Analisis Kinerja Mikrotik Terhadap Serangan Brute Force Dan DDoS
DOI:
https://doi.org/10.33633/tc.v20i3.4615Abstract
Serangan cyber yang semakin meningkat menjadikan persoalan bagi penyedia layanan jasa internet. Contoh jenis serangan cyber yang digunakan adalah dengan teknik serangan DDoS dan Brute Force. Perangkat jaringan seperti Mikrotik pun bisa menjadi target dari serangan. Upaya mencegah serangan diperlukan dengan suatu sistem keamanan. Penelitian ini menggunakan metode kuantitatif dengan menganalisis performasi dan kinerja dari Mikrotik apabila terjadi serangan. Hasil Pengujian, serangan DDos sebanyak 171847 serangan ke port 80 terpantau CPU Mikrotik sebesar 96,81% dan pada webserver sebesar 16,61%. Perangkat Mikrotik yang telah terkena serangan DDoS sudah tidak dapat lagi beroperasi secara normal. Namun saat skenario serangan Brute Force, terpantu normal 4,76% pada CPU Mikrotik karena port forwarding telah meneruskan paket serangan ke server Honeypot. Kesimpulan dari penelitian ini serangan DDoS dan Brute Force mengakibatkan peningkatan beban kinerja CPU baik pada Mikrotik maupun pada server Honeypot.References
G. K. Sadasivam, C. Hota, and B. Anand, “Honeynet Data Analysis and Distributed SSH Brute-Force Attacks,” Towar. Extensible Adapt. Methods Comput., no. October, pp. 107–118, 2018, doi: 10.1007/978-981-13-2348-5_9.
C. Wang and Z. Lu, “Cyber Deception: Overview and the Road Ahead,” IEEE Secur. Priv., vol. 16, no. 2, pp. 80–85, 2018, doi: 10.1109/MSP.2018.1870866.
A. Yudhana, I. Riadi, and F. Ridho, “DDoS classification using neural network and naïve bayes methods for network forensics,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 11, pp. 177–183, 2018, doi: 10.14569/ijacsa.2018.091125.
R. Adrian and N. Isnianto, “Pada Performa Router,” no. October, pp. 1257–1259, 2016.
- Syaifuddin, D. Risqiwati, and E. A. Irawan, “Realtime Pencegahan Serangan Brute Force dan DDOS Pada Ubuntu Server,” Techno.Com, vol. 17, no. 4, pp. 347–354, 2018, doi: 10.33633/tc.v17i4.1766.
S. Sandra, D. Stiawan, and A. Heryanto, “Visualisasi Serangan Brute Force Menggunakan Metode K-Means dan Naïve Bayes,” Proceeding - Annu. Res. Semin. Proceeding, vol. 2, no. 1, pp. 315–320, 2016.
J. Kaur, R. Singh, and P. Kaur, “Prevention of DDoS and Brute Force Attacks on Web Log Files using Combination of Genetic Algorithm and Feed forward Back Propagation Neural Network,” Int. J. Comput. Appl., vol. 120, no. 23, pp. 10–13, 2015, doi: 10.5120/21399-4406.
B. Jaya, Y. Yunus, and S. Sumijan, “Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS),” J. Sistim Inf. dan Teknol., vol. 2, pp. 5–9, 2020, doi: 10.37034/jsisfotek.v2i4.81.
F. Adhi Purwaningrum, A. Purwanto, E. Agus Darmadi, P. Tri Mitra Karya Mandiri Blok Semper Jomin Baru, and C. -Karawang, “Optimalisasi Jaringan Menggunakan Firewall,” vol. 2, no. 3, pp. 17–23, 2018.
D. Kumar and M. Gupta, “Implementation of Firewall & Intrusion Detection System Using pfSense To Enhance Network Security,” Int. J. Electr. Electron. Comput. Sci. Eng., pp. 131–137, 2018, [Online]. Available: www.ijeecse.com.
N. Arkaan and D. V. S. Y. Sakti, “Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, pp. 112–120, 2019, doi: 10.25077/teknosi.v5i2.2019.112-120.
P. Sokol, J. Míšek, and M. Husák, “Honeypots and honeynets: issues of privacy,” Eurasip J. Inf. Secur., vol. 2017, no. 1, pp. 1–9, 2017, doi: 10.1186/s13635-017-0057-4.
W. Cabral, C. Valli, L. Sikos, and S. Wakeling, “Review and analysis of cowrie artefacts and their potential to be used deceptively,” Proc. - 6th Annu. Conf. Comput. Sci. Comput. Intell. CSCI 2019, pp. 166–171, 2019, doi: 10.1109/CSCI49370.2019.00035.
D. S. Hermawan, S. Syaifuddin, and D. Risqiwati, “Analisa Real-Time Data log honeypot menggunakan Algoritma K-Means pada serangan Distributed Denial of Service,” J. Repos., vol. 2, no. 5, p. 541, 2020, doi: 10.22219/repositor.v2i5.440.
M. Arman and N. Rachmat, “Implementasi Sistem Keamanan Web Server Menggunakan Pfsense,” Jusikom J. Sist. Komput. Musirawas, vol. 5, no. 1, pp. 13–23, 2020, doi: 10.32767/jusikom.v5i1.752.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Bongga Arifwidodo

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
License Terms
All articles published in Techno.COM Journal are licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0). This means:
1. Attribution
Readers and users are free to:
-
Share – Copy and redistribute the material in any medium or format.
-
Adapt – Remix, transform, and build upon the material.
As long as proper credit is given to the original work by citing the author(s) and the journal.
2. Non-Commercial Use
-
The material cannot be used for commercial purposes.
-
Commercial use includes selling the content, using it in commercial advertising, or integrating it into products/services for profit.
3. Rights of Authors
-
Authors retain copyright and grant Techno.COM Journal the right to publish the article.
-
Authors can distribute their work (e.g., in institutional repositories or personal websites) with proper acknowledgment of the journal.
4. No Additional Restrictions
-
The journal cannot apply legal terms or technological measures that restrict others from using the material in ways allowed by the license.
5. Disclaimer
-
The journal is not responsible for how the published content is used by third parties.
-
The opinions expressed in the articles are solely those of the authors.
For more details, visit the Creative Commons License Page:
? https://creativecommons.org/licenses/by-nc/4.0/