Network Performance Analysis and DoS Attack Mitigation Strategy on MikroTik Router for Optimal Stability

Main Article Content

Yeni Yanti
Taufik Hidayat
Geubrina Mahgfira
Nurhanif
Putri Nuri Pratama
Nadiatul Safana

Abstract

The router, as a gateway in the network, plays a vital role. If its functionality is disrupted by Denial of Service (DoS) attacks, which pose a serious cyber threat and have destructive effects by overwhelming the target with large amounts of traffic, it directly impacts network performance. This research aims to analyze DoS attacks on network devices based on MikroTik routers and switches, which become targets that disrupt network traffic. These attacks lead to a significant increase in data traffic, affecting the stability and performance of the network. Through analysis using network forensic methods, this study evaluates the performance of MikroTik firewalls in mitigating DoS attacks by assessing the traffic received and rejected based on applied rules. The results show that the firewall can handle most attacks; however, some suspicious packets still bypass it. This study emphasizes the importance of enhancing security systems and mitigating DoS attacks to maintain optimal network performance in the future.

Article Details

Section
Articles

References

Amalia, E. R., Nurheki, Saputra, R., Ramadhana, C., & Yossy, E. H. (2022). Computer network design and implementation using load balancing technique with per connection classifier (PCC) method based on MikroTik router. Procedia Computer Science, 216, 103–111. doi:10.1016/j.procs.2022.12.116

Bahri, S. (2024). Mengamankan Perangkat Jaringan dari Serangan DDoS Menggunakan Fitur Firewall-RAW di Router MikroTik, 06(01), 1–6. Retrieved from https://ejournal.ust.ac.id/index.php/KAKIFIKOM/article/view/3589

Elsadig, M. A. (2023). Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach. IEEE Access, 11(August), 83537–83552. doi:10.1109/ACCESS.2023.3303113

Fakhmi, M, & Gultom, L. M. (2021). Peningkatan Keamanan Router Mikrotik Terhadap Serangan Syn Flood dengan Menggunakan Firewall Raw. Seminar Nasional Industri dan Teknologi (SNIT), 260–277.

Hafizh, M. N., Riadi, I., & Fadlil, A. (2020). Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic. Jurnal Telekomunikasi dan Komputer, 10(2), 111. doi:10.22441/incomtech.v10i2.8757

Jaya, B., Yuhandri, Y., & Sumijan, S. (2020). Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS). Jurnal Sistim Informasi dan Teknologi, 2, 115–123. doi:10.37034/jsisfotek.v2i4.32

Kushaeiri, F. A., Muhyidin, Y., Singasatia, D., Teknik, F., Tinggi, S., Wastukancana, T., & Barat, J. (2024). Implementasi pencegahan serangan ddos pada router, 2, 229–244.

Lutfi, S., Khairan, A., Muin, Y., & Salmin, M. (2022). Optimal Filter Assignment Policy Against Distributed Denial of Service Attack on Router Mikrotik. MATEC Web of Conferences, 372, 04008. doi:10.1051/matecconf/202237204008

Pradhana, I., Riadi, I., & Prayudi, Y. (2021). Forensik Router untuk Mendeteksi Flooding Attack Menggunakan Metode Live Forensic. JRST (Jurnal Riset Sains Dan Teknologi), 5(1), 31. doi:10.30595/jrst.v5i1.7662

Safitrah, T., Sinaga, A. B. G., Alghifari, M., & Neyman, S. N. (2024). Pengaruh Serangan Slow HTTP DoS terhadap Layanan Web: Studi Eksperimental dengan Slowhttptest. Journal of Technology and System Information, 1(4), 11. doi:10.47134/jtsi.v1i4.2663

Torabi, S., Bou-Harb, E., Assi, C., & Debbabi, M. (2020). A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities. Forensic Science International: Digital Investigation, 32, 300922. doi:10.1016/j.fsidi.2020.300922

Yasotha, K., & Meenakshisundaram, K. (2023). Machine Learning-Based Intrusion Detection for Mitigating Denial of Service Attacks in Wireless Sensor Networks. International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2023 - Proceedings, (Icssas), 1216–1221. doi:10.1109/ICSSAS57918.2023.10331721

Yunus, W., & Lasulika, M. E. (2022). Security System Analysis against Flood Attacks Using TCP, UDP, and ICMP Protocols on Mikrotik Routers. International Journal of Advances in Data and Information Systems, 3(1), 11–19. doi:10.25008/ijadis.v3i1.1231