Operating System Selection For Information System Practicum: A Comparative Study Of Rocky Linux, Fedora, And Kali Linux Using The Technique For Order Of Preference By Similarity To Ideal Solution
Abstract
The research compares three Linux distributions; Kali Linux, Fedora and Rocky Linux to determine which Linux Operating Systems are best tailored to support practicum activities in Information Systems Department in Faculty of Industrial Engineering Telkom University. Given the rise in importance of Linux in today’s learning institutions due to its open source nature, configurability, and stability, choosing the right operating system to run laboratories on is important. The evaluation approach applies the TOPSIS method of multi-criteria decision analysis using the direct rating method to assign weights to the criteria. The evaluation is done across four areas: tool compatibility, systems defaults, user experience and performance & stability. Simulated practicum were done within five laboratory modules to evaluate each OS in the context of realistic practices. These results indicate that Rocky Linux as the first OS is highest in readiness, compatibility and reliability, with Fedora and Kali Linux following closely behind. These results can be used by educational institutions to better design system environments to support engineering education and good/secure/sustainable learning environments.
Keywords—Operating System, Practicum, TOPSIS, Direct Rating, Practicum, Rocky Linux, Fedora, Kali Linux, Information System
References
M. F. Kamaruzaman, R. Hamid, S. A. Mutalib, and M. S. Rasul, "Conceptual framework for the development of 4IR skills for engineering graduates," Global Journal of Engineering Education, vol. 21, no. 1, pp. 54–61, 2019.
M. S. Borkar and A. Singh, "Virtualization Technology in Education for Industry 4.0," International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 3S, pp. 103–107, 2019.
V. Mishra, S. Aleem, and S. Ahmad, "A Survey of Linux Operating System as an Alternative to Other Operating Systems," International Journal of Scientific Research in Network Security and Communication, vol. 11, no. 6, pp. 9–14, 2023.
G. Ge, P. Tian, M. Yang, and Z. Yang, "Linux Programming Curriculum Reform in the Era of Open Source Hardware and Software," Frontiers in Educational Research, vol. 7, no. 8, pp. 8–15, 2024.
K. Hitchcock, Linux System Administration for the 2020s. Apress, Springer, 2022..
I. A. Sedelnikov and D. S. Koltygin, "Web application developing methodology for managing robotic complexes," Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, no. 1, pp. 56–63, 2024.
S. K. Singh, Linux Yourself: Concept and Programming. 1st ed., CRC Press, 2021. [Online]. Available: https://doi.org/10.1201/9780429446047
P. Wu, "Blended Teaching Practice of Linux C Programming for the Cultivation of Practice and Innovation Ability of New Engineering," in Advances in Education, Humanities and Social Science Research, vol. 5, ICEACE, pp. 510–514, 2023.
V. K. Uppala, "The Impact of AI on Architecting Cloud Data Platforms: Enhancing Data Processing and Integration," Journal of Artificial Intelligence, Machine Learning & Data Science, vol. 1, no. 1, pp. 1289–1292, 2022.
D. O. Ihenacho, D. B. Sholademi, V. A. Kehinde, and B. T. Tayor, "Integrating Cybersecurity Intelligence with Data Analytics for Real-Time Decision-Making in Management Information Systems," 2024 IEEE International Conference on MIS Applications, 2024.
E. Aslam and N. Ahmad, "IAM and SOX Compliance in Modern Cybersecurity: How AI and Data Pipelines Shape Advanced Network Security Strategies," Cybersecurity Review, vol. 12, no. 2, pp. 88–96, 2024..
V. Silchenko, "Application Areas of Artificial Intelligence and Customer Service Automation Tools in Restaurant Enterprises," Science and Technology Today, no. 11(39), 2024.
R. Stelz, "Software-Separation on Embedded Hardware – Implementing a Lightweight Hypervisor," FMS-Berichte, vol. 37, pp. 1–7, 2024.
Y. Zhao, S. Li, W. Xue, Y. Zhao, and Y. Wen, "CarePlus: A General Framework for Hardware Performance Counter-Based Malware Detection under System Resource Competition," Computers & Security, vol. 143, 103884, 2024.
A. Rashid and A. Chaturvedi, "Virtualization and Its Role in Cloud Computing Environment," International Journal of Computer Science and Engineering, vol. 7, no. 4, pp. 1131–1136, 2019.
H. Tabrizchi and M. K. Rafsanjani, "A Survey on Security Challenges in Cloud Computing: Issues, Threats, and Solutions," Journal of Supercomputing, vol. 76, no. 12, pp. 9493–9532, 2020.
G. J. Blinowski and P. Piotrowski, "CVE-Based Classification of Vulnerable IoT Systems," in Theory and Applications of Dependable Computer Systems (DepCoS-RELCOMEX), Springer, vol. 15, pp. 82–93, 2020.
J. Guo, H. Liang, and J. Long, "Leveraging File System Characteristics for Ransomware Mitigation in Linux Operating System Environments," IEEE Transactions on Dependable and Secure Computing, 2024.
E. M. Apokin and V. A. Khandozhko, "Software Implementation of a Hierarchical Approach to Solving the Inverse Problem of Kinematics of a Robot Manipulator," Southwest State University Journal, vol. 72, 2024.
M. Feng, J. Zhou, and Y. Tang, "Enhancing Cloud-Native Security Through eBPF Technology," in 2024 IEEE 11th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 165–168, 2024.
R. Lachance and M. Mosser, "Fedora and Upstream Software in Higher Education: A Pedagogical Analysis," Open Source Education Journal, vol. 2, no. 1, pp. 33–41, 2024.
R. Fox, Linux with Operating System Concepts, 2nd ed. CRC Press, 2021. [Online]. Available: https://doi.org/10.1201/9781003203322
H. Borges, J. A. Pereira, D. Khelladi, and M. Acher, “Linux Kernel Configurations at Scale: A Dataset for Performance and Evolution Analysis,” arXiv preprint arXiv:2505.07487, 2025.



