Infrastructure as Code for Security Automation and Network Infrastructure Monitoring
DOI:
https://doi.org/10.30812/matrik.v22i1.2471Keywords:
Ansible-playbook, Infrastructure as code, system administrationAbstract
The Corona Virus (COVID-19) pandemic that has spread throughout the world has created a new work culture, namely working remotely by utilizing existing technology. This has the effect of increasing crime and cyber attacks as more and more devices are connected to the internet for work. Therefore, the priority on security and monitoring of network infrastructure should be increased. The security and monitoring of this infrastructure requires an administrator in its management and configuration. One administrator can manage multiple infrastructures, making the task more difficult and time-consuming. This research implements infrastructure as code for security automation and network infrastructure monitoring including IDS, honeypot, and SIEM. Automation is done using ansible tools to create virtual machines to security configuration and monitoring of network infrastructure automatically. The results obtained are automation processes and blackbox testing is carried out and validation is carried out using a User Acceptance Test to the computer apparatus of the IT Poltek SSN Unit to prove the ease of the automation carried out. Based on the results of the UAT, a score of 154 was obtained in the Agree area with an acceptance rate of 81.05% for the implementation of infrastructure as code for the automation carried out
Downloads
References
[2] BSSN-IHP, “Laporan Tahun 2020 Honeynet Project BSSN - IHP,†2021.
[3] S. R. Sairam Jetty, Securing Network Infrastructure. Packt Publishing Ltd, 2019.
[4] I. P. Hariyadi and K. Marzuki, “Implementation Of Configuration Management Virtual Private Server Using Ansible,†MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 19, no. 2, pp. 347–357, 2020, doi: 10.30812/matrik.v19i2.724.
[5] K. Marzuki et al., “Otomasisasi Manajemen Vlan Intervlan dan Dhcp Server Menggunakan Ansible,†Jurnal Informatika & Rekayasa Elektronika), vol. 4, no. 2, pp. 171–180, 2021.
[6] H. Ahmetoglu and R. Das, “A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions,†Internet of Things, vol. 20, p. 100615, 2022, doi: https://doi.org/10.1016/j.iot.2022.100615.
[7] C. Kelly, N. Pitropakis, A. Mylonas, S. McKeown, and W. J. Buchanan, “A Comparative Analysis of Honeypots on Different Cloud Platforms.,†Sensors (Basel, Switzerland), vol. 21, no. 7, Apr. 2021, doi: 10.3390/s21072433.
[8] A. Khumaidi, “Implementation of Devops Method for Automation of Server Management Using Ansible,†Jurnal Transformatika, vol. 18, no. 2, p. 199, 2021, doi: 10.26623/transformatika.v18i2.2447.
[9] I. P. A. E. Pratama, “Infrastructure as Code (IaC) Menggunakan OpenStack untuk Kemudahan Pengoperasian Jaringan Cloud Computing (Studi Kasus: Smart City di Provinsi Bali) Infrastructure as Code (IaC) Using OpenStack for Ease of Operation of Cloud Computing Network (Case Study,†Jurnal Ilmu Pengetahuan dan Teknologi Komunikasi, vol. 23, no. 1, pp. 93–105, 2021, doi: 10.33169/iptekkom.23.1.2021.93-105.
[10] Nane Kratzke, “Infrastructure as Code | Cloud-native Programming.†.
[11] C. Siebra et al., “From theory to practice: The challenges of a Devops infrastructure as code implementation,†ICSOFT 2018 - Proceedings of the 13th International Conference on Software Technologies, no. Icsoft, pp. 427–436, 2019, doi: 10.5220/0006826104270436.
[12] M. Artaˇ and T. Borovˇ, “DevOps : Introducing Infrastructure-as-Code,†2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C), pp. 1–2, 2017, doi: 10.1109/ICSE-C.2017.162.
[13] J. M. Kizza, Guide to Computer Network Security - Fifth Edition. 2017.
[14] Y. Hidayat and B. Arifwidodo, “Implementasi Web Server Menggunakan Infrastructure As Code Terraform Berbasis Cloud Computing,†Format Jurnal Ilmiah Teknik Informatika, vol. 10, no. 2, p. 192, 2021, doi: 10.22441/format.2021.v10.i2.010.
[15] A. O. Olagunju and F. Samu, “In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention,†in Proceedings of the 5th Annual Conference on Research in Information Technology, 2016, pp. 41–46, doi: 10.1145/2978178.2978184.
[16] R. Acheampong, T. C. Bălan, D.-M. Popovici, and A. Rekeraho, “Security Scenarios Automation and Deployment in Virtual Environment using Ansible,†in 2022 14th International Conference on Communications (COMM), 2022, pp. 1–7, doi: 10.1109/COMM54429.2022.9817150.
[17] H. Asad and I. Gashi, “Dynamical analysis of diversity in rule-based open source network intrusion detection systems,†Empirical Software Engineering, vol. 27, no. 1, 2022, doi: 10.1007/s10664-021-10046-w.
[18] F. R. Hariawan and S. U. Sunaringtyas, “Design an Intrusion Detection System, Multiple Honeypot and Packet Analyzer Using Raspberry Pi 4 for Home Network,†in 2021 17th International Conference on Quality in Research (QIR): International Symposium on Electrical and Computer Engineering, Oct. 2021, pp. 43–48, doi: 10.1109/QIR54354.2021.9716189.
[19] R. M. R. Alan Dennis, Barbara Wixom, Systems Analysis and Design, 8th ed. John Wiley & Sons, Inc., 2021.
[20] P. P. Et. al., “A Honey pot Implementation for security Enhancement in IOT System using AES and Key management,†Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 12, no. 3, pp. 5206–5214, 2021, doi: 10.17762/turcomat.v12i3.2149.
[21] “Security Operations Center | Certified SOC Analyst | CSA | EC-Council.†.
[22] “Wazuh Elastic Stack.†.
[23] L. Hochstein and R. Moser, Ansible: Up and Running, 3rd ed. O’Reilly Media, Inc., 2022.
[24] P. D. Sugiyono, Metode Penelitian Kuantitatif, Kualitatif, dan R&D, 3rd ed. Bandung: CV Alfabeta, 2021.
[25] S. Aiiy, “Comparative analysis of proxmox VE and xenserver as type 1 open source based hypervisors,†International Journal of Scientific and Technology Research, vol. 7, no. 3, pp. 72–77, 2018.
[26] R. Khan, N. AlHarbi, G. AlGhamdi, and L. Berriche, “Virtualization Software Security: Oracle VM VirtualBox,†in 2022 Fifth International Conference of Women in Data Science at Prince Sultan University (WiDS PSU), 2022, pp. 58–60, doi: 10.1109/WiDS-PSU54548.2022.00023.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Fitria Santika, Nurul Azmi Gumanti, Leni Herfiyanti, Candra Mecca Sufyana, Outpatient Medical E-Resume in Support INA-CBGs Claims for Covid-19 Patients at Hospital , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 1 (2021)
- Moh.Erwin Indrawan, Ahmat Adil, IMPLEMENTASI RESTFUL WEB SERVICE ONE CHIP MULTI-CLIENT UNTUK MENGOPTIMALKAN PENJUALAN PULSA ALL OPERATOR , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Lalu Zazuli Azhar Mardedi, Ariyanto Ariyanto, Analisa Kinerja System Gluster FS pada Proxmox VE untuk Menyediakan High Availability , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 1 (2019)
- Ilham Firman Ashari, Vanesa Adhelia, Expert System and IoT for Diagnose of Feline Panleukopenia Virus using Certainty Factor , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
- Achmad Lukman, Wahju Tjahjo Saputro, Erni Seniwati, Improving Performance Convolutional Neural Networks Using Modified Pooling Function , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Marwan Hakim, SISTEM PENDUKUNG KEPUTUSAN KATEGORI RUMAH TIDAK LAYAK HUNI DI KELURAHAN MAJIDI SELONG KABUPATEN LOMBOK TIMUR DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 17 No. 1 (2017)
- Arief Hermawan, Adityo Permana Wibowo, Akmal Setiawan Wijaya, The Improvement of Artificial Neural Network Accuracy Using Principle Component Analysis Approach , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Miftahus Sholihin, Mohd Farhan Bin Md. Fudzee, Lilik Anifah, A Novel CNN-Based Approach for Classification of Tomato Plant Diseases , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Muhammad Tajuddin, Ahmat Adil, Andi Sofyan Anas, Game for Sasak Script Based on Knuth Morris Pratt Algorithm and ADDIE Model , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Arwin Datumaya Wahyudi Sumari, Fatiha Eros Perdana, Dwi Nugraheny, Sandra Lovrencic, Improving the User Interface and Experience of a Student PortalThrough the Eight Golden Rules , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
You may also start an advanced similarity search for this article.