Strategy Protecting Networking System from Trojan using Firewall and Encryption Data

Authors

  • Lovendo Danuartha Universitas Muhammadyah Prof. DR. HAMKA
  • Tegar Faturrahman Universitas Muhammadiyah Prof. DR. HAMKA
  • Muthia Mu’adzarah Universitas Muhammadiyah Prof. DR. HAMKA
  • Albi Bani Rusaji Universitas Muhammadiyah Prof. DR. HAMKA
  • Suciana Wijirahayu Universitas Muhammadiyah Prof. DR. HAMKA

Keywords:

trojan, network system, firewall configuration, data encryption

Abstract

This journal discusses strategies for protecting network systems from Trojan threats by utilizing firewall technology and data encryption. Trojans are a type of malware that can damage the integrity and confidentiality of data in a network system. With the increasing complexity of cyber attacks, it is important for organizations to implement effective security measures.Trojans are usually separated into two parts server and client. It is the client that is cleverly disguised as critical software and placed in a peer-to-peer file sharing networks, or unauthorized download sites.

 

By enforcing strict rules and monitoring network traffic, firewalls can help identify suspicious patterns that may indicate the presence of a Trojan. The encryption process changes the original data (plaintext) into an unreadable form (ciphertext) without requiring a correct decryption key. The study also highlights the importance of using strong encryption algorithms and best practices in key management to ensure data security.

References

Borky, J. M., & Bradley, T. H. (2018). Protecting information with cybersecurity.Springer. https://doi.org/10.1007/978-3-319-95669-5_10

David, et al.(2012).Malicious Key Emission via Hardware Trojan Against Encryption System.

https://www.researchgate.net/publication/258432904_Malicious_Key_Emission_via_Hardware_Trojan_Against_Encryption_System

Deepak, I., & Varun, D. (2019). A Survey on: Network Security and Management, Threats & Firewall. https://www.researchgate.net/publication/354683585_A_Survey_on_Network_Security_and_Management_Threats_Firewalls

Desai, et al.(2002).System Insecurity - Firewall.

https://www.researchgate.net/publication/220208052_System_insecurity_-_Firewalls

Ghossoon. M. W. Al-Saadoon (2011). A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems. World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 1, No. 3, 56-62. https://arxiv.org/abs/1105.1234

Nguyen, T. N., & Le, T. T. T. (2021). Authentication and encryption algorithms for data security in cloud computing: A comprehensive review. Proceedings of the Sixth International Conference on Research in Intelligent and Computing. http://dx.doi.org/10.15439/2021R7

Nkosi, S., & Mthembu, T. (2020). Firewall Mastery: Advanced Strategies for Implementation and Digital Defense International Journal of Trend in Scientific Research and Development (IJTSRD) , 2456 – 6470. https://www.ijtsrd.com/papers/ijtsrd30772.pdf

Oduroye, A. P., & Sarumi, J. A.(2024).DATA ENCRYPTION: The Definitive Guide to Protecting Your Digital Assets.

https://www.researchgate.net/publication/381545968_DATA_ENCRYPTION_The_Definitive_Guide_to_Protecting_Your_Digital_Assets

Patel, Udit (2024). The Role of Next Generation Firewalls in Modern Network Security: A Comprehensive Analysis International Journal of Advanced Research in Engineering and Technology (IJARET), 135-154. https://doi.org/10.5281/zenodo.13643404

Shield, J., Hopkins, B., Beaumont, M., & North, C. (2015). Hardware Trojans: A systemic threat.https://www.researchgate.net/publication/283042913_Hardware_trojans_-_A_systemic_threat

Shuaib, A. W., Meghji, A. F., Yichiet, A., Kumar, R., Shaikh, F. B.

(2023). Encryption Techniques and Algorithms to Combat Cybersecurity Attacks : A Review. VAWKUM Transactionson Computer Sciences , Vol 11, 295-305. https://doi.org/10.21015/vtcs.v11i1.1521

Sun, J., Chandel, S., Yu, Y., & Zang, J. (2020). Securing a network: How effective using firewalls and VPNs are? .

https://www.researchgate.net/publication/330831979_Securing_a_Network_How_Effective_Using_Firewalls_and_VPNs_Are

Voronkov, A., Iwaya, L. H., Martucci, L. A., & Lindskog, S. (2017).“Systematic literature review on usability of firewall configuration. ACM Computing Surveys, 50(6). https://doi.org/10.1145/1234567

Wang, P. (2022). Research on firewall technology and its application in computer network security strategy. Frontiers in Computing and Intelligent Systems, 2(2). https://www.researchgate.net/publication/367103503_Research_on_firewall_technology_and_its_application_in_computer_network_security_strategy

Yadav, et al.(2019). Cybersecurity: Protecting Networks, Systems, and Data form Cyberattacks.https://www.researchgate.net/publication/377909595_Cybersecurity_Protecting_Networks_Systems_and_Data_from_Cyberattacks

Downloads

Published

2025-01-17

How to Cite

Danuartha, L., Faturrahman, T., Mu’adzarah, M., Bani Rusaji, A., & Wijirahayu, S. (2025). Strategy Protecting Networking System from Trojan using Firewall and Encryption Data. Forum for University Scholars in Interdisciplinary Opportunities and Networking, 1(1), 259–264. Retrieved from https://conference.ut.ac.id/index.php/fusion/article/view/4773

Conference Proceedings Volume

Section

Articles

Most read articles by the same author(s)

1 2 > >> 

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.