic. The application layer that acts as a liaison between applications and network functions, manages how applications access the network, and regulates the creation of error messages is called Layer 7 Protocol. The Layer 7 Protocol configuration and firewall rules are effectively applied to Mikro Tik RB941-2ND to ward off negative pornographic content on local networks with a percentage of 87% of the 91 websites that have been tested. In particular, the test results show that this method is an effective scheme using unwanted travel with global internet usage and without using a Virtual Private Network (VPN). By using this filtering and switching technique, negative site access restrictions can be minimized. At least it can be a pioneer of a healthy internet.


Full Text:

PDF

References


REFERENCES

R. Kurniawan et al., “Penggunaan Internet yang Sehat dan Aman di Kalangan Masyarakat dan Pelajar,” Jurnal ABDIMASA Pengabdian Masyarakat, vol. 4, no. 2, pp. 15–21, 2021.

We Are Social & Meltwater, “Digital 2024 Global Overview Report,” https://datareportal.com/reports/digital-2024-global-overview-report.

F. W. Paulus, F. Nouri, S. Ohmann, E. Möhler, and C. Popow, “The impact of Internet pornography on children and adolescents: A systematic review,” Encephale, 2024, doi: 10.1016/j.encep.2023.12.004.

S. Prantner et al., “Female Affective Perception of Mainstream and Paraphilic Pornography: Associations with Sexual and Psychological Intrapersonal Variables,” Arch Sex Behav, vol. 53, no. 2, pp. 715–733, Feb. 2024, doi: 10.1007/s10508-023-02701-8.

Dr. Aneu Yulianeu dan Oktamala, “Jurnal Teknik Informatika Atmaluhur,” Jurnal Teknik Informatika Atmaluhur, vol. 6, no. 1, p. 40, 2022.

Nabilah Muhamad, “Kominfo Blokir 1,9 Juta Konten Pornografi di Internet RI, Terbanyak dari Website,” https://databoks.katadata.co.id/datapublish/2023/09/19/kominfo-blokir-19-juta-konten-pornografi-di-internet-ri-terbanyak-dari-website.

M. Asbari and B. Isnawati, “Pornografi dan Pengasuhan Anak: Menganalisis Dampak Media Digital terhadap Peran Keluarga dan Perkembangan Anak,” Journal Of Information Systems And Management, vol. 03, no. 01, 2024, [Online]. Available: https://jisma.org

H. Wijayanto and I. A. Prabowo, “Cybersecurity Vulnerability Behavior Scale in College During the Covid-19 Pandemic,” Jurnal Sisfokom (Sistem Informasi dan Komputer), vol. 9, no. 3, pp. 395–399, Nov. 2020, doi: 10.32736/sisfokom.v9i3.1021.

C. K. Wilujeng et al., “Implementasi Firewall Filter Rules Sebagai Filtering Content Pada Jaringan Komputer Menggunakan Mikrotik,” vol. 8, no. 3, pp. 2680–2685, 2024.

A. Jamalul’ain and O. Nurdiawan, “Optimalisasi Keamanan Jaringan Komputer Menggunakan Metode Knocking Port Berbasis Mikrotik (Studi Kasus: CV. Mitra Indexindo Pratama),” Jurnal Mahasiswa Teknik Informatika), vol. 6, no. 2, pp. 560–570, 2022.

H. Zhahir and M. Ardhiansyah, “Implementasi Manajemen Bandwidth Dengan Menggunakan Metode Load Balancing Dan Failover Pada Router MikroTik Dan Switch Cisco (Studi Kasus: Pusat Penguatan Dan Pemberdayaan Bahasa Kemdikbud Ristek),” Informatika, vol. 3, no. 2, pp. 176–193, 2022.

S. Torabi, E. Bou-Harb, C. Assi, and M. Debbabi, “A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities,” Forensic Science International: Digital Investigation, vol. 32, Apr. 2020, doi: 10.1016/j.fsidi.2020.300922.

R. et al. Setiawibawa, Jaringan Komputer. Eureka Media Aksara, 2023.

A. B. Pratomo, “Pengembangan Sistem Firewall Pada Jaringan Komputer Berbasis Mikrotik Routeros Developing a Firewall System on a Computer Network Based on Mikrotik Routeros,” Bulletin of Network Engineer and Informatics (Bufnets), vol. 1, no. 2, pp. 51–59, 2023, [Online]. Available: https://doi.org/10.59688/bufnets

W. Hidayat M and A. D. Yusuf, “Manajemen Penjadwalan Waktu Blokir Akses Internet pada Mikrotik RouterOS,” Journal of Security, Computer, Information, Embedded, Network, and Intelligence System, vol. 8329, pp. 10–15, 2023, doi: 10.61220/scientist.v1i1.232.

R. S. , Yadav and P. , Likhar, “Firewall: A Vital Constituent of Network Security, in Information Technology Security: Modern Trends and Challenges,” Singapore : Springer Nature Springer, pp. 47–67, 2024.

J. Kridatama and S. Dan Teknologi Penerapan, “Penerapan Kinerja Filter Rule dengan Metode Raw dan Layer 7 Protocol di Router Mikrotik,” 2023.

U. Radiyah, “Optimalisasi Keamanan Wide Area Network (WAN) Menggunakan Raw Firewall Berbasis Mikrotik pada PT. Permata Graha Nusantara,” INTI Nusa Mandiri, vol. 17, no. 1, pp. 16–23, Aug. 2022, doi: 10.33480/inti.v17i1.3401.

M. Ali and F. Latifah, “Implemenasi Block Access Pengguna Layanan Internet Dengan Metode Filter Rule Dan Layer 7 ProtocoL,” vol. 5, no. 2, 2021, doi: 10.52362/jisamar.v5i2.

Mikrotik, “About us and Company Profile,” https://mikrotik.com/aboutus.

J. L. Johnson, D. Adkins, and S. Chauvin, “Qualitative Research In Pharmacy Education A Review of the Quality Indicators of Rigor in Qualitative Research.”

M. Hennink and B. N. Kaiser, “Sample sizes for saturation in qualitative research: A systematic review of empirical tests,” Soc Sci Med, vol. 292, Jan. 2022, doi: 10.1016/j.socscimed.2021.114523.




DOI: https://doi.org/10.29040/ijcis.v5i3.173

Article Metrics

Abstract view : 171 times
PDF - 66 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License