Security System Analysis against Flood Attacks Using TCP, UDP, and ICMP Protocols on Mikrotik Routers

Authors

  • Warid Yunus Teknik Informatika, Universitas Ichsan Gorontalo, Gorontalo, Indonesia
  • Mohamad Efendi Lasulika Teknik Informatika, Universitas Ichsan Gorontalo, Gorontalo, Indonesia

DOI:

https://doi.org/10.25008/ijadis.v3i1.1231

Keywords:

Mikrotik, Flooding, DDOS TCP, UDP, ICMP, Firewall, Security System Analysis

Abstract

Advances in information technology today require all existing computer networks to be able to show that the security system model continues to be considered very important for users who want security both from inside and outside the network. An attack on a network server can occur at any time, as for an attack that can cause a dangerous effect on a router, namely DDOS / flood by flooding the router with very many data packets so that the router can be paralyzed in terms of handling the network system. In this study, descriptive research was applied to obtain data directly by conducting flooding techniques and analyzing and designing flooding prevention techniques with filtering techniques. The application of filtering on the firewall on MikroTik can minimize attacks and prevention directly by dropping flooding packets automatically so that MikroTik performance remains stable

Downloads

Download data is not yet available.

References

D. Aprilianto, T. F. (2017). Sistem Pencegahan UDP DNS Flood dengan Filter Firewall pada Router Mikrotik. Techno Com, 114-119. https://doi.org/10.33633/tc.v16i2.1291

Dewi G. K, M. P. (2016). Analisa Kemanan Jaringan . Universitas Muhamadiyah Surakarta, 16.

I.G. Komang, O. M. (2015). Kemanan Jaringan Dengan Firewall Filter Berbasis Mikrotik Pada Laboratorium Komputer STIKOM Bali. Stmik Stikom, 9-10.

I. P. A. E. . Pratama, "TCP SYN Flood (DoS) Attack Prevention Using SPI Method on CSF: A PoC", Bulletin of Comp. Sci. Electr. Eng., vol. 1, no. 2, pp. 63-72, Aug. 2020. https://doi.org/10.25008/bcsee.v1i2.7

S., H. (2018). Analisis dan Optimalisasi Keamanan Jaringan Menggunakan Protokol Ipsec. J. Inform, 93-104.

Saputra, Y. M. (2017). Analisa Performasi Protokol TCP, UDP dan SCTP. Media Infotama, 73-84.

Kurniawan and S. Kosasi, "Penerapan Network Development Life Cycle Dalam Perancangan Intranet," Penerapan Netw. Dev. Life Cycle Dalam Peranc. Intranet Untuk Mendukung Proses Pembelajaran, vol. 5, no. 2, pp. 178-188, 2015.

L. Menggunakan and S. Kerja, "Perancangan dan implementasi monitoring jaringan lokal menggunakan sistem kerja," 2011.

N. E. I. N. U. Tara, "PENGEMBANGAN SISTEM KEAMANAN JARINGAN KOMPUTER BERBASIS MIKROTIK PADA SMK NEGERI 1 INDRALAYA UTARA COMPUTER NETWORK SECURITY SYSTEM DEVELOPMENT BASED ON MIKROTIK AT SMK Imam Solikin , 2 Suryayusra , 3 Maria Ulfa Pendahuluan Perkembangan Jaringan in," pp. 61-70

Downloads

Published

2022-04-30

How to Cite

Security System Analysis against Flood Attacks Using TCP, UDP, and ICMP Protocols on Mikrotik Routers (W. Yunus & M. E. Lasulika, Trans.). (2022). International Journal of Advances in Data and Information Systems, 3(1), 11-19. https://doi.org/10.25008/ijadis.v3i1.1231

Share