Analysis of Firewall Policy Effectiveness in Filtering Network Traffic Using Elastic Stack

Authors

  • Dewa Ayu Rai Sudarma Putri Universitas Bumigora
  • Lilik Widyawati Universitas Bumigora
  • Husain Universitas Bumigora
  • I Made Yadi Dharma Universitas Bumigora

DOI:

https://doi.org/10.59934/jaiea.v4i3.1116

Keywords:

Firewall, Elastic Stack, Network Traffic, Network Security, Log Analysis

Abstract

This research is motivated by the increasing importance of network security in the digital age, particularly for organizations like Company X, given the rise in cyber threats that compromise data and system integrity. The study aims to analyze the effectiveness of the firewall policy in filtering network traffic using the Elastic Stack and to provide recommendations for improvement. The research methodology involves processing and analyzing firewall log data over one month using the Elastic Stack. The results demonstrate that the Elastic Stack successfully identified normal and suspicious traffic patterns, as well as the effectiveness of the firewall in blocking threats. The research also found connections with an "incomplete" status, indicating potential network communication issues. It is concluded that the firewall policy at Company X is generally effective, but there is room for improvement. This research recommends adjusting filtering rules, improving network segmentation, and implementing an intrusion detection system.

Downloads

Download data is not yet available.

References

S. A. Indrarto And A. Basuki, “Penerapan Platform Visualisasi Dan Analisis Trafik Jaringan Menggunakan Elastic Stack,” 2022. [Online]. Available: Http://J-Ptiik.Ub.Ac.Id

A. Admi, A. Hakim, And N. Maulana, “Penerapan Elastic Stack Sebagai Tools Alternatif Pemantauan Traffic Jaringan Dan Host Pada Instansi Pemerintah Untuk Memperkuat Keamanan Dan Ketahanan Siber Indonesia”.

M. Rafi, F. Fathin, A. Basuki, And A. Bhawiyuga, “Penerapan Elastic Stack Sebagai Platform Visualisasi Dan Analisis Trafik Pada Jaringan Riset Dan Edukasi,” 2022. [Online]. Available: Http://J-Ptiik.Ub.Ac.Id

F. Riza, “Analisis Security Information And Event Management (Siem) Elastic Search Menggunakan Metode Nist 800-61 Rev2 Pada Datacenter Pt. Sembilan Pilar Semesta,” 2023.

A. Setiyawan, A. Pinandito, And W. Purnomo, “Pengembangan Sistem Informasi Log Management Server Monitoring Menggunakan Elk (Elastic Search, Logstash Dan Kibana) Stack Pada Aplikasi Padichain Di Pt. Bank Rakyat Indonesia,” 2023. [Online]. Available: Http://J-Ptiik.Ub.Ac.Id

P. Napoleon And K. Bayu, “Implementasi Server Log Monitoring System Menggunakan Elastic Stack,” 2022. [Online]. Available: Http://J-Ptiik.Ub.Ac.Id

Downloads

Published

2025-06-15

How to Cite

Sudarma Putri, D. A. R., Lilik Widyawati, Husain, & I Made Yadi Dharma. (2025). Analysis of Firewall Policy Effectiveness in Filtering Network Traffic Using Elastic Stack. Journal of Artificial Intelligence and Engineering Applications (JAIEA), 4(3), 2129–2133. https://doi.org/10.59934/jaiea.v4i3.1116

Issue

Section

Articles