NETWORK SECURITY IMPLEMENTATION FROM DDOS ATTACKS WITH MIKROTIK ROUTERS

Authors

  • Wirda Fitriani Universitas Pembangunan Panca Budi
  • Fachrid Wadly Universitas Pembangunan Panca Budi
  • Zuhri Ramadhan Universitas Pembangunan Panca Budi

Keywords:

Application, Healthy lifestyles, Multimedia Development Life Cycle (MDLC), Blackbox Testing

Abstract

This study aims to develop an interactive learning application about healthy lifestyles for elementary school students at SD Panca Budi Medan. The background is the importance of healthy lifestyle education from an early age, which affects the physical and mental development of children. However, conventional learning methods are often less interesting for students, so innovation is needed. This study uses the Multimedia Development Life Cycle (MDLC) method, which consists of the stages of conception, design, material collection, assembly, testing, and distribution. The application developed has an easy-to-use interface, with various menus such as quizzes, materials, and instructions. Application testing using Black Box Testing ensures that all features, including buttons, navigation, and material content, run well. The test results show that the application is effective in helping students understand healthy lifestyles in an interactive way, as well as increasing their interest in learning. This application offers an interesting and fun learning experience, and can function as a relevant and useful teaching aid in improving students' understanding of the importance of maintaining health and cleanliness. Overall, this study shows that this Android-based application is effective in delivering healthy lifestyle material in an interesting and easy-to-understand way for students.

References

A. Wirawan, C. Feresa, M. Foozy, and A. Azhari, “Machine Learning-Based Distributed Denial of Service Attack Detection on Intrusion Detection System Regarding to Feature Selection,” vol. 4, no. 1, pp. 1–8, 2020, doi: 10.29099/ijair.v4i1.156.

D. L. Kurdi and B. S. Panca, “Pengujian Performa Komunikasi VoIP Menggunakan Static dan Dynamic Routing Protocol,” vol. 2, no. 2009, pp. 111–119, 2020.

M. Ade, C. Rahmani, and S. Prabowo, “Simulasi Keamanan Jaringan Dengan Metode DHCP Snooping dan VLAN,” vol. 1, no. 1, pp. 27–37, 2020.

A. Azahro, D. Wulandari, and U. Sari, “NETWORK ADDRESS TRANSLATION PENGHUBUNG IP PUBLIC,” no. 1, 2019.

Cloudflare, “What is a DDoS attack?” [Online]. Available: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/

Trivusi, “Serangan DDoS: Pengertian, Dampak, dan Strategi Penanganannya,” www.trivusi.web.id. [Online]. Available: https://www.trivusi.web.id/2023/07/ddos-attack.html#:~:text=Dampak dari serangan DDoS dapat,biaya pemulihan infrastruktur yang tinggi.

F. M. and T. T. W. Fuertes, A. Tunala, R. Moncayo, “Software-Based Platform for Education and Training of DDoS Attacks Using Virtual Networks,” Int. Conf. Softw. Secur. Assur. (ICSSA), Altoona, PA, USA, 2017, doi: 10.1109/ICSSA.2017.19.

P. Pangestu, P. T. Elektro, U. Sultan, and A. Tirtayasa, “ANALISIS OPTIMALISASI KINERJA JARINGAN MAN PADA LAYANAN INTERNET BERBASIS MIKROTIK DI PT. BINA TECHNINDO SOLUTION,” vol. 8, no. 1, pp. 8–17, 2021.

J. Mirkovic, J. Martin, and P. Reiher, “A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms,” no. December 2017, 2003.

I. Faisal, “BANDWITH MENGGUNAKAN METODE QUEUE TREE dan PCQ ( PER CONNECTION QUEUEING ),” vol. 1, no. April 2018, pp. 137–142, 2019.

Fachrid Wadly, Wirda Fitriani, and Muslim, “PERANCANGAN SISTEM RADIUS PADA MIKROTIK ROUTEROS DI PT.PUAN BALEO RAHMADSYAH,” vol. 3, pp. 27–35, 2023, [Online]. Available: https://publikasi.hawari.id/index.php/jnastek/article/view/68

G. A. Jaafar, S. M. Abdullah, and S. Ismail, “Review of Recent Detection Methods for HTTP DDoS Attack,” vol. 2019, 2019.

D. Fitria and M. A. Maulana, “ANALISIS PEMBAGIAN ZONA PROTEKSI PADA JARINGAN DISTRIBUSI 20 kV PENYULANG MERANTI GI BUNGARAN UNTUK MENINGKATKAN PELAYANAN KE KONSUMEN,” J. Ampere, vol. 5, no. 2, p. 68, 2020, doi: 10.31851/ampere.v5i2.5056.

R. Rizky, A. H. Wibowo, Z. Hakim, and L. Sujai, “Sistem Pakar Diagnosis Kerusakan Jaringan Local Area Network ( LAN ) Menggunakan Metode Forward Chaining,” vol. 7, no. 2, 2019.

Downloads

Published

31-10-2024

How to Cite

Wirda Fitriani, Fachrid Wadly, & Zuhri Ramadhan. (2024). NETWORK SECURITY IMPLEMENTATION FROM DDOS ATTACKS WITH MIKROTIK ROUTERS. International Journal Of Computer Sciences and Mathematics Engineering, 3(2), 18–29. Retrieved from https://ijecom.org/index.php/IJECOM/article/view/93