Security System Analysis against Flood Attacks Using TCP, UDP, and ICMP Protocols on Mikrotik Routers

  • Yunus W
  • Lasulika M
N/ACitations
Citations of this article
37Readers
Mendeley users who have this article in their library.

Abstract

Advances in information technology today require all existing computer networks to be able to show that the security system model continues to be considered very important for users who want security both from inside and outside the network. An attack on a network server can occur at any time, as for an attack that can cause a dangerous effect on a router, namely DDOS / flood by flooding the router with very many data packets so that the router can be paralyzed in terms of handling the network system. In this study, descriptive research was applied to obtain data directly by conducting flooding techniques and analyzing and designing flooding prevention techniques with filtering techniques. The application of filtering on the firewall on MikroTik can minimize attacks and prevention directly by dropping flooding packets automatically so that MikroTik performance remains stable

Cite

CITATION STYLE

APA

Yunus, W., & Lasulika, M. E. (2022). Security System Analysis against Flood Attacks Using TCP, UDP, and ICMP Protocols on Mikrotik Routers. International Journal of Advances in Data and Information Systems, 3(1), 11–19. https://doi.org/10.25008/ijadis.v3i1.1231

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free