Developing Application in Anticipating DDoS Attacks on Server Computer Machines
DOI:
https://doi.org/10.30812/matrik.v20i2.410Keywords:
Firewall, Computer Server, Security threat, Network applications, Web hostingAbstract
The use of server computer machines in companies is primarily a web hosting server that is very easy to experience threats, especially external security threats such as attempts to infiltrate, hacking, viruses, and other malicious attacks. Having a secure server is indispensable for working online and especially if involved in business-related network transactions. The Server's realization to be safe from threats is to protect the server machine's security on the hardware and software side and pay attention to network security that goes to the server machine. Generally, firewall applications on router devices have configuration limitations in securing the network, namely non-integrated applications. In other words, it is necessary to manage the perfect firewall configuration to anticipate Distributed Daniel attacks of Service (DDoS) attacks. Therefore, this study aims to integrate existing firewall applications for router devices into an integrated program to secure the network. The methodology used is the Network Development Life Cycle (NDLC). The research results on this developed application program can overcome DDoS attacks without setting up a firewall on the router device and can automatically monitor DDoS attack activities from outside the Server. Securing servers from DDoS attacks without setting up a firewall on the router device and automating the monitoring of DDoS attack activity from outside the Server are the novelties of this study that have not been available in previous studies.
Downloads
References
[2] A. Lohachab and B. Karambir, “Critical Analysis of DDoS—An Emerging Security Threat over IoT Networks,†J. Commun. Inf. Networks, vol. 3, no. 3, pp. 57–78, 2018.
[3] S. Chakraborty, P. Kumar, and B. Sinha, “A study on ddos attacks, danger and its prevention,†Int. J. Res. Anal. Rev., vol. 6, no. 2, pp. 10–15, 2019.
[4] A. Colella and C. M. Colombini, “Amplification DDoS attacks: Emerging threats and defense strategies,†Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8708, pp. 298–310, 2014.
[5] K. Zeb, O. Baig, and M. K. Asif, “DDoS attacks and countermeasures in cyberspace,†2015 2nd World Symp. Web Appl. Networking, WSWAN 2015, 2015.
[6] J. Kaur Chahal, A. Bhandari, and S. Behal, “Distributed Denial of Service Attacks: A Threat or Challenge,†New Rev. Inf. Netw., vol. 24, no. 1, pp. 31–103, 2019.
[7] G. Booch, “Object Oriented Analysis & Design with Application,†Br. J. Hosp. Med. (Lond)., vol. 75, no. 4, pp. 237-Unknown, 2006.
[8] M. Siekkinen, G. Urvoy-Keller, E. W. Biersack, and D. Collange, “A root cause analysis toolkit for TCP,†Comput. Networks, vol. 52, no. 9, pp. 1846–1858, 2008.
[9] B. R. Mcree, “Security analysis with Wireshark,†ISSA J., no. November, pp. 39–43, 2006.
[10] J. Biskup, Security in Computing Systems Original source of these lecture notes Security in Computing Systems Security in Computing Systems, Fourth. Verlag Berlin Heidelberg: Springer, 2011.
[11] A. Rodriguez, J. Gatrell, J. Karas, and R. Peschke, TCP / IP Tutorial and Overview, Seventh Ed. NC: IBM Corporation, 2001.
[12] A. Uprit, “Network Security Using Linux/Unix Firewall,†Int. J. Res. Comput. Sci., vol. 2, no. 4, pp. 77–79, 2011.
[13] S. Suehring and R. Ziegler, Linux Firewalls, Third. Indiana: Novell Press, 2006.
[14] J. M. Kizza, Guide to Computer Network Security - Fourth Edition. 2017.
[15] L. Wang, Z. Wang, C. Yang, L. Zhang, and Q. Ye, “Linux kernels as complex networks: A novel method to study evolution,†IEEE Int. Conf. Softw. Maintenance, ICSM, pp. 41–50, 2009.
[16] J. E. Goldman and P. Rawles, Applied Data Communications: A Business-Oriented Approach, 4/E. John Wiley and Sons, Inc., 2011.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Imam Riadi, Abdul Fadlil, Muhammad Amirul Mu'min, OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- sri suharti, Anton Yudhana, Imam Riadi, Forensik Jaringan DDoS menggunakan Metode ADDIE dan HIDS pada Sistem Operasi Proprietary , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Elly Mufida, David Wardana Agus Rahayu, Pengembangan Sistem VOIP Menggunakan Server Issabel Versi 4.0 dan Tunnel EOIP pada OMNI Hospital Alam Sutera , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 1 (2018)
- Zein Zein, Ahmat Adil, APLIKASI MEDIA BANTU PEMBELAJARAN KRIPTOGRAFI DENGAN MENGGUNAKAN ALGORITMA MESSAGE DIGEST 5 (MD5) , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Wahyu Riski Aulia Putra, Agus Reza Aristiadi Nurwa, Dimas Febriyan Priambodo, Muhammad Hasbi, Infrastructure as Code for Security Automation and Network Infrastructure Monitoring , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Jelita Asian, Dimas Erlangga, Media Ayu, Data Exfiltration Anomaly Detection on Enterprise Networks using Deep Packet Inspection , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Bambang Krismono Triwijoyo, Model Fast Tansfer Learning pada Jaringan Syaraf Tiruan Konvolusional untuk Klasifikasi Gender Berdasarkan Citra Wajah , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 2 (2019)
- Herman Kabetta, Hermawan Setiawan, Fetty Amelia, Muhammad Qolby Fawzan, Seamless Security on Mobile Devices Textual Password Quantification Model Based Usability Evaluation of Secure Rotary Entry Pad Authentication , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- I Putu Hariyadi, Akbar Juliansyah, Analisa Penerapan Private Cloud Computing Berbasis Proxmox Virtual Environment Sebagai Media Pembelajaran Praktikum Manajemen Jaringan , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 1 (2018)
- I Putu Hariyadi, Khairan Marzuki, Implementation of Configuration Management Virtual Private Server Using Ansible , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 2 (2020)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Khasnur Hidjah, Helna Wardhana, Heroe Santoso, Anthony Anggrawan, SISTEM INFORMASI PEMANTAUAN STATUS GIZI BALITA , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Anthony Anggrawan, Dwi Kurnianingsih, Christofer Satria, Sistem Aplikasi Cerdas Klasterisasi Penerima Bantuan Covid-19 , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
- Anthony Anggrawan, Azhari Azhari, APLIKASI DETEKSI KEMIRIPAN TUGAS PAPER , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Bambang Krismono Triwijoyo, SEGMENTASI CITRA PEMBULUH DARAH RETINA MENGGUNAKAN METODE DETEKSI GARIS MULTI SKALA , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 1 (2015)
- Anthony Anggrawan, Christofer Satria, Tinjauan Kritis Jurnal Ilmiah: Pengembangan dan Evaluasi Formatif Studi Kasus Multimedia untuk Siswa Desain dan Teknologi Pembelajaran , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 1 (2018)
- Raisul Azhar, ANALISA PERBANDINGAN PENERAPAN PBR DAN NON PBR PADA PROTOCOL OSPF UNTUK KONEKSI INTERNET , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 1 (2015)
- Sadam Husen, Raisul Azhar, APLIKASI MANAJEMEN DAN MONITORING UNTUK KEAMANAN PADA JARINGAN HOTSPOT , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Raisul Azhar, Kurniawan Kurniawan, APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA RIJNDAEL , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)
- Christofer Satria, Anthony Anggrawan, Tinjauan Kritis Jurnal Ilmiah: “The Influence of Transformational Leadership and Organizational Culture on Learning Organization: a Comparative Analysis of The it Sector†, MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 1 (2018)