Public IP Efficiency and Data Center Security Enhancement with Reverse Proxy Implementation
Abstract
With the increasing frequency of cyber-attacks, the trend of national cybersecurity traffic anomalies reached 976,429,996 incidents in 2022. Additionally, the world is now facing the fact that the supply of Public IPv4 addresses available for allocation is diminishing. IPv4 uses 32-bit addressing, which provides only over 4 billion unique IP addresses. By conducting research using two methods, namely a server without a reverse proxy and a server with an applied reverse proxy, it was found that implementing NGINX with a reverse proxy can lead to savings in public IPv4 addresses. Regardless of the number of servers, only one public IPv4 address is needed, which reduces the number of IPs required and also prevents cyber-attacks on the server. Testing with DNSChecker and whatismyipaddress showed that after applying the reverse proxy with NGINX, the application server could not be identified or accessed by external parties. Only the reverse proxy server was accessible to outsiders. As the number of applications increases, which directly correlates with the need for public IPv4 addresses, the study's results show that applying a reverse proxy with NGINX in a data center can overcome the limitations of public IPv4 addresses. As the number of virtual machines and applications grows, a single public IPv4 address applied to the reverse proxy server suffices. Thus, implementing a reverse proxy with NGINX allows multiple servers to use just one public IPv4 address.
Downloads
References
Christinger Tomer (2017). Cloud Computing and virtual machines in LIS education: options and resources. Emerald Insight, Vol.33, No. 1, 2017
M. Agung Nugroho dan Cuk Subiyantoro (2018). Analisis Cluster Container pada Kubernetes dengan Infrastruktur Google Cloud Platform. JIPI, Vol 3, No. 2, 2018.
Nugroho MA. (2018) Analisis Cluster Container Pada Kubernetes Dengan Infrastruktur Google Cloud Platform. JIPI (Jurnal Ilm Penelit dan Pembelajaran Inform. 2018;
Carisimo E, Selmo C, Alvarez-Hamelin JI, Dhamdhere A. (2019). Studying the evolution of content providers in IPv4 and IPv6 internet cores. Comput Commun.;145:54–65.
Esteban Cairisimo (2019). Studying the evolution of content providers in IPv4 and IPv6 inernet cores. ScienceDirect. Computer Communication 145 (2019) 54-65.
Abd Al Ghaffar (2020). Government Cloud Computing and National Security, Emerald insight. Januari 2020.
DeJonghe D. Nginx cookbook. O’Reilly Media; 2020
Rizki Agung Muzaki (2020). Improving Security of Web-Based Application Using ModSecurity and Reverse Proxy in Web Application Firewall. IEEEE. Vol. 978-1-7281-9098-3/20.
Jusuf Qarkaxhija (2020). Using Cloud Computing as an Infrastructure Case Study- Kwun-Hung Li dan Kon-Yeung Wong(2021). Empirical Analysis of IPv4 and IPv6 Networks through Dual-Stack Sites. MDPI. Vol. 12. Microsoft Azure. TECHNIUM, Vol. 2, Issue 3 ff.93-100, 2020
Muzaki RA, Briliyant OC, Hasditama MA, Ritchi H. Improving security of web-based application using ModSecurity and reverse proxy in web application firewall. In: 2020 International Workshop on Big Data and Information Security (IWBIS). IEEE; 2020. p. 85–90
Zhongcheng Lei (2020). Cost-Effective Server-side Re-deployment for Web-based Online Laboratories Using NGINX Reverse Proxy. ScienceDirect. IFAC PapersOnLine 53-2 (2020) 17204–17209.
Qarkaxhija J. Using cloud computing as an infrastructure case study-microsoft azure. 2020
Borislac Dordevic (2021). VMware ESXi and Microsoft Hyper-V Hypervisor Performance Comparison. IEEE Xplore
Chen Ma dan Yuhong Chi (2022). Evaluation Test and Improvement of Load Balancing Algorithms of Nginx. IEEEAccess. Digital Object Identifier 10.1109/ACCESS.2022.3146422
Derek Dejonghe (2022). Nginx Cookbook, Advanced Recipes for High Performance Load Balancing. O’REILLY. Available on : https://www.nginx.com/resources/library/complete-nginx-cookbook/#download
Goparaju B, Rao BS. A DDoS Attack Detection using PCA Dimensionality Reduction and Support Vector Machine. Int J Commun Networks Inf Secur. 2022;14(1s):1–8.
Muhanad Rafli (2022). Pengujian Kinerja Load Balancing Web Server Menggunakan Nginx Riverse Proxy berbasis OS Centos 7. Jurnal Teknik Informatika dan Sistem Informasi. Vol. 9, No. 3, September 2022, Hal. 1824-1840.
Muhammad Garzali Qabasiyu (2022). Use of VMware Virtualization technology to Deploy Private Cloud Computing Infrastructure as A Service On Business Organizations. IJRCS. Vol. 06, Issue-01, Januari 2022.
Rafli M. Jurnal Pengujian Kinerja Load Balancing Web Server menggunakan Nginx Riverse Proxy Berbasis OS Centos 7. JATISI (Jurnal Tek Inform dan Sist Informasi). 2022;9(3):1824–40
Andrii Chyrvon (2023). The Main Methods of Load Balancing On The NGINX Web Server. Scientific Practice: Modern and Classical Research Methods
Chyrvon A, Lisovskyi K, Kyryndas N. the Main Methods of Load Balancing on the Nginx Web Server. Collect Sci Pap «ΛΌГOΣ». 2023;(May 26, 2023; Boston, USA):146–51.
Igor Sysoev, NGINX (2023). Penjelasan NGINX [Online]. Available at: https://nginx.org/en/ [Accessed 1 Oktober 2023]
Copyright (c) 2024 Journal of Systems Engineering and Information Technology (JOSEIT)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).