Rancangan Sistem Keamanan Jaringan dari serangan DDoS Menggunakan Metode Pengujian Penetrasi

  • Nimatul Mamuriyah Prodi Teknologi Informasi, Fakultas Ilmu Komputer, Universitas Internasional Batam
  • Stefanus Eko Prasetyo Prodi Teknologi Informasi, Fakultas Ilmu Komputer, Universitas Internasional Batam
  • Abner Onesimus Sijabat Prodi Teknologi Informasi, Fakultas Ilmu Komputer, Universitas Internasional Batam
Keywords: Cloudflare, DDoS, Firewall, GoldenEye, Kali Linux

Abstract

With the growth of increasingly innovative technology, new media have been created to convey information, namely web applications. Current technology is needed to disseminate information widely and without borders. A web server being paralyzed can disrupt the client's process of accessing information. Web server paralysis can be caused by several attacks, one of which is Distributed Denial of Service (DDoS). The author uses Kali Linux as penetration testing software, using the GoldenEye tool as this tool can be used to test whether a site is vulnerable to DDoS attacks. Security design with Cloudflare involves implementing multiple layers of protection designed to mitigate security risks to applications and websites. In general, Cloudflare Web Application Firewall (WAF) is placed in front of the origin server to detect and block web-based attacks. Cloudflare's DDoS protection service is applied at a global layer, securing infrastructure from hacker attacks. Leveraging Cloudflare's infrastructure, this design provides an effective and efficient security solution against DDoS attacks, ensuring the availability and reliability of network services

Downloads

Download data is not yet available.

References

I. K. D. G. Supartha and I. P. A. S. Wijaya, “Analisis Kinerja Sistem Penilaian Lomba Tari Bali Berbasis Mobile,” Jurnal Teknologi Dan Sistem Informasi Bisnis, vol. 5, no. 1, pp. 7–12, Jan. 2023, doi: 10.47233/jteksis.v5i1.721.

S. E. Prasetyo and N. Hassanah, “Analisis Keamanan Website Universitas Internasional Batam Menggunakan Metode ISSAF,” Jurnal Ilmiah Informatika (JIF), 2021.

S. Defit and U. YPTK Padang, “Prediksi Tingkat Kebutuhan Bandwidth Jangka Panjang Menggunakan Metode Algortima Backpropagation,” Jurnal Teknologi Dan Sistem Informasi Bisnis, vol. 4, no. 1, 2022, doi: 10.47233/jteksis.v4i1.310.

A. Faidlatul Habibah, F. Shabira, and I. Irwansyah, “Pengaplikasian Teori Penetrasi Sosial pada Aplikasi Online Dating,” Jurnal Teknologi Dan Sistem Informasi Bisnis, vol. 3, no. 1, pp. 44–53, Jan. 2021, doi: 10.47233/jteksis.v3i1.183.

G. Wijaya and Leo, “Merancang Dan Mengimplementasikan Keamanan Jaringan Dan Server Di PT Karya Mura Niaga,” 2022, [Online]. Available: http://journal.uib.ac.id/index.php/nacospro

T. Purnama et al., “IMPLEMENTASI INTRUSION DETECTION SYSTEM (IDS) SNORT SEBAGAI SISTEM KEAMANAN MENGGUNAKAN WHATSAPP DAN TELEGRAM SEBAGAI MEDIA NOTIFIKASI,” vol. 14, no. 2, pp. 358–369, 2023, [Online]. Available: http://ejurnal.provisi.ac.id/index.php/JTIKPpage358

B. Arifwidodo, Y. Syuhada, and S. Ikhwan, “Analisis Kinerja Mikrotik Terhadap Serangan Brute Force Dan DDoS Analysis of Mikrotik Performance Against Brute Force and DDoS Attacks,” jurnal TCHNO.COM, vol. 20, no. 3, pp. 392–399, 2021.

M. Risiko, S. Siber, T. Tan, and B. Soewito, “MANAJEMEN RISIKO SERANGAN SIBER MENGGUNAKAN FRAMEWORK NIST CYBERSECURITY DI UNIVERSITAS ZXC,” Journal of Information System, Applied, Management, Accounting and Research, vol. 6, no. 2, pp. 411–422, 2022, doi: 10.52362/jisamar.v6i2.781.

S. E. Prasetyo, N. Hasanah, and G. Wijaya, “Pengujian Keamanan Learning Management System TutorLMS Terhadap Kerentanan Insecure Design dan Broken Access Control,” Telcomatics, vol. 7, no. 2, Dec. 2022, doi: 10.37253/telcomatics.v7i2.7357.

F. Fadhilah, E. Wahyudi, and E. F. Cahyadi, “ANALISIS MODSECURITY DAN MODANTILORIS PADA SERANGAN DDOS SLOWHTTP TERHADAP WEB SERVER,” Jurnal Listrik Telekomunikasi Elektronika, vol. 20, no. 2, pp. 2549–8762, 2023, [Online]. Available: http://192.168.121.221/

Suliman, A. Achmad, and adnan, “IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN,” SEMANTIK : TEKNIK INFORMASI, vol. 7, no. 1, pp. 1–5, 2021, doi: 10.5281/zenodo.5034918.

Kusuma Artha Hendita Gregorius, “Sistem Firewall untuk Pencegahan DDOS ATTACK di Masa Pandemi Covid-19,” Journal of Informatics and Advanced Computing (JIAC), 2022.

M. Adam, E. I. Alwi, and I. As’ad, “ANALISIS FORENSIK TERHADAP SERANGAN DDOS PING OF DEATH PADA SERVER,” CYBER SECURITY DAN FORENSIK DIGITAL (CSFD), vol. 5, no. 1, pp. 23–31, 2022.

E. Nofarita, “IMPLEMENTASI APLIKASI SOFTWARE NATURAL NETWORK MENDETEKSI TINGKATAN SERANGAN DDOS PADA JARINGAN KOMPUTER,” vol. 14, no. 2, pp. 268–277, 2021, [Online]. Available: http://journal.stekom.ac.id/index.php/elkompage268

M. N. Faiz, O. Somantri, and A. W. Muhammad, “Rekayasa Fitur Berbasis Machine Learning untuk Mendeteksi Serangan DDoS,” Jurnal Nasional Teknik Elektro dan Teknologi Informasi |, vol. 11, no. 3, 2022.

J. A. Ginting and I. G. G. Ngurah Suryantara, “PENGUJIAN KERENTANAN SISTEM DENGAN MENGGUNAKAN METODE PENETRATION TESTING DI UNIVERSITAS XYZ,” Infotech: Journal of Technology Information, vol. 7, no. 1, pp. 41–46, Jun. 2021, doi: 10.37365/jti.v7i1.105.

A. Fauzi et al., “Penerapan Random Forest dan Adaboost untuk Klasifikasi Serangan DDoS,” Journal on Education, vol. 05, no. 03, pp. 7925–7937, 2023.

H. Alfidzar and B. Parga Zen, “Implementasi HoneyPy Dengan Malicious Traffic Detection System (Maltrail) Guna Mendeteksi Serangan DOS Pada Server,” Journal of Informatics, Information System, Software Engineering and Applications, vol. 4, no. 2, pp. 32–045, 2022, doi: 10.20895/INISTA.V4I2.

F. Fachri, “OPTIMASI KEAMANAN WEB SERVER TERHADAP SERANGAN BRUTE-FORCE MENGGUNAKAN PENETRATION TESTING,” Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. 10, no. 1, pp. 51–58, 2023, doi: 10.25126/jtiik.2023105872.

H. Setiawan, M. Agus Munandar, L. W. Astuti, and P. Korespondensi, “PENGGUNAAN METODE SIGNATURED BASED DALAM PENGENALAN POLA SERANGAN DI JARINGAN KOMPUTER,” Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. 8, no. 3, pp. 517–524, 2021, doi: 10.25126/jtiik.202184200.

M. Hafiz Hawarizmi, M. T. Kurniawan, and M. Fathinuddin, “Sistem Deteksi Serangan Ddos pada Software Defined Network Menggunakan Metode Entropy,” SMART COMP :JURNALNYA ORANG PINTAR KOMPUTER, 2022.

S. Adhar and U. Saprudin, “Implementasi Cloudflare Zero Trust Dalam Mendeteksi Aktivitas Cryptojcking Pada Jaringan Komputer,” Jurnal Teknologi Komputer dan Sistem Informasi (JTKSI), 2023.

Published
2024-01-04
How to Cite
Mamuriyah, N., Prasetyo, S. E., & Sijabat, A. (2024). Rancangan Sistem Keamanan Jaringan dari serangan DDoS Menggunakan Metode Pengujian Penetrasi. Jurnal Teknologi Dan Sistem Informasi Bisnis, 6(1), 162-167. https://doi.org/10.47233/jteksis.v6i1.1124
Section
Articles