NETWORK SECURITY IMPLEMENTATION FROM DDOS ATTACKS WITH MIKROTIK ROUTERS
Keywords:
Application, Healthy lifestyles, Multimedia Development Life Cycle (MDLC), Blackbox TestingAbstract
This study aims to develop an interactive learning application about healthy lifestyles for elementary school students at SD Panca Budi Medan. The background is the importance of healthy lifestyle education from an early age, which affects the physical and mental development of children. However, conventional learning methods are often less interesting for students, so innovation is needed. This study uses the Multimedia Development Life Cycle (MDLC) method, which consists of the stages of conception, design, material collection, assembly, testing, and distribution. The application developed has an easy-to-use interface, with various menus such as quizzes, materials, and instructions. Application testing using Black Box Testing ensures that all features, including buttons, navigation, and material content, run well. The test results show that the application is effective in helping students understand healthy lifestyles in an interactive way, as well as increasing their interest in learning. This application offers an interesting and fun learning experience, and can function as a relevant and useful teaching aid in improving students' understanding of the importance of maintaining health and cleanliness. Overall, this study shows that this Android-based application is effective in delivering healthy lifestyle material in an interesting and easy-to-understand way for students.
References
A. Wirawan, C. Feresa, M. Foozy, and A. Azhari, “Machine Learning-Based Distributed Denial of Service Attack Detection on Intrusion Detection System Regarding to Feature Selection,” vol. 4, no. 1, pp. 1–8, 2020, doi: 10.29099/ijair.v4i1.156.
D. L. Kurdi and B. S. Panca, “Pengujian Performa Komunikasi VoIP Menggunakan Static dan Dynamic Routing Protocol,” vol. 2, no. 2009, pp. 111–119, 2020.
M. Ade, C. Rahmani, and S. Prabowo, “Simulasi Keamanan Jaringan Dengan Metode DHCP Snooping dan VLAN,” vol. 1, no. 1, pp. 27–37, 2020.
A. Azahro, D. Wulandari, and U. Sari, “NETWORK ADDRESS TRANSLATION PENGHUBUNG IP PUBLIC,” no. 1, 2019.
Cloudflare, “What is a DDoS attack?” [Online]. Available: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
Trivusi, “Serangan DDoS: Pengertian, Dampak, dan Strategi Penanganannya,” www.trivusi.web.id. [Online]. Available: https://www.trivusi.web.id/2023/07/ddos-attack.html#:~:text=Dampak dari serangan DDoS dapat,biaya pemulihan infrastruktur yang tinggi.
F. M. and T. T. W. Fuertes, A. Tunala, R. Moncayo, “Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks,” Int. Conf. Softw. Secur. Assur. (ICSSA), Altoona, PA, USA, 2017, doi: 10.1109/ICSSA.2017.19.
P. Pangestu, P. T. Elektro, U. Sultan, and A. Tirtayasa, “ANALISIS OPTIMALISASI KINERJA JARINGAN MAN PADA LAYANAN INTERNET BERBASIS MIKROTIK DI PT. BINA TECHNINDO SOLUTION,” vol. 8, no. 1, pp. 8–17, 2021.
J. Mirkovic, J. Martin, and P. Reiher, “A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,” no. December 2017, 2003.
I. Faisal, “BANDWITH MENGGUNAKAN METODE QUEUE TREE dan PCQ ( PER CONNECTION QUEUEING ),” vol. 1, no. April 2018, pp. 137–142, 2019.
Fachrid Wadly, Wirda Fitriani, and Muslim, “PERANCANGAN SISTEM RADIUS PADA MIKROTIK ROUTEROS DI PT.PUAN BALEO RAHMADSYAH,” vol. 3, pp. 27–35, 2023, [Online]. Available: https://publikasi.hawari.id/index.php/jnastek/article/view/68
G. A. Jaafar, S. M. Abdullah, and S. Ismail, “Review of Recent Detection Methods for HTTP DDoS Attack,” vol. 2019, 2019.
D. Fitria and M. A. Maulana, “ANALISIS PEMBAGIAN ZONA PROTEKSI PADA JARINGAN DISTRIBUSI 20 kV PENYULANG MERANTI GI BUNGARAN UNTUK MENINGKATKAN PELAYANAN KE KONSUMEN,” J. Ampere, vol. 5, no. 2, p. 68, 2020, doi: 10.31851/ampere.v5i2.5056.
R. Rizky, A. H. Wibowo, Z. Hakim, and L. Sujai, “Sistem Pakar Diagnosis Kerusakan Jaringan Local Area Network ( LAN ) Menggunakan Metode Forward Chaining,” vol. 7, no. 2, 2019.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal Of Computer Sciences and Mathematics Engineering
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
COPYRIGHT
Copyright of any article in the International Journal of Computer Sciences and Mathematics Engineering is held by the author under a Creative Commons Attribution-ShareAlike 4.0 International License.
- The author acknowledges that the International Journal Of Computer Sciences and Mathematics Engineering has the right to be the first to publish under a Creative Commons Attribution-ShareAlike 4.0 International License – CC BY-SA.
- Authors can submit articles separately, arrange for non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional respository, publication into books, etc.), by acknowledging that the manuscript has been published for the first time in the International Journal of Computer Sciences and Mathematics Engineering.
LICENCE
The International Journal Of Computer Sciences and Mathematics Engineering is published under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License. This license permits anyone to copy and redistribute this material in any form or format, compose, modify, and make derivatives of this material for any purpose, including commercial purposes, as long as they give credit to the Author for the original work.