Developing Application in Anticipating DDoS Attacks on Server Computer Machines
DOI:
https://doi.org/10.30812/matrik.v20i2.410Keywords:
Firewall, Computer Server, Security threat, Network applications, Web hostingAbstract
The use of server computer machines in companies is primarily a web hosting server that is very easy to experience threats, especially external security threats such as attempts to infiltrate, hacking, viruses, and other malicious attacks. Having a secure server is indispensable for working online and especially if involved in business-related network transactions. The Server's realization to be safe from threats is to protect the server machine's security on the hardware and software side and pay attention to network security that goes to the server machine. Generally, firewall applications on router devices have configuration limitations in securing the network, namely non-integrated applications. In other words, it is necessary to manage the perfect firewall configuration to anticipate Distributed Daniel attacks of Service (DDoS) attacks. Therefore, this study aims to integrate existing firewall applications for router devices into an integrated program to secure the network. The methodology used is the Network Development Life Cycle (NDLC). The research results on this developed application program can overcome DDoS attacks without setting up a firewall on the router device and can automatically monitor DDoS attack activities from outside the Server. Securing servers from DDoS attacks without setting up a firewall on the router device and automating the monitoring of DDoS attack activity from outside the Server are the novelties of this study that have not been available in previous studies.
Downloads
References
[2] A. Lohachab and B. Karambir, “Critical Analysis of DDoS—An Emerging Security Threat over IoT Networks,†J. Commun. Inf. Networks, vol. 3, no. 3, pp. 57–78, 2018.
[3] S. Chakraborty, P. Kumar, and B. Sinha, “A study on ddos attacks, danger and its prevention,†Int. J. Res. Anal. Rev., vol. 6, no. 2, pp. 10–15, 2019.
[4] A. Colella and C. M. Colombini, “Amplification DDoS attacks: Emerging threats and defense strategies,†Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8708, pp. 298–310, 2014.
[5] K. Zeb, O. Baig, and M. K. Asif, “DDoS attacks and countermeasures in cyberspace,†2015 2nd World Symp. Web Appl. Networking, WSWAN 2015, 2015.
[6] J. Kaur Chahal, A. Bhandari, and S. Behal, “Distributed Denial of Service Attacks: A Threat or Challenge,†New Rev. Inf. Netw., vol. 24, no. 1, pp. 31–103, 2019.
[7] G. Booch, “Object Oriented Analysis & Design with Application,†Br. J. Hosp. Med. (Lond)., vol. 75, no. 4, pp. 237-Unknown, 2006.
[8] M. Siekkinen, G. Urvoy-Keller, E. W. Biersack, and D. Collange, “A root cause analysis toolkit for TCP,†Comput. Networks, vol. 52, no. 9, pp. 1846–1858, 2008.
[9] B. R. Mcree, “Security analysis with Wireshark,†ISSA J., no. November, pp. 39–43, 2006.
[10] J. Biskup, Security in Computing Systems Original source of these lecture notes Security in Computing Systems Security in Computing Systems, Fourth. Verlag Berlin Heidelberg: Springer, 2011.
[11] A. Rodriguez, J. Gatrell, J. Karas, and R. Peschke, TCP / IP Tutorial and Overview, Seventh Ed. NC: IBM Corporation, 2001.
[12] A. Uprit, “Network Security Using Linux/Unix Firewall,†Int. J. Res. Comput. Sci., vol. 2, no. 4, pp. 77–79, 2011.
[13] S. Suehring and R. Ziegler, Linux Firewalls, Third. Indiana: Novell Press, 2006.
[14] J. M. Kizza, Guide to Computer Network Security - Fourth Edition. 2017.
[15] L. Wang, Z. Wang, C. Yang, L. Zhang, and Q. Ye, “Linux kernels as complex networks: A novel method to study evolution,†IEEE Int. Conf. Softw. Maintenance, ICSM, pp. 41–50, 2009.
[16] J. E. Goldman and P. Rawles, Applied Data Communications: A Business-Oriented Approach, 4/E. John Wiley and Sons, Inc., 2011.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Robby Rizky, Zaenal Hakim, Sri Setiyowati, Susilawati susilawati, Ayu Mira Yunita, Development of the Multi-Channel Clustering Hierarchy Method for Increasing Performance in Wireless Sensor Network , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)
- Wilda Imama Sabilla, Mamluatul Hani'ah, Ariadi Retno Tri Hayati Ririd, Astrifidha Rahma Amalia, Proliferative Diabetic Retinopathy Detection Using ConvolutionalNeural Network with Enhanced Retinal Image , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 25 No. 1 (2025)
- Deni Marta, M. Angga Eka Putra, Guntoro Barovih, Analisis Perbandingan Performa Virtualisasi Server Sebagai Basis Layanan Infrastructure As A Service Pada Jaringan Cloud , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 1 (2019)
- Mochamad Wahyudi, Firmansyah Firmansyah, Analisis Performa Open Shortest Path First Load Balancing dengan Metode Cost Manipulation , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Helna Wardhana, I Made Yadi Dharma, Khairan Marzuki, Ibjan Syarif Hidayatullah, Implementation of Neural Machine Translation in Translating from Indonesian to Sasak Language , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Dekki Widiatmoko, Aripriharta Aripriharta, Kasiyanto Kasiyanto, Dodo Irmanto, Muchamad Wahyu Prasetyo, Power Efficiency using Bank Capacitor Regulator on Field Service Shoes with Fast Charge Method , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Aini Suri Talita, Aristiawan Wiguna, Implementasi Algoritma Long Short-Term Memory (LSTM) Untuk Mendeteksi Ujaran Kebencian (Hate Speech) Pada Kasus Pilpres 2019 , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 1 (2019)
- Viva Arifin, Velia Handayani, Luh Kesuma Wardhani, Hendra Bayu Suseno, Siti Ummi Masruroh, User Interface and Exprience Gamification-Based E-Learning with Design Science Research Methodology , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Khaerul Yasin, Ahmat Adil, Implementasi Google Maps API Pemetaan Jalur Evakuasi Bencana Alam di Kabupatem Lombok Utara , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 1 (2019)
- Aditya Dwi Putro, Arief Hermawan, Pengaruh Cahaya dan Kualitas Citra dalam Klasifikasi Kematangan Pisang Cavendish Berdasarkan Ciri Warna Menggunakan Artificial Neural Network , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 1 (2021)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Anthony Anggrawan, Analisis Deskriptif Hasil Belajar Pembelajaran Tatap Muka dan Pembelajaran Online Menurut Gaya Belajar Mahasiswa , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 18 No. 2 (2019)
- Lusiana Efrizoni, Sarjon Defit, Muhammad Tajuddin, Anthony Anggrawan, Komparasi Ekstraksi Fitur dalam Klasifikasi Teks Multilabel Menggunakan Algoritma Machine Learning , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Ahmat Adil, Bambang Krismono Triwijoyo, Sistem Informasi Geografis Pemetaan Jaringan Irigasi dan Embung di Lombok Tengah , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 2 (2021)
- Lalu Ganda Rady Putra, Anthony Anggrawan, Pengelompokan Penerima Bantuan Sosial Masyarakat dengan Metode K-Means , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 1 (2021)
- Anthony Anggrawan, Satuang Satuang, Mokhammad Nurkholis Abdillah, Sistem Pakar Diagnosis Penyakit Ayam Broiler Menggunakan Forward Chaining dan Certainty Factor , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 1 (2020)
- Anthony Anggrawan, Mayadi Mayadi, Christofer Satria, Menentukan Akurasi Tata Letak Barang dengan Menggunakan Algoritma Apriori dan Algoritma FP-Growth , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 1 (2021)
- Anthony Anggrawan, Mayadi Mayadi, Application of KNN Machine Learning and Fuzzy C-Means to Diagnose Diabetes , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Bambang Krismono Triwijoyo, Ahmat Adil, Anthony Anggrawan, Convolutional Neural Network With Batch Normalization for Classification of Emotional Expressions Based on Facial Images , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 1 (2021)
- Putu Tisna Putra, Anthony Anggrawan, Hairani Hairani, Comparison of Machine Learning Methods for Classifying User Satisfaction Opinions of the PeduliLindungi Application , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 3 (2023)
- Christofer Satria, Peter Wijaya Sugijanto, Anthony Anggrawan, I Nyoman Yoga Sumadewa, Aprilia Dwi Dayani, Rini Anggriani, Multi-Algorithm Approach to Enhancing Social Assistance Efficiency Through Accurate Poverty Classification , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 1 (2024)
.png)











