Issue |
MATEC Web Conf.
Volume 372, 2022
International Conference on Science and Technology 2022 “Advancing Science and Technology Innovation on Post Pandemic Through Society 5.0” (ICST-2022)
|
|
---|---|---|
Article Number | 04008 | |
Number of page(s) | 4 | |
Section | Design Technology and Information System | |
DOI | https://doi.org/10.1051/matecconf/202237204008 | |
Published online | 08 December 2022 |
Optimal Filter Assignment Policy Against Distributed Denial of Service Attack on Router Mikrotik
1 Informatics Engineering, Faculty of Engineering, Universitas Khairun, Ternate, Indonesia
2 Informatics Engineering, Faculty of Engineering, Universitas Khairun, Ternate, Indonesia
3 Informatics Engineering, Faculty of Engineering, Universitas Khairun, Ternate, Indonesia
4 Informatics Engineering, Faculty of Engineering, Universitas Khairun, Ternate, Indonesia
* Corresponding author: yasirmuin@unkhair.ac.id
Information technology is currently one of the things that almost all universities widely adopt. The development of information technology requires universities to manage potential resources effectively and efficiently. as stated in the regulation of the Minister of Research, Technology, and Higher Education Number 62 of 2017 concerning the governance of information technology in the university environment that is to support the achievement of increasing access, relevance, quality of higher education, innovation, and strengthening governance and accountability of a university. The consequence of the application of information technology is the emergence of information security risks, the threat of this attack is a concern that every university must be wary of to secure network infrastructure from these attacks. Open access provides great potential for everyone to commit crimes against network infrastructure. as explained that computer network security is part of a system that is very important to be maintained, for that it is necessary to make efforts that can be made by the party responsible for securing the University X network from DDoS attacks. the method used to secure the network infrastructure makes a filtering policy to block DDoS attacks, the results obtained from the application according to the filter rules applied to the proxy device successfully block DDoS attacks.
Key words: DDoS Attack / Vulnerability / Penetration Testing / Network Security
© The Authors, published by EDP Sciences, 2022
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.