Network Performance Analysis and DoS Attack Mitigation Strategy on MikroTik Router for Optimal Stability
Main Article Content
Abstract
Article Details
References
Amalia, E. R., Nurheki, Saputra, R., Ramadhana, C., & Yossy, E. H. (2022). Computer network design and implementation using load balancing technique with per connection classifier (PCC) method based on MikroTik router. Procedia Computer Science, 216, 103–111. doi:10.1016/j.procs.2022.12.116
Bahri, S. (2024). Mengamankan Perangkat Jaringan dari Serangan DDoS Menggunakan Fitur Firewall-RAW di Router MikroTik, 06(01), 1–6. Retrieved from https://ejournal.ust.ac.id/index.php/KAKIFIKOM/article/view/3589
Elsadig, M. A. (2023). Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach. IEEE Access, 11(August), 83537–83552. doi:10.1109/ACCESS.2023.3303113
Fakhmi, M, & Gultom, L. M. (2021). Peningkatan Keamanan Router Mikrotik Terhadap Serangan Syn Flood dengan Menggunakan Firewall Raw. Seminar Nasional Industri dan Teknologi (SNIT), 260–277.
Hafizh, M. N., Riadi, I., & Fadlil, A. (2020). Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic. Jurnal Telekomunikasi dan Komputer, 10(2), 111. doi:10.22441/incomtech.v10i2.8757
Jaya, B., Yuhandri, Y., & Sumijan, S. (2020). Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS). Jurnal Sistim Informasi dan Teknologi, 2, 115–123. doi:10.37034/jsisfotek.v2i4.32
Kushaeiri, F. A., Muhyidin, Y., Singasatia, D., Teknik, F., Tinggi, S., Wastukancana, T., & Barat, J. (2024). Implementasi pencegahan serangan ddos pada router, 2, 229–244.
Lutfi, S., Khairan, A., Muin, Y., & Salmin, M. (2022). Optimal Filter Assignment Policy Against Distributed Denial of Service Attack on Router Mikrotik. MATEC Web of Conferences, 372, 04008. doi:10.1051/matecconf/202237204008
Pradhana, I., Riadi, I., & Prayudi, Y. (2021). Forensik Router untuk Mendeteksi Flooding Attack Menggunakan Metode Live Forensic. JRST (Jurnal Riset Sains Dan Teknologi), 5(1), 31. doi:10.30595/jrst.v5i1.7662
Safitrah, T., Sinaga, A. B. G., Alghifari, M., & Neyman, S. N. (2024). Pengaruh Serangan Slow HTTP DoS terhadap Layanan Web: Studi Eksperimental dengan Slowhttptest. Journal of Technology and System Information, 1(4), 11. doi:10.47134/jtsi.v1i4.2663
Torabi, S., Bou-Harb, E., Assi, C., & Debbabi, M. (2020). A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities. Forensic Science International: Digital Investigation, 32, 300922. doi:10.1016/j.fsidi.2020.300922
Yasotha, K., & Meenakshisundaram, K. (2023). Machine Learning-Based Intrusion Detection for Mitigating Denial of Service Attacks in Wireless Sensor Networks. International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2023 - Proceedings, (Icssas), 1216–1221. doi:10.1109/ICSSAS57918.2023.10331721
Yunus, W., & Lasulika, M. E. (2022). Security System Analysis against Flood Attacks Using TCP, UDP, and ICMP Protocols on Mikrotik Routers. International Journal of Advances in Data and Information Systems, 3(1), 11–19. doi:10.25008/ijadis.v3i1.1231