Sahren Sahren


Abstract: During the Covid-19 pandemic, the centralized academic information system is very vulnerable to various forms of attacks, such as SYN Flood, ICMP Flood, DoS, etc. This attack will cause the server to slow down, so that it takes a long time to access the application. For this reason, a method is needed so that server security is guaranteed. The method used is packet filtering firewall. The results obtained from this study can improve server security and capturing traffic that leads to the server. So this method can be used to increase security on the server.

Keywords: DoS; Firewall; ICMP Flood; Packet Filtering; SYN Flood; Server


Abstrak: Dimasa pandemi Covid-19 saat ini sistem informasi akademik secara terpusat sangat rawan terhadap berbagai bentuk serangan, seperti SYN Flood, ICMP Flood, DoS, dll. Serangan ini akan mengakibatkan server menjadi lambat, sehingga lama dalam mengakses aplikasi. Untuk itu, dibutuhkan suatu metode agar keamanan server lebih terjamin. Metode yang digunakan adalah packet filtering  firewall. Hasil yang diperoleh dari penelitian ini dapat meningkatan kemanan server dan capturing traffic yang mengarah kepada server. Sehingga metode ini dapat digunakan untuk meningkatkan keamanan pada server.


Kata kunci: DoS; Firewall; ICMP Flood; Packet Filtering; SYN Flood; Server

Full Text:



M. Arman, “Metode Pertahanan Web Server Terhadap Distributed Slow HTTP DoS Attack,” JATISI (Jurnal Tek. Inform. dan Sist. Informasi), vol. 7, no. 1, pp. 56–70, 2020, doi: 10.35957/jatisi.v7i1.284.

M. Bogdanoski, A. Toshevski, D. Bogatinov, and M. Bogdanoski, “A novel approach for mitigating the effects of the TCP SYN flood DDoS attacks,” World J. Model. Simul., vol. 12, no. 3, pp. 217–230, 2016.

K. Hussain, S. J. Hussain, N. Z. Jhanjhi, and M. Humayun, “SYN flood attack detection based on bayes estimator (SFADBE) for MANET,” 2019 Int. Conf. Comput. Inf. Sci. ICCIS 2019, pp. 1–4, 2019, doi: 10.1109/ICCISci.2019.8716416.

A. Maraj, G. Jakupi, E. Rogova, and X. Grajqevci, “Testing of network security systems through DoS attacks,” 2017 6th Mediterr. Conf. Embed. Comput. MECO 2017 - Incl. ECYPS 2017, Proc., no. June, pp. 11–15, 2017, doi: 10.1109/MECO.2017.7977239.

Z. Mašetić, D. Kečo, N. Doğru, and K. Hajdarević, “SYN Flood Attack Detection in Cloud Computing Using Support Vector Machine,” TEM J., vol. 6, no. 4, pp. 752–759, 2017, doi: 10.18421/TEM64-15.

C. Diekmann, L. Hupel, J. Michaelis, M. Haslbeck, and G. Carle, “Verified iptables Firewall Analysis and Verification,” J. Autom. Reason., vol. 61, no. 1–4, pp. 191–242, 2018, doi: 10.1007/s10817-017-9445-1.

P. S. Kadam, “Adaptive Packet Filtering Techniques for Linux Firewall,” vol. 3, pp. 171–174, 2017.

M. Thant, K. M. Thu, K. Z. Ye, and S. T. T. Sin, “Development of firewall optimization model using by packet filter,” Proc. - 2016 UKSim-AMSS 18th Int. Conf. Comput. Model. Simulation, UKSim 2016, pp. 273–278, 2016, doi: 10.1109/UKSim.2016.45.

A. A. Ali, S. M. Darwish, and S. K. Guirguis, “An Approach for Improving Performance of a Packet Filtering Firewall Based on Fuzzy Petri Net,” J. Adv. Comput. Networks, vol. 3, no. 1, pp. 67–74, 2015, doi: 10.7763/JACN.2015.V3.144.

L. Xuan and P. Wu, “The Optimization and Implementation of Iptables Rules Set on Linux,” 2015 2nd Int. Conf. Inf. Sci. Control Eng., pp. 988–991, 2015, doi: 10.1109/ICISCE.2015.223.


Article Metrics

Abstract view : 60 times
PDF - 41 times


  • There are currently no refbacks.