Analisis Keamanan Infrastruktur Jaringan Berdasarkan Cyber Kill Chain Framework

Main Article Content

Utama Hasiolan Panggabean
Benfano Soewito


This study concentrates on examining the security of network infrastructure using the cyber kill chain framework approach. The research is conducted within a company operating in network security services. In its operations, it offers a Virtual Private Cloud (VPC) containing various crucial information such as applications, internal data, client data, and product demos. Despite the attractive features of cloud computing, there are significant threats as well. Handling attacks cannot be swiftly and efficiently executed, resulting in temporary operational unavailability until the attacks are resolved. This research delves into the security of the company's infrastructure by testing several points of vulnerability exploited by malicious parties. The cyber kill chain framework approach is employed to systematically assess the company's infrastructure. The study reveals that certain issues have been adequately detected; however, security gaps persist, as evidenced by the testing conducted and the inadequate response from the company's security systems.

Article Details

How to Cite
Analisis Keamanan Infrastruktur Jaringan Berdasarkan Cyber Kill Chain Framework. (2023). JUSIFO (Jurnal Sistem Informasi), 9(1), 33-44.

How to Cite

Analisis Keamanan Infrastruktur Jaringan Berdasarkan Cyber Kill Chain Framework. (2023). JUSIFO (Jurnal Sistem Informasi), 9(1), 33-44.


Abdul-Jabbar, S. S., Aldujaili, A., Mohammed, S. G., & Saeed, H. S. (2020). Integrity and security in cloud computing environment: a review. Journal of Southwest Jiaotong University, 55(1).

Ahmed, Y., Asyhari, A. T., & Rahman, M. A. (2021). A cyber kill chain approach for detecting advanced persistent threats. Computers, Materials and Continua, 67(2), 2497–2513.

Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., & Ayaz, M. (2021). A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access, 9, 57792–57807.

Aminzade, M. (2018). Confidentiality, integrity and availability – finding a balanced IT framework. Network Security, 2018(5), 9–11.

Bollinadi, M., & Damera, V. K. (2017). Cloud computing: security issues and research challenges. Journal of Network Communications and Emerging Technologies (JNCET) Www.Jncet.Org, 7(11).

Capano, D. E. (2019). Understand the cyber-attack lifecycle: a cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial contr. Control Engineering, 66(7), 32–34.

Carella, A., Kotsoev, M., & Truta, T. M. (2017). Impact of security awareness training on phishing click-through rates. Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017, 2018-Janua, 4458–4466.

Garba, F. A., Junaidu, S. B., Ahmad, B. I., & Tekanyi, A. M. S. (2019). Proposed framework for effective detection and prediction of advanced persistent threats based on the cyber kill chain. Scientific and Practical Cyber Security Journal, 3(3).

Ghafir, I., Saleem, J., Hammoudeh, M., Faour, H., Prenosil, V., Jaf, S., Jabbar, S., & Baker, T. (2018). Security threats to critical infrastructure: the human factor. Journal of Supercomputing, 74(10), 4986–5002.

Gunduz, M. Z., & Das, R. (2020). Cyber-security on smart grid: threats and potential solutions. Computer Networks, 169, 107094.

Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: a survey. Computers 2014, Vol. 3, Pages 1-35, 3(1), 1–35.

Khidzir, N. Z., Mat Daud, K. A., Ismail, A. R., Abd. Ghani, M. S. A., & Ibrahim, M. A. H. (2018). Information security requirement: the relationship between cybersecurity risk confidentiality, integrity and availability in digital social media. Regional Conference on Science, Technology and Social Sciences (RCSTSS 2016), 229–237.

Kiwia, D., Dehghantanha, A., Choo, K. K. R., & Slaughter, J. (2018). A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. Journal of Computational Science, 27, 394–409.

Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691–697.

Lee, J.-S., Cho, S.-Y., Oh, H.-R., & Han, M.-M. (2021). A study on defense and attack model for cyber command control system based cyber kill chain. Journal of Internet Computing and Services, 22(1), 41–50.

Liu, W. (2012). Research on cloud computing security problem and strategy. 2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012 - Proceedings, 1216–1219.

Rehak, D., Senovsky, P., Hromada, M., & Lovecek, T. (2019). Complex approach to assessing resilience of critical infrastructure elements. International Journal of Critical Infrastructure Protection, 25, 125–138.

Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. Journal of Supercomputing, 76(12), 9493–9532.

Tchernykh, A., Schwiegelsohn, U., Talbi, E. ghazali, & Babenko, M. (2019). Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. Journal of Computational Science, 36, 100581.

Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167–25177.

Wang, Y., Zhang, T., & Ye, Q. (2021). Situation awareness framework for industrial control system based on cyber kill chain. MATEC Web of Conferences, 336, 02013.

Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.