PERANCANGAN DAN IMPLEMENTASI SQUID PROXY UNTUK FILTERISASI KONTEN WEB DI PT. INDONESIAN TOBACCO
SKRIPSI Disusun Untuk Memenuhi Persyaratan dalam Memperoleh Gelar Sarjana Komputer (S.Kom)
Oleh: ADE SEPTYALIS PRATAMA 201010370311061
JURUSAN TEKNIK INFORMATIKA FAKULTAS TEKNIK UNIVERSITAS MUHAMMADIYAH MALANG 2014
KATA PENGANTAR
Dengan memanjatkan puji syukur kehadirat Allah SWT, atas limpahan rahmat dan Hidayah-Nya sehingga peneliti dapat menyelesaikan tugas akhir yang berjudul : “PERANCANGAN
DAN
IMPLEMENTASI
SQUID
PROXY
UNTUK
FILTERISASI KONTEN WEB DI PT. INDONESIAN TOBACCO” Di dalam tulisan ini dijelaskan pokok-pokok bahasan yang meliputi perancangan sistem dan implementasi filtering squid proxy. pembuatan sistem filterisasi squid proxy dan pengujian konten web. Peneliti menyadari sepenuhnya bahwa dalam penulisan tugas akhir ini masih banyak kekurangan dan keterbatasan. Oleh karena itu peneliti mengharapkan saran yang membangun agar tulisan ini bermanfaat bagi perkembangan ilmu pengetahuan kedepan.
Malang, 02 Desember 2014
Penulis
DAFTAR ISI HALAMAN JUDUL LEMBAR PERSETUJUAN .....................................................................................i LEMBAR PENGESAHAN .................................................................................... ii LEMBAR PERNYATAAN KEASLIAN .............................................................. iii ABSTRAK ..............................................................................................................iv ABSTRACT............................................................................................................. v LEMBAR PERSEMBAHAN ................................................................................vi KATA PENGANTAR ......................................................................................... vii DAFTAR ISI ....................................................................................................... viii DAFTAR GAMBAR ............................................................................................... x DAFTAR TABEL...................................................................................................xi BAB I : PENDAHULUAN 1.1 Latar Belakang .................................................................................................. 1 1.2 Rumusan Masalah ............................................................................................. 3 1.3 Tujuan Penelitian .............................................................................................. 3 1.4 Batasan Masalah ............................................................................................... 3 1.5 Metodologi ......................................................................................................... 4 1.5.1 Studi Pustaka............................................................................................ 4 1.5.2 Desain Sistem........................................................................................... 4 1.5.3 Implementasi Metode............................................................................... 4 1.5.4 Pengujian Sistem...................................................................................... 4 1.5.5 Pembuatan Laporan ................................................................................. 4 1.6 Sistematika Penulisan ........................................................................................ 5 BAB II : LANDASAN TEORI 2.1 Access Control List / Treshold Pembatasan ....................................................... 7 2.2 Internet ............................................................................................................... 8 2.3 Keamanan Jaringan ............................................................................................ 9 2.4 Proxy Server..................................................................................................... 14 2.4.1 Fungsi..................................................................................................... 14 2.4.2 Internet Connection ............................................................................... 15
2.4.3 Packet Filtering ..................................................................................... 16 2.4.4 Caching .................................................................................................. 17 2.4.5 Quinto Lab Proxy (qlproxy) ................................................................... 19 2.4.6 Konfigurasi Squid .................................................................................. 20 2.5 Hasil Penelitian Terkait.................................................................................... 22 BAB III : ANALISIS DAN PERANCANGAN SISTEM 3.1 Analisis Sistem................................................................................................ 24 3.1.1 Arsitektur sistem ................................................................................... 25 3.1.2 Penerapan qlproxy ............................................................................... 28 3.1.3 Metode untuk mendapatkan ACL ......................................................... 29 3.1.4 Perencanaan IP Address dan NAT ........................................................ 29 3.1.5 Deskripsi Produk ................................................................................... 30 3.1.6 Analisis Kebutuhan Fungsional ............................................................ 30 3.1.7 Analisis Kebutuhan Non Fungsional .................................................... 31 3.1.8 Use Case Diagram Filterisasi Konten ................................................... 31 3.1.9 Use Case Skenario ................................................................................ 33 3.2 Perancangan Sistem ......................................................................................... 36 3.2.1 Activity Diagram .................................................................................. 36 3.2.2 Sequensial Diagram .............................................................................. 38 BAB IV : IMPLEMENTASI DAN PENGUJIAN 4.1 Implementasi Sistem ........................................................................................ 41 4.1.1 Sebelum diberi sistem ............................................................................ 41 4.1.2 Implementasi lingkungan pengembangan.............................................. 42 4.2 Pengujian Sistem.............................................................................................. 50 BAB V : PENUTUP 5.1 Kesimpulan ...................................................................................................... 58 5.2 Saran ................................................................................................................ 58 DAFTAR PUSTAKA ............................................................................................ 59 BIOGRAFI PENULIS ........................................................................................... 60
DAFTAR GAMBAR Gambar 3.1 Perancangan Sistem ..................................................................................... 25 Gambar 3.2 Flowchart Squid Proxy.................................................................................. 27 Gambar 3.3 Use Case Diagram Squid Proxy untuk Filterisasi Konten................ 32 Gambar 3.4 Activity Diagram Content Access............................................................... 36 Gambar 3.5 Activity Diagram Squid Proxy .................................................................... 37 Gambar 3.6 Activity Diagram Filtering ........................................................................... 37 Gambar 3.7 Activity Diagram Warning Content .......................................................... 38 Gambar 3.8 Sequence Diagram Content Access ........................................................... 38 Gambar 3.9 Sequence Diagram Squid Proxy ................................................................. 39 Gambar 3.10 Sequence Diagram Filtering ..................................................................... 39 Gambar 3.11 Sequence Diagram Content Warning .................................................... 40 Gambar 4.1 Sebelum diberi sistem ................................................................................. 41 Gambar 4.2 akses acl localnet pada squid ..................................................................... 43 Gambar 4.3 Setting Localnet .............................................................................................. 44 Gambar 4.4 Instalasi ICAP .................................................................................................. 44 Gambar 4.5 Pemberian Bobot Kata Kunci .................................................................... 47 Gambar 4.6 Konfigurasi Browser Mozilla..................................................................... 49 Gambar 4.7 Pemblokiran konten yang berbau porno ............................................. 49 Gambar 4.2.1 Pengujian konten akses web kesehatan............................................ 51 Gambar 4.2.2 Pengujian konten akses web kesehatan............................................ 51 Gambar 4.2.3 Pengujian konten akses web kesehatan............................................ 51 Gambar 4.2.4 Pengujian konten akses web kesehatan............................................ 51 Gambar 4.2.5 Pengujian konten akses judi .................................................................. 53 Gambar 4.2.6 Pengujian konten akses judi .................................................................. 53 Gambar 4.2.7 Pengujian konten akses porno .............................................................. 54 Gambar 4.2.4 Pengujian konten akses porno .............................................................. 54
DAFTAR TABEL
Tabel 3.1 Content Access ...................................................................................................... 33 Tabel 3.2 Squid Proxy ............................................................................................................ 34 Tabel 3.3 Filtering .................................................................................................................. 34 Tabel 3.4 Content Warning ................................................................................................. 35 Tabel 4.1 Pengujian Content Access................................................................................. 50 Tabel 4.2 Pengujian Content Warning ............................................................................ 52 Tabel 4.3 Pengujian squid proxy ..................................................................................... 55 Tabel 4.4 Pengujian squid proxy dan qlproxy ............................................................ 56
DAFTAR PUSTAKA
[1] Wijaya, D, Trisna. 2009. Implementasi Squid Proxy Server pada PC Router Berbasis Linux Mandriva di UPT SDN Mandaranrejo 1 Kota Pasuruan. Malang : Fakultas Teknik, Universitas Negeri Malang. [2] Saini, Kulbir.2011. Squid Proxy Server 3.1. Beginner’s Guide. Birmingham: Packt Publishing Ltd [3] Forouzan, B. A. 2010. TCP/IP Protocol Suite. 4th Edition. New York: The McGrawHill. [4] Rahardjo, Budi. 1999. Keamanan Sistem Informasi Berbasis Internet. Bandung: Insan Komunikasi/ Infonesia. Rathomy, Fiqi [5] Setiawati, Mustofa Kama. 2009. Membangun dan Memanfaatkan Proxy Server untuk Memfilter dan Mengatur Waktu Akses Situs Facebook di SDN Mergosono 3 Malang. Malang: Fakultas Teknik, Universitas Negeri Malang. [6] Muawan, S, Mukhammad. 2009. Implementasi Squid dan IP Table sebagai Proxy Server dan Firewall di Laboratorium Komputer SMK Negeri 1 Pogalan. Malang:Fakultas Teknik, Universitas Negeri Malang. [7] Rosyi. 2013. Perancangan dan Implementasi Proxy Server Menggunakan Ubuntu Linux 12.04 Untuk Jaringan Internet Sehat Pada SMK Penerbangan Yogyakarta. STMIK AMIKOM Yogyakarta [8] Lurio dan Lestariningati, S, Indriani. 2013. Perancangan dan Implementasi Proxy Server Untuk Filtering Berdasarkan Alamat Situs dan Alamat IP. Jurnal Teknik Komputer Unikom – Komputika – Volume 2, No.2 – 2013 [9] Munawar. 2005. Permodelan visual dengan UML. Graha Ilmu. Yogyakarta [10]
Indrawati, Y, dkk. 2012. Implementasi Model Multimedia Interaktif Skenario
Timeline Tree Pada Simulasi Ibadah Wajib Dalam Agama Islam. Jurnal Informatika No.3 , Vol. 3, September – Desember 2012. Bandung [11]
Latief, Nurul, M. 2013. Training Monitoring System for Cyclist Based on
Android Application Development.
Department of Communication Engineering,
Faculty of Electrical Engineering, Universiti Teknologi Malaysia