ANALISA KEAMANAN WEBSITE MENGGUNAKAN AQUA SECURITY: INTEGRASI BIG DATA DALAM DETEKSI DAN MITIGASI ANCAMAN PADA LINGKUNGAN KONTAINER
DOI:
https://doi.org/10.59134/jimat.v3i1.761Keywords:
Keamanan kontainer, Aqua Security, Docker, Kubernetes, Big Data, Deteksi ancamanAbstract
Penelitian ini mengevaluasi efektivitas Aqua Security untuk deteksi dan mitigasi ancaman pada lingkungan kontainer yang menjalankan aplikasi web dan modul Big Data. Arsitektur uji menggunakan Docker dan Kubernetes. Metode meliputi pemindaian image, kebijakan runtime, RBAC, dan pemeriksaan kepatuhan, disertai simulasi serangan serta analisis log. Hasil menunjukkan Aqua mampu mengidentifikasi kerentanan dan aktivitas anomali saat runtime serta memberi rekomendasi kebijakan yang mempercepat respons dan menurunkan risiko pada skenario laboratorium. Keterbatasan penelitian terletak pada skala uji dan variasi beban yang terbatas. Kesimpulannya, integrasi Aqua Security efektif sebagai lapisan deteksi dan mitigasi pada arsitektur kontainer web + Big Data, dan direkomendasikan untuk diuji lanjut pada skala produksi.
References
Adhikari, S., & Baidya, S. (2024). Cyber security in containerization platforms: A comparative study of security challenges, measures and best practices. arXiv preprint. https://doi.org/10.48550/arXiv.2404.18082
Aqua Security Docs. (2025). Aqua Platform Documentation. https://docs.aquasec.com
Burns, B., Grant, B., Oppenheimer, D., Brewer, E., & Wilkes, J. (2016). Borg, Omega, and Kubernetes. Communications of the ACM, 59(5), 50–57. https://doi.org/10.1145/2890784
Chekole, E. G., Zhou, J., & Ochoa, M. (2023). On the security of containers: Threat modeling, attack analysis, and mitigation strategies. Computers & Security, 131, 103299. https://doi.org/10.1016/j.cose.2023.103299
Combe, T., Martin, A., & Di Pietro, R. (2016). To Docker or not to Docker: A security perspective. IEEE Cloud Computing, 3(5), 54–62. https://doi.org/10.1109/MCC.2016.91
Docker Documentation. (2025). Get started with Docker. https://docs.docker.com/get-started/
Kubernetes Documentation. (2025). Production-grade container orchestration. https://kubernetes.io/docs/home/
Merkel, D. (2014). Docker: Lightweight Linux containers for consistent development and deployment. Linux Journal, 2014(239), 2. https://dl.acm.org/doi/10.5555/2600239.2600241
Morić, Z., Dakić, V., & Čavala, T. (2025). Security hardening and compliance assessment of Kubernetes control plane and workloads. Journal of Cybersecurity and Privacy, 5(2), 30. https://doi.org/10.3390/jcp5020030
Novitawaty, N., & Hendradi, P. (2022). Penggunaan perangkat lunak robot untuk otomatisasi dan mempercepat proses integrasi sistem dan manusia dalam berbagai proses bisnis. Prosiding, 2, 255–273. https://doi.org/10.59134/prosidng.v2i-.133
Sharma, K. (2025). A deep dive into container security challenges, strategies, and resource isolation in orchestrated environments. Advances in Intelligent Systems Research (RAISD 2025). https://doi.org/10.2991/978-94-6463-787-8_38
Sutabri, T., Rian, H., Hendradi, P., & Febrianto, F. (2020, January). Designing the autogate pass dashboard application with Android-based responsive web design technology. In Proceedings of the First International Conference of Science, Engineering and Technology.
Wong, A. Y., Chekole, E. G., & Zhou, J. (2021). Threat modeling and security analysis of containers: A survey. arXiv preprint. https://doi.org/10.48550/arXiv.2111.11475
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Sultan Sabdo Pandito, Sukarno Bahat Nauli, Hernalom Sitorus, Melani Indah Sari Manik

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.




