Teori Graf Diskrit untuk Deteksi Intrusi dan Optimasi Firewall: Systematic Literature Review

Authors

  • Andhika Adnan Universitas Widya Dharma Pontianak
  • Fransiskus Mario Hartono Tjiptabudi STIKOM Uyelindo Kupang
  • Ricky Imanuel Ndaumanu Universitas Widya Dharma Pontianak
  • Yohanis Malelak STIKOM Uyelindo Kupang

DOI:

https://doi.org/10.36596/jitu.v10i1.2306

Keywords:

Systematic Literature Review, Discrete Mathematical Graph Theory, Intrusion Detection, Firewall Optimization, Network Security

Abstract

The escalating complexity of computer networks and cybersecurity threats demand analytical approaches capable of systematically and measurably representing network structure. Discrete mathematical graph theory offers a formal framework for modeling network topology as nodes and edges, thus potentially supporting more effective intrusion detection and firewall placement optimization. This research aims to conduct a Systematic Literature Review of publications from 2022–2026 to identify graph theory applications in intrusion detection, evaluate the most effective graph-based firewall optimization methods, and map research gaps and future development trends. The methodology employed follows the SLR protocol with stages of systematic search across reputable databases, selection based on inclusion-exclusion criteria, and analysis through descriptive-comparative meta-analysis, thematic meta-synthesis, and content analysis. Results show the dominance of weighted graphs and structure-based learning approaches for network anomaly detection, as well as firewall optimization modeling through integer linear programming and graph heuristics. This research contributes to presenting an integrated synthesis between intrusion detection and firewall optimization within discrete graph framework, and provides conceptual foundation for developing adaptive network security models based on mathematical structure.

Author Biographies

Fransiskus Mario Hartono Tjiptabudi, STIKOM Uyelindo Kupang

Lecture of Information System Department.

Ricky Imanuel Ndaumanu, Universitas Widya Dharma Pontianak

Lecture of Informatic Department

Yohanis Malelak, STIKOM Uyelindo Kupang

Lecture of Informatic Engineering Department.

References

A. Alshamrani, S. Myneni, A. Chowdhary, and D. Huang, “A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1851–1877, 2022, doi: 10.1109/COMST.2019.2891891.

F. M. H. Tjiptabudi and R. Bernardino, “Information System Security of Indonesia Terrestrial Border Control,” CommIT Journal, vol. 13, no. 2, 2019, doi: 10.21512/commit.v13i2.5529.

R. C. Wang and R. P. Avrianto, “Improving Detection Accuracy of Network Intrusions Using a Hybrid Network Intrusion Detection System Based on Isolation Forest and Random Forest Algorithms,” Jurnal Teknik Informatika (Jutif), vol. 6, no. 6, pp. 5371–5385, Dec. 2025, doi: 10.52436/1.jutif.2025.6.6.4694.

F. M. H. Tjiptabudi and R. I. Ndaumanu, “Evaluasi Celah Keamanan Website Dana Pensiun X Melalui Penetration Testing Berdasarkan ISSAF Framework,” Jurnal Algoritma, vol. 21, no. 2, pp. 9–17, Nov. 2024, doi: 10.33364/algoritma/v.21-2.1644.

X. Li and H. Xiao, “Uncovering customers’ perceptions of data breach: a case of information leakage in a tourism enterprise,” Current Issues in Tourism, pp. 1–14, Jul. 2025, doi: 10.1080/13683500.2025.2533521.

S. Saeed, S. A. Altamimi, N. A. Alkayyal, E. Alshehri, and D. A. Alabbad, “Digital Transformation and Cybersecurity Challenges for Businesses Resilience: Issues and Recommendations,” Sensors, vol. 23, no. 15, p. 6666, Jul. 2023, doi: 10.3390/s23156666.

R. P. Sari, “Ancaman Digital 2025: 133,4 Juta Serangan Siber Terjadi di RI,” CyberHub, Sep. 06, 2025.

Imanuel Toding Bua and Nur Isdah Idris, “Analisis Kebijakan Keamanan Siber di Indonesia: Studi Kasus Kebocoran Data Nasional pada Tahun 2024,” Desentralisasi?: Jurnal Hukum, Kebijakan Publik, dan Pemerintahan, vol. 2, no. 2, pp. 100–114, May 2025, doi: 10.62383/desentralisasi.v2i2.653.

P. Appiahene et al., “Network intrusion detection using a hybrid graph-based convolutional network and transformer architecture,” PLoS One, vol. 21, no. 1, p. e0340997, Jan. 2026, doi: 10.1371/journal.pone.0340997.

A. Maulana, S. Anam, and H. Aziz Bukhori, “Improving Lateral-Movement Intrusion Detection in Virtualized Networks using SHAP Feature Selection, SMOTE, and a Voting Ensemble Classifier,” Jurnal Teknik Informatika (Jutif), vol. 6, no. 4, Aug. 2025, doi: 10.52436/1.jutif.2025.6.4.5233.

B. Qu, S. Zheng, J. Zeng, and L. Tian, “Design of Network Anomaly Detection Model Based on Graph Representation Learning,” Symmetry (Basel)., vol. 17, no. 11, p. 1976, Nov. 2025, doi: 10.3390/sym17111976.

D. Grinberg, “An introduction to graph theory,” Jun. 2025.

S. Garg and B. Devi, “Shortest Path Finding using Modified Dijkstra’s algorithm with Adaptive Penalty Function,” in 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, Jul. 2023, pp. 1–9. doi: 10.1109/ICCCNT56998.2023.10308130.

D. T. Lan and S. Yoon, “Trajectory Clustering-Based Anomaly Detection in Indoor Human Movement,” Sensors, vol. 23, no. 6, p. 3318, Mar. 2023, doi: 10.3390/s23063318.

T. Zhu, J. Liu, C. Song, X. Miao, and S. Zhu, “A Novel Centrality-Based Attack Simulation: Evaluating Resilience and Vulnerability in China’s Knowledge Networks,” Systems, vol. 13, no. 5, p. 350, May 2025, doi: 10.3390/systems13050350.

B. M. Napoleao, F. Petrillo, S. Halle, and M. Kalinowski, “Towards Continuous Systematic Literature Review in Software Engineering,” in 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), IEEE, Aug. 2022, pp. 467–474. doi: 10.1109/SEAA56994.2022.00078.

M. J. Page et al., “The PRISMA 2020 statement: an updated guideline for reporting systematic reviews,” BMJ, p. n71, Mar. 2022, doi: 10.1136/bmj.n71.

H. Snyder, “Designing the literature review for a strong contribution,” J. Decis. Syst., vol. 33, no. 4, pp. 551–558, Oct. 2024, doi: 10.1080/12460125.2023.2197704.

A. Naghib, F. S. Gharehchopogh, and A. Zamanifar, “A comprehensive and systematic literature review on intrusion detection systems in the internet of medical things: current status, challenges, and opportunities,” Artif. Intell. Rev., vol. 58, no. 4, p. 114, Jan. 2025, doi: 10.1007/s10462-024-11101-w.

C. Wohlin, M. Kalinowski, K. Romero Felizardo, and E. Mendes, “Successful combination of database search and snowballing for identification of primary studies in systematic literature studies,” Inf. Softw. Technol., vol. 147, p. 106908, Jul. 2022, doi: 10.1016/j.infsof.2022.106908.

N. Bin Ali and J. Börstler, “On the Relevance of Paper-Type Information in Systematic Mapping Studies in Software Engineering,” in 2025 IEEE/ACM International Workshop on Methodological Issues with Empirical Studies in Software Engineering (WSESE), IEEE, May 2025, pp. 44–47. doi: 10.1109/WSESE66602.2025.00014.

B. Tedja, M. Al Musadieq, A. Kusumawati, and E. Yulianto, “Systematic literature review using PRISMA: exploring the influence of service quality and perceived value on satisfaction and intention to continue relationship,” Future Business Journal, vol. 10, no. 1, p. 39, Dec. 2024, doi: 10.1186/s43093-024-00326-4.

L. Bukauskas, A. Brilingait?, A. Juozapavi?ius, D. Lepait?, K. Ikamas, and R. Andrijauskait?, “A systematic literature review of cybersecurity scales assessing information security awareness,” Heliyon, vol. 9, no. 3, p. e14234, Mar. 2023, doi: 10.1016/j.heliyon.2023.e12808.

C. Hansen, H. Steinmetz, and J. Block, “How to conduct a meta-analysis in eight steps: a practical guide,” Management Review Quarterly, vol. 72, no. 1, pp. 1–19, Feb. 2023, doi: 10.1007/s11301-021-00247-4.

M. Nicmanis, “Reflexive Content Analysis: An Approach to Qualitative Data Analysis, Reduction, and Description,” Int. J. Qual. Methods, vol. 23, Jan. 2024, doi: 10.1177/16094069241236603.

W. Villegas-Ch, J. Govea, A. Maldonado Navarro, and P. Palacios Játiva, “Intrusion Detection in IoT Networks Using Dynamic Graph Modeling and Graph-Based Neural Networks,” IEEE Access, vol. 13, pp. 65356–65375, 2025, doi: 10.1109/ACCESS.2025.3559325.

D. Herranz-Oliveros, M. Tejedor-Romero, J. M. Gimenez-Guzman, and L. Cruz-Piris, “Unsupervised Learning for Lateral-Movement-Based Threat Mitigation in Active Directory Attack Graphs,” Electronics (Basel)., vol. 13, no. 19, p. 3944, Oct. 2024, doi: 10.3390/electronics13193944.

B. Xie, X. Xu, and G. Wen, “Network Intrusion Detection Optimization based on Graph Neural Networks and Variational Autoencoders,” in 2024 6th International Conference on Frontier Technologies of Information and Computer (ICFTIC), IEEE, Dec. 2024, pp. 127–134. doi: 10.1109/ICFTIC64248.2024.10912964.

F. Al Tfaily, Z. Ghalmane, M. E. A. Brahmia, H. Hazimeh, A. Jaber, and M. Zghal, “Graph-based federated learning approach for intrusion detection in IoT networks.,” Sci. Rep., vol. 15, no. 1, p. 41264, Nov. 2025, doi: 10.1038/s41598-025-25175-1.

L. A. Gallego Pareja, J. M. López-Lezama, and O. Gómez Carmona, “A Mixed-Integer Linear Programming Model for the Simultaneous Optimal Distribution Network Reconfiguration and Optimal Placement of Distributed Generation,” Energies (Basel)., vol. 15, no. 9, p. 3063, Apr. 2023, doi: 10.3390/en15093063.

Z. Nurlan et al., “Incident-aware smart prioritization framework for penetration testing and prevention of URL-based cybersecurity attacks in industry 4.0 IoT networks,” Sci. Rep., vol. 15, no. 1, p. 37792, Oct. 2025, doi: 10.1038/s41598-025-21409-4.

F. Han, H. Fu, B. Wang, Y. Xu, and B. Lv, “GP4ESP: a hybrid genetic algorithm and particle swarm optimization algorithm for edge server placement,” PeerJ Comput. Sci., vol. 10, p. e2439, Oct. 2024, doi: 10.7717/peerj-cs.2439.

K. Nitrat, N. Suetrong, and N. Promsuk, “Zero-Day Attack Detection in IoT Networks Using a Residual Vision Transformer-Based Approach With Zero-Shot Learning,” IEEE Open Journal of the Communications Society, vol. 6, pp. 7405–7423, 2025, doi: 10.1109/OJCOMS.2025.3604826.

M. N.-E. Saulaiman, M. Kozlovszky, and A. Csilling, “Graph-Based Automation of Threat Analysis and Risk Assessment for Automotive Security,” Information, vol. 16, no. 6, p. 449, May 2025, doi: 10.3390/info16060449.

G. Gori, L. Rinieri, A. Al Sadi, A. Melis, F. Callegati, and M. Prandini, “GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs,” Future Internet, vol. 15, no. 11, p. 368, Nov. 2023, doi: 10.3390/fi15110368.

A. Ahmad, A. Kovalenko, and I. Makarov, “Anomaly Detection Using Graph-Based Autoencoder with Graph Structure Learning Layer,” in 2024 IEEE 6th International Symposium on Logistics and Industrial Informatics (LINDI), IEEE, Oct. 2024, pp. 89–94. doi: 10.1109/LINDI63813.2024.10820392.

S. Rajasoundaran, S. A. Sivakumar, S. Devaraju, M. J. Pasha, and J. Lloret, “A deep experimental analysis of energy?proficient firewall policies and security practices for resource limited wireless networks,” SECURITY AND PRIVACY, vol. 7, no. 6, Nov. 2024, doi: 10.1002/spy2.450.

V. Govindarajan and J. H. Muzamal, “Advanced cloud intrusion detection framework using graph based features transformers and contrastive learning,” Sci. Rep., vol. 15, no. 1, p. 20511, Jul. 2025, doi: 10.1038/s41598-025-07956-w.

A. V. Jha, B. Appasani, N. Bizon, and P. Thounthong, “A Graph-Theoretic Approach for Modelling and Resiliency Analysis of Synchrophasor Communication Networks,” Applied System Innovation, vol. 6, no. 1, p. 7, Jan. 2023, doi: 10.3390/asi6010007.

N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A Deep Learning Approach to Network Intrusion Detection,” IEEE Trans. Emerg. Top. Comput. Intell., vol. 2, no. 1, pp. 41–50, Feb. 2020, doi: 10.1109/TETCI.2017.2772792.

A. S. Ahanger, S. M. Khan, F. Masoodi, and A. O. Salau, “Advanced intrusion detection in internet of things using graph attention networks,” Sci. Rep., vol. 15, no. 1, p. 9831, Mar. 2025, doi: 10.1038/s41598-025-94624-8.

A. Lima, “Graph-Based Intrusion Detection for Edge-Cloud IoT Energy Systems,” Premier Journal of Computer Science, Jan. 2026, doi: 10.70389/PJCS.100013.

W. Jiang et al., “Graph Neural Networks for Routing Optimization: Challenges and Opportunities,” Sustainability, vol. 16, no. 21, p. 9239, Oct. 2024, doi: 10.3390/su16219239.

C. Guerrero, I. Lera, and C. Juiz, “Genetic-based optimization in fog computing: Current trends and research opportunities,” Swarm Evol. Comput., vol. 72, no. 2, p. 101094, Jul. 2023, doi: 10.1016/j.swevo.2022.101094.

L. Belcastro, C. Carlucci, C. Cosentino, P. Liò, and F. Marozzo, “Enhancing network security using knowledge graphs and large language models for explainable threat detection,” Future Generation Computer Systems, vol. 176, no. 1, p. 108160, Mar. 2026, doi: 10.1016/j.future.2025.108160.

M. Jaber, N. Boutry, and P. Parrend, “Graph-Based Spectral Analysis for Detecting Cyber Attacks,” in Proceedings of the 19th International Conference on Availability, Reliability and Security, New York, NY, USA: ACM, Jul. 2024, pp. 1–14. doi: 10.1145/3664476.3664498.

T. P. Doremure Gamage, J. A. Gutierrez, and S. K. Ray, “The Role of Graph Neural Networks, Transformers, and Reinforcement Learning in Network Threat Detection: A Systematic Literature Review,” Electronics (Basel)., vol. 14, no. 21, p. 4163, Oct. 2025, doi: 10.3390/electronics14214163.

Downloads

Published

2026-05-13

How to Cite

Adnan, A., Tjiptabudi, F. M. H., Ndaumanu, R. I., & Malelak, Y. (2026). Teori Graf Diskrit untuk Deteksi Intrusi dan Optimasi Firewall: Systematic Literature Review. JITU : Journal Informatic Technology And Communication, 10(1), 11–21. https://doi.org/10.36596/jitu.v10i1.2306

Issue

Section

Articles