Implementation of Open Source Firewall for Campus Network Security

Authors

  • Moh. Ali sobit Author
  • Riko Adi Setiawan Author

Keywords:

Keywords: open source firewall, network security, IDS/IPS, network throughput, filtering rule.

Abstract

Campus network security has become a crucial issue due to high digital activity, an increasing number of connected devices, and the development of increasingly complex cyber attack patterns. The open nature of campus infrastructure necessitates a flexible, economical, and efficient network defense system, one of which is through the use of open source firewalls. This study aims to determine the effectiveness of open source firewalls in improving the security, stability, and quality of campus network services. The research uses an applied experimental approach through the stages of needs analysis, firewall architecture design, installation, configuration, and testing, including filtering rules, throughput, latency, IDS/IPS detection, system load, and stability testing under high traffic conditions. The firewall successfully blocked more than 95% of illegal access attempts, maintained throughput without significant decline, and added only 1–3 ms of latency. IDS/IPS detected various suspicious activities such as port scanning and brute force in real time. CPU and memory load remained stable at around 30–40% and 45–55%, respectively, with no crashes during stability testing. 

Open source firewalls have been proven effective in improving campus network security without disrupting service performance, and are suitable for use as a medium-scale network protection solution. Further research is recommended to evaluate the integration of firewalls with security automation and machine learning-based analytics systems to improve adaptive threat detection. 

 

Downloads

Download data is not yet available.

Author Biographies

  • Moh. Ali sobit

    University students at Madura University

  • Riko Adi Setiawan

    University students at Madura University

References

REFERENSI

[1] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.

[2] F. P. Eka Putra, A. Muzayyin, and M. U. Mansyur, “ANALISIS KUALITAS LAYANAN ABSENSI BERBASIS FINGER BERDASARKAN Quality of Service,” J. Inform., vol. 24, no. 1, pp. 17–25, 2024, doi: 10.30873/ji.v24i1.3949.

[3] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang – Madura Berbasis Website,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, 2024, doi: 10.36341/rabit.v9i2.4840.

[4] F. Prasetyo Eka Putra, S. Mellyana Dewi, and A. Hamzah, “Jurnal Sistim Informasi dan Teknologi Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 26–32, 2023, doi.org/10.37034/jsisfotek.v5i2.232.

[5] H. C. Pöhls, F. Kügler, E. Geloczi, and F. Klement, “Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT—An In-Depth STRIDE and LINDDUN Analysis of Smart Homes,” Futur. Internet, vol. 17, no. 2, 2025, doi: 10.3390/fi17020077.

[6] E. Hyvönen, “Digital humanities on the Semantic Web: Sampo model and portal series,” Semant. Web, vol. 14, no. 4, pp. 729–744, 2023, doi: 10.3233/SW-223034.

[7] F. P. E. Putra, R. W. Efendi, A. B. Tamam, and W. A. Pramadi, “Tren dan Praktik Terbaik dalam Pengembangan Web Berbasis API : Kajian Literatur terhadap Framework Laravel dan React,” Infomatek, vol. 27, no. 1, pp. 165–178, 2025, doi: 10.23969/infomatek.v27i1.25122.

[8] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 52, 2023, doi: 10.51211/itbi.v8i1.2441.

[9] F. P. Eka Putra, Amir Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” J. Sistim Inf. dan Teknol., pp. 82–87, 2024, doi: 10.60083/jsisfotek.v5i4.329.

[10] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, S. A. Efendy, and S. N. R. Barokah, “Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan,” Digit. Transform. Technol., vol. 3, no. 2, pp. 903–910, 2024, doi: 10.47709/digitech.v3i2.3446.

[11] M. Zayyadi et al., “Pemberdayaan Sekolah Inklusi Melalui E-Modul Berjenjang Sebagai Pengembangan Kompetensi Guru Dalam Pemenuhan Layanan Pendidikan Inklusif,” 2024. doi: 10.37303/peduli.v8i2.681.

[12] A. Baidawi, “JARINGAN SENSOR NIRKABEL DAN IoT UNTUK KOTA PINTAR PAMEKASAN,” 2023, academia.edu. doi: 10.59697/jsik.v7i2.108.

[13] F. P. Eka Putra, . S., A. Ramadhani, and . M., “Integrasi Teknologi Kuantum dan fiber Optik untuk Meningkatkan Keamanan dan Efisiensi Jaringan Masa Depan,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 151–163, 2025, doi: 10.47324/ilkominfo.v8i2.342.

[14] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.

[15] Fauzan Prasetyo Eka Putra, Yogi Setiawan, Samsul Arifin, and Wahyu Hidayatullah, “Peran VPN dalam Menjaga Privasi Pengguna Jaringan Publik,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5834.

[16] H. Guo and Y. Zhang, “a Model for Evaluating the Modal Frequencies and Environmental Vibration Energy Harvesting Capacity of Rectangular Piezoelectric Beams,” Int. J. Mechatronics Appl. Mech., vol. 2024, no. 16, pp. 58–66, 2024, doi: 10.17683/ijomam/issue16.7.

[17] M. Furka, M. Kaluz, M. Fikar, and M. Klauco, “Guidelines for Secure Process Control: Harnessing the Power of Homomorphic Encryption and State Feedback Control,” IEEE Access, vol. 11, pp. 110328–110341, 2023, doi: 10.1109/ACCESS.2023.3322035.

[18] O. K. Abbas, F. Abdullah, N. A. M. Radzi, and A. D. Salman, “A New Adaptive-Clustered Routing Protocol for Indoor Fire Emergencies Using Hybrid CNN-BiLSTM Model: Development and Validation,” J. Intell. Syst. Internet Things, vol. 14, no. 2, pp. 8–24, 2025, doi: 10.54216/JISIoT.140202.

[19] N. Poongavanam, N. Nithiyanandam, T. Suma, V. N. Thatha, and R. Shaik, “Multi-objective shuffled frog leaping algorithm for deployment of sensors in target based wireless sensor networks,” J. Intell. Fuzzy Syst., vol. 46, no. 1, pp. 1–18, 2024, doi: 10.3233/JIFS-233595.

[20] F. Prasetyo, E. Putra, M. Riski, M. S. Yahya, and M. H. Ramadhan, “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 167–174, 2023, doi: 10.37034/jsisfotek.v5i1.233.

[21] A. A. Abu-Ein, W. A. Abuain, M. Q. Alhafnawi, and O. M. Al-Hazaimeh, “Security Enhanced Dynamic Bandwidth Allocation-Based Reinforcement Learning,” WSEAS Trans. Inf. Sci. Appl., vol. 22, pp. 21–27, 2025, doi: 10.37394/23209.2025.22.3.

[22] F. P. Eka Putra, M. N. Arifin, K. Zulfana Imam, E. Saputra, and Sofiyullah, “Pengembangan Sistem Informasi Laboratorium Terintegerasi Sistem Akademik Menggunakan Agile Scrum,” J. Inf. dan Teknol., pp. 109–119, 2023, doi: 10.37034/jidt.v5i2.367.

[23] P. Franco, J. M. Martinez, Y. C. Kim, and M. A. Ahmed, “IoT Based Approach for Load Monitoring and Activity Recognition in Smart Homes,” IEEE Access, vol. 9, pp. 45325–45339, 2021, doi: 10.1109/ACCESS.2021.3067029.

[24] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.

[25] F. P. Eka Putra, A. M. Ubaidillah Solichin, M. N. Wildanul Hakim, and M. T. Ramadhan, “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 415–425, 2025, doi: 10.29408/jit.v8i2.30559.

[26] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.

[27] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[28] J. Liu et al., “Multi-Job Intelligent Scheduling With Cross-Device Federated Learning,” IEEE Trans. Parallel Distrib. Syst., vol. 34, no. 2, pp. 535–551, 2023, doi: 10.1109/TPDS.2022.3224941.

[29] Fauzan Prasetyo Eka Putra, Dea Aulia Siswoyo, M. Idris Ainul Yaqin, and Rica Oktavia, “Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G: Perspektif Nasional dan Internasional,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.6141.

[30] S. Arifin, N. P. Dewi, . U., M. N. Arifin, and F. P. E. Putra, “Aplikasi Pengolahan Data Mahasiswa Kkn Pada Universitas Madura,” Insa. Comtech Inf. Sci. Comput. Technol. J., vol. 8, no. 2, p. 24, 2023, doi: 10.53712/jic.v8i2.2085.

[31] S. S. Sran, S. K. Sidhu, M. Kumar, and P. Sood, “Dynamic Route Management for Secure Data Aggregation in Duty-Cycled Mobile Sink-Based WSNs,” SN Comput. Sci., vol. 6, no. 3, 2025, doi: 10.1007/s42979-025-03780-1.

[32] H. A. H. Nguyen and C. H. Kim, “Efficient Bearing Fault Diagnosis for Edge Computing Using Grayscale Spectrograms and Hybrid Neural Model Compression,” IEEE Access, vol. 13, pp. 147494–147510, 2025, doi: 10.1109/ACCESS.2025.3600678.

[33] I. Hidayatullah, M. H. Khairi, I. Maulana, and F. P. Eka Putra, “Analisis Protokol Keamanan Jaringan dalam Era Internet of Things (IoT),” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 356–366, 2025, doi: 10.29408/jit.v8i2.30257.

[34] H. Geng and Q. Zhang, “Research on Intra-Domain Routing Protection Scheme Based on SRv6,” Comput. Eng. Appl., vol. 60, no. 6, pp. 293–300, 2024, doi: 10.3778/j.issn.1002-8331.2210-0463.

[35] L. Liu, A. Malmert, E. Pouyet, S. Mirri, and G. Delnevo, “Joined Spatial and Spectral Segmentation of Hyperspectral Datasets on Historical Art Objects,” IEEE Access, vol. 13, pp. 108266–108283, 2025, doi: 10.1109/ACCESS.2025.3579076.

[36] T. D. Cao, H. T. Nguyen, M. T. Nguyen, T. Truong-Huu, and H. L. Truong, “EADRAN: An edge marketplace for federated learning,” Futur. Gener. Comput. Syst., vol. 175, 2026, doi: 10.1016/j.future.2025.108046.

[37] K. N. Lal, “A lung sound recognition model to diagnoses the respiratory diseases by using transfer learning,” Multimed. Tools Appl., vol. 82, no. 23, pp. 36615–36631, 2023, doi: 10.1007/s11042-023-14727-0.

[38] J. A. Berrios Moya, J. Ayoade, and M. A. Uddin, “A Zero-Knowledge Proof-Enabled Blockchain-Based Academic Record Verification System,” Sensors, vol. 25, no. 11, 2025, doi: 10.3390/s25113450.

[39] A. Rozario, E. Ahmed, and N. Mansoor, “A Robust Routing Protocol in Cognitive Unmanned Aerial Vehicular Networks,” Sensors, vol. 24, no. 19, 2024, doi: 10.3390/s24196334.

[40] F. P. E. Putra, M. Aziz, G. Arifin, A. Rohman, A. Rizki, and A. M. Syam, “Analisis Qos & Qoe,” J. Syntax Admiration, vol. 5, no. 1, pp. 140–145, 2024, doi: 10.46799/jsa.v5i1.973.

[41] Z. Lv, X. Li, Y. Peng, and J. Huang, “Optimized Space-Filling Curve-Driven Forward-Secure Range Query on Location-Related Data for Unmanned Aerial Vehicle Networks,” Electron., vol. 14, no. 10, 2025, doi: 10.3390/electronics14101978.

[42] A. Jovanović, I. B. Djordjevic, Z. H. Perić, and S. A. Vlajkov, “Circularly Symmetric Companding Quantization- Inspired Hybrid Constellation Shaping for APSK Modulation to Increase Power Efficiency in Gaussian-Noise-Limited Channel,” IEEE Access, vol. 9, pp. 4072–4083, 2021, doi: 10.1109/ACCESS.2020.3047681.

[43] S. K. Si et al., “Enhancement of the piezoelectric performance of GN nanosheets/PVDF nanocomposite film using electrostatic layer and penetrated electrode,” J. Alloys Compd., vol. 1001, 2024, doi: 10.1016/j.jallcom.2024.175160.

[44] G. H. Adday, S. K. Subramaniam, Z. A. Zukarnain, and N. Samian, “Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey,” IEEE Access, vol. 12, pp. 22938–22977, 2024, doi: 10.1109/ACCESS.2024.3362889.

[45] N. A. Saeed et al., “Nonlinear vibration of quasi-zero stiffness structure with piezoelectric harvester and RL-load: intra-well and inter-well oscillation modes under 1:1 internal resonance,” Appl. Math. Mech. (English Ed., vol. 46, no. 8, pp. 1451–1474, 2025, doi: 10.1007/s10483-025-3285-8.

[46] M. Khofikur R.A, F. P. Eka Putra, M. W. Ridho G, and V. Huda, “Analisis Kinerja dan Keamanan Protokol PPTP dan L2TP/IPSec VPN pada Jaringan MikroTik,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 334–344, 2025, doi: 10.29408/jit.v8i2.30230.

[47] A. Delham Algarni, F. Algarni, S. Ullah Jan, and N. Innab, “LSP-eHS: A Lightweight and Secure Protocol for e-Healthcare System,” IEEE Access, vol. 12, pp. 156849–156866, 2024, doi: 10.1109/ACCESS.2024.3477922.

[48] Fauzan Prasetyo Eka Putra, Debri Eko Arissandi, Achmad Rofiqi, and Moh Firman Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5938.

[49] D. Fotue and H. Labiod, “Efficient Tree Aggregation and Processing Time for Wireless Sensor Networks,” Mob. Networks Appl., vol. 28, no. 1, pp. 160–167, 2023, doi: 10.1007/s11036-023-02088-9.

[50] A. Alzahrani, “RLKS-TMS: A Robust and Lightweight Key Agreement Scheme for Telemedicine System,” IEEE Access, vol. 12, pp. 108233–108247, 2024, doi: 10.1109/ACCESS.2024.3422038.

Published

25-12-2025

How to Cite

Implementation of Open Source Firewall for Campus Network Security. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 2(01). https://ejournal.omahtabing.com/knj/article/view/110

Most read articles by the same author(s)