Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS)

Authors

  • Budi Jaya Universitas Putra Indonesia YPTK Padang
  • Y Yuhandri Universitas Putra Indonesia YPTK Padang
  • S Sumijan Universitas Putra Indonesia YPTK Padang

DOI:

https://doi.org/10.37034/jsisfotek.v2i4.32

Keywords:

Router Mikrotik, DoS, Live Forensics, Security, IP Address

Abstract

Denial of Service (DoS) attacks are one of the most common attacks on website, networks, routers and servers, including on router mikrotik. A DoS attack aims to render a network router unable to service requests from authorized users. The result will disrupt the operational activities of the organization and cause material and non-material losses. In this study, a simulation and analysis of DoS attacks using the Live Forensics method were carried out and the router security enhancement from rectangular software and hardware. From the research results obtained digital evidence of DoS attacks in the form of IP addresses and attacker activity logs. In addition, the increase in router security in terms of software by using Firewall Filter and Firewall Raw has proven effective in preventing attacks. While improving router security in terms of hardware by setting a reset button on the router and firewall devices is also very necessary so that the router can avoid physical attacks by irresponsible persons.

References

Dwiyatno, S., Sari, A. P., Irawan, A., & Safig, S. (2019). Pendeteksi Serangan Ddos (Distributed Denial of Service) Menggunakan Honeypot di PT. Torini Jaya Abadi. Jurnal Sistem Informasi dan Informatika (SIMIKA), 2(2), 64-80. DOI: https://doi.org/10.47080/simika.v2i2.606 .

Fadlil, A., Riadi, I., & Aji, S. (2017). Pengembangan Sistem Pengaman Jaringan Komputer Berdasarkan Analisis Forensik Jaringan. Jurnal Ilmu Teknik Elektro Komputer dan Informatika (JITEKI), 3(1), 11-19.

Zulkifli, M. A., Riadi, I., & Prayudi, Y. (2018). Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard. International Journal of Computer Applications, 180(35), 23-30. DOI: http://doi.org/10.5120/ijca2018916879 .

Yudhana, A., Riadi, I., & Ridho, F. (2018). DDoS Classification Using Neural Network and Naïve Bayes Methods for Network Forensics. International Journal of Advanced Computer Science and Applications (IJACSA), 9(11), 177-183. DOI: http://dx.doi.org/10.14569/IJACSA.2018.091125 .

Liang, X., & Znati, T. (2019). On The Performance Of Intelligent Techniques For Intensive And Stealthy DDos Detection. Computer Networks, 164. DOI: https://doi.org/10.1016/j.comnet.2019.106906 .

Hildayanti, N., & Riadi, I. (2019). Forensics Analysis of Router On Computer Networks Using Live Forensics Method. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 8(1), 74-81. DOI: http://dx.doi.org/10.17781/P002559 .

Supriyono, A. R., Sugiantoro, B., & Prayudi, Y. (2018). Live Forensics Acquisition File Sharing Samba Pada Mikrotik Routeros. Cyber Security dan Forensik Digital, 1(1), 7-13.

Firmansyah, F., Fadlil, A., & Umar, R. (2019). Analisis Forensik Metarouter pada Lalu Lintas Jaringan Klien. Edu Komputika Journal, 6(2), 54-59. DOI: http://dx.doi.org/10.15294/edukomputika.v6i2.35221 .

Al-Sharif, Z. A., Al-Saleh, M. I., Alawneh, L. M., Jararweh, Y. I., & Gupta, B. (2020). Live Forensics of Software Attacks on Cyber Physical Systems. Future Generation Computer Systems, 108, 1217-1229. DOI: http://dx.doi.org/10.1016/j.future.2018.07.028 .

Rai, S., Sharma, K., & Dhakal, D. (2018). A Survey on Detection and Mitigation of Distributed Denial-of-Service Attack in Named Data Networking. Advances in Communication, Cloud, and Big Data. DOI: https://doi.org/10.1007/978-981-10-8911-4_18 .

Supriyono, A. R., Sugiantoro, B., & Prayudi, Y. (2019). Eksplorasi Bukti Digital Pada Smart Router Menggunakan Metode Live Forensics. Jurnal Infotekmesin, 10(2), 38-45. DOI: https://doi.org/10.35970/infotekmesin.v10i2.48 .

Liu, G., Quan, W., Cheng, N., Zhang H., & Yu, S. (2019). Efficient DDoS Attacks Mitigation for Stateful Forwarding In Internet of Things. Journal of Network and Computer Applications, 130, 1-13. DOI: https://doi.org/10.1016/j.jnca.2019.01.006 .

Krishnan, S. S. N.. (2019). Denial of Service (DoS) Detection in Wireless Sensor Networks Applying Geometrically Varying Clusters. International Conference on Computer Networks and Communication Technologies, 15. DOI: https://doi.org/10.1007/978-981-10-8681-6_93 .

Singh, K., Dhindsa, K. S., & Nehra, D. (2020). T-CAD: A Threshold Based Collaborative DDoS Attack Detection In Multiple Autonomous Systems. Journal of Information Security and Applications, 51. DOI: https://doi.org/10.1016/j.jisa.2020.102457 .

Furfaro, A., Pace, P., & Parise, A. (2020). Facing Ddos Bandwidth Flooding Attacks. Simulation Modelling Practice and Theory, 98. DOI: https://doi.org/10.1016/j.simpat.2019.101984 .

Casey, E. (2009). Handbook of Digital Forensics and Investigation. 1st ed. London: Elsevier Inc. eBook.

Dimaio, V. J., & Dimaio, D. (2001). Forensics Pathology. 2nd ed. London: CRC Press.

Aprilianto, D., Fadila, T., & Muslim, M. A. (2017). Sistem Pencegahan UDP DNS Flood dengan Filter Firewall Pada Router Mikrotik. Techno.COM, 16(2), 114-119. DOI: https://doi.org/10.33633/tc.v16i2.1291

Downloads

Published

02-09-2021

How to Cite

Jaya, B. ., Yuhandri, Y., & Sumijan, S. (2021). Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS). Jurnal Sistim Informasi Dan Teknologi, 2(4), 115–123. https://doi.org/10.37034/jsisfotek.v2i4.32

Issue

Section

Articles

Most read articles by the same author(s)

1 2 3 4 5 > >>