Analisis Keamanan Jaringan pada Sistem Kendali Jarak Jauh untuk Infrastruktur Kritis
Keywords:
Keamanan Jaringan, Infrastruktur Kritis, Ancaman Siber, Proteksi JaringanAbstract
Keamanan jaringan pada sistem kendali jarak jauh untuk infrastruktur kritis menjadi isu yang penting seiring dengan meningkatnya ancaman siber yang dapat mengganggu operasional. Penelitian ini bertujuan untuk menganalisis tingkat keamanan pada sistem kendali jarak jauh di berbagai fasilitas infrastruktur kritis, dengan fokus pada ancaman eksternal dan internal. Pendekatan yang digunakan dalam penelitian ini adalah studi kasus dengan mengamati tiga fasilitas yang berbeda, serta mengidentifikasi berbagai jenis serangan yang dapat mengakses dan merusak sistem kendali. Hasil penelitian menunjukkan bahwa fasilitas dengan kebijakan keamanan yang kuat dan teknologi mitigasi yang canggih, seperti pembaruan perangkat lunak rutin dan kontrol akses berbasis peran (RBAC), lebih mampu mengatasi ancaman seperti serangan DDoS, phishing, dan serangan zero-day. Sebaliknya, fasilitas yang memiliki kebijakan keamanan lemah menunjukkan kerentanannya terhadap ancaman tersebut. Penelitian ini memberikan kontribusi penting terhadap pengembangan pengetahuan di bidang keamanan siber untuk infrastruktur kritis, serta memberikan rekomendasi terkait penerapan kebijakan dan teknologi mitigasi yang lebih baik untuk meningkatkan ketahanan sistem kendali jarak jauh.
Downloads
References
T. Douae and B. Hassan, “Sensitive Infrastructure Control Systems Cyber-Security: Literature Review,” 2023, pp. 310–319. doi: 10.1007/978-3-031-35251-5_30.
V. Kuz, “risk management of critical information infrastructure: threats-vulnerabilities-consequences,” Theor. Appl. Cybersecurity, vol. 5, no. 2, Nov. 2023, doi: 10.20535/tacs.2664-29132023.2.280377.
J. Zhou, J. Shang, and T. Chen, “Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review,” IEEE/CAA J. Autom. Sin., vol. 11, no. 4, pp. 851–865, Apr. 2024, doi: 10.1109/JAS.2024.124257.
S. Jahan Simu and F. I. Zaman, “Advanced Cybersecurity Strategies for Protecting Critical Infrastructure: Strengthening the Backbone of National Security,” Int. J. Sci. Res. Manag., vol. 11, no. 12, pp. 999–1016, Dec. 2023, doi: 10.18535/ijsrm/v11i12.ec07.
T. Weitoish and D. N. Burrell, “SCADA Systems and Threats to Critical Infrastructures,” 2023, pp. 74–100. doi: 10.4018/979-8-3693-1970-3.ch004.
Z. Chen, “Encryption Techniques in Near Field Communication (NFC): Challenges, Applications, and Future Directions,” Sci. Technol. Eng. Chem. Environ. Prot., vol. 1, no. 9, Oct. 2024, doi: 10.61173/m4vjgg14.
M. Dheer, D. K. Sinha, and N. Kaushik, “Designing Secure Communication Protocols for Industrial Systems,” in 2024 International Conference on Advances in Computing Research on Science Engineering and Technology (ACROSET), IEEE, Sep. 2024, pp. 1–6. doi: 10.1109/ACROSET62108.2024.10743440.
shulei wu et al., “Research on encryption and decryption algorithm of remote sensing image based on face image,” Jul. 16, 2024. doi: 10.1364/opticaopen.26264822.v1.
C. Liu, “Controlled remote implementation of operations for many systems,” Theor. Nat. Sci., vol. 39, no. 1, pp. 103–111, Jun. 2024, doi: 10.54254/2753-8818/39/20240581.
N. Febitri, H. Witriyono, M. Muntahanah, and M. Marhalim, “Application of AES 256 Cryptography Algorithm OCB Mode on Student Data,” J. Komputer, Inf. dan Teknol., vol. 3, no. 2, Dec. 2023, doi: 10.53697/jkomitek.v3i2.1478.
P. Yellamma, R. Papolu, N. Pendem, and P. Karanam, “Strengthening Cloud Data Security using Web- Based File Encryption and Decryption with AESCBC- 256,” in 2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS), IEEE, Nov. 2023, pp. 1–7. doi: 10.1109/ICIICS59993.2023.10421303.
V. Z. González, E. Tena-Sanchez, and A. J. Acosta, “A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks,” in 2023 38th Conference on Design of Circuits and Integrated Systems (DCIS), IEEE, Nov. 2023, pp. 1–6. doi: 10.1109/DCIS58620.2023.10336003.
M. Jammula, “Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algorithm Named Ternary DES for Digital Payments,” Asian J. Appl. Sci. Technol., vol. 06, no. 01, pp. 89–98, 2022, doi: 10.38177/ajast.2022.6111.
Z. Fu, G. Feng, and J. Wang, “Research on Computer Information Security Technology Based on DES Data Encryption Algorithm,” 2023, pp. 309–317. doi: 10.1007/978-981-99-0880-6_34.
J. R. Aldred and S. M. Mulholland, “Assessing the Risk of Healthcare Facilities to Industrial Control System Cyber Vulnerabilities,” in ASCE Inspire 2023, Reston, VA: American Society of Civil Engineers, Nov. 2023, pp. 250–257. doi: 10.1061/9780784485163.030.
E. Riyadi, “The new hybrid cryptographic methods to enhance the data communication security at nuclear facilities instrumentation and control (I&C) systems,” 2022, p. 020001. doi: 10.1063/5.0127287.
S. Vasylenko, I. Samoilov, and S. Burian, “Method of control of the state of protection of the automated process control system of the critical infrastructure facility,” Collect. "Information Technol. Secur., vol. 10, no. 1, pp. 17–26, Jun. 2022, doi: 10.20535/2411-1031.2022.10.1.261047.
E. Benetti, S. Sapori, and G. Mazzini, “Adoption of Two-Factor Authentication in a Pre-Existing Heterogeneous System,” in 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), IEEE, Sep. 2023, pp. 1–6. doi: 10.23919/SoftCOM58365.2023.10271633.
M. Czuryk, “Cybersecurity and Protection of Critical Infrastructure,” Stud. Iurid. Lublinensia, vol. 32, no. 5, pp. 43–52, Dec. 2023, doi: 10.17951/sil.2023.32.5.43-52.
G. V. Fedotova, Y. A. Kapustina, A. G. Churaev, and Z. Y. Yuldashbayeva, “Cybersecurity of Critical Infrastructure Facilities,” Proc. Southwest State Univ. Ser. Econ. Sociol. Manag., vol. 13, no. 4, pp. 111–122, Nov. 2023, doi: 10.21869/2223-1552-2023-13-4-111-122.
S.-E. Jeon et al., “An Effective Threat Detection Framework for Advanced Persistent Cyberattacks,” Comput. Mater. Contin., vol. 75, no. 2, pp. 4231–4253, 2023, doi: 10.32604/cmc.2023.034287.
R. Luis de Moura, V. N. L. Franqueira, and G. Pessin, “Cybersecurity in Industrial Networks: Artificial Intelligence Techniques Applied to Intrusion Detection Systems,” in 2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), IEEE, Jul. 2023, pp. 2235–2242. doi: 10.1109/CSCE60160.2023.00365.
T. Sowmya and E. A. Mary Anita, “A comprehensive review of AI based intrusion detection system,” Meas. Sensors, vol. 28, p. 100827, Aug. 2023, doi: 10.1016/j.measen.2023.100827.
G. Abdiyeva-Aliyeva, “AI-Based Network Security Anomaly Prediction and Detection in Future Network,” in 2023 11th International Symposium on Digital Forensics and Security (ISDFS), IEEE, May 2023, pp. 1–5. doi: 10.1109/ISDFS58141.2023.10131845.
P. Piantanida, V. Villa, A. Vottari, and K. Aliev, “Facilities components’ reliability & maintenance services self-rating through big data processing,” IOP Conf. Ser. Earth Environ. Sci., vol. 1176, no. 1, p. 012006, May 2023, doi: 10.1088/1755-1315/1176/1/012006.
M. Sohidul Islam, M. Sajjad, M. Mahmudul Hasan, and M. Sakib Islam Mazumder, “Phishing Attack Detecting System Using DNS and IP Filtering,” Asian J. Comput. Sci. Technol., vol. 12, no. 1, pp. 16–20, Apr. 2023, doi: 10.51983/ajcst-2023.12.1.3552.
Z. Alamin, S. Mutmainah, and M. I. Setiawan, “Optimasi Manajemen Data Multi Level User Kader Posyandu Kecamatan Raba menggunakan Yii2,” Indones. J. Softw. Eng., vol. 10, no. 2, pp. 177–184, Dec. 2024, doi: 10.31294/ijse.v10i2.23606.
N. Chowdhury and V. Gkioulos, “Cyber security training for critical infrastructure protection: A literature review,” Comput. Sci. Rev., vol. 40, p. 100361, May 2021, doi: 10.1016/j.cosrev.2021.100361.
D. Hutchinson, M. Kunasekaran, A. Quigley, A. Moa, and C. R. MacIntyre, “Could it be monkeypox? Use of an AI-based epidemic early warning system to monitor rash and fever illness,” Public Health, vol. 220, pp. 142–147, Jul. 2023, doi: 10.1016/j.puhe.2023.05.010.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Zumhur Alamin, Muhammad Amirul Mu’min (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.