Penanggulangan Serangan LOIC Terhadap Web Server
DOI:
https://doi.org/10.33633/tc.v22i3.8168Keywords:
DoS, LOIC, Port Scaning, IptablesAbstract
Ketersediaan layanan yang selalu siap secara realtime merupakan hal yang selalu diupayakan untuk menunjang kelancaran layanan dalam menggunakan web server sebagai media utama dalam memberikan dan menunjang interface bagi semua kebutuhan pengguna. Kendala utama karena layanan web server melalui jalur internet maka sering terjadi kendala teknis yang diakibatkan gangguan serangan DoS LOIC yang melumpuhkan kinerja web server, cpu, dan komponen lainnya yang menguras sumber daya komputer server. Hal seperti ini perlu ditanggulangi sehingga layanan web server tetap tersedia bagi pengguna tanpa kendala. Begitu pula serangan yang menggali informasi dari komputer server seperti aktifitas port scanning yang menghasilkan informasi berupa jenis web server, jenis sistem operasi yang digunakan dan informasi penting lainnya. Untuk itu diperlukan upaya penanggulangan dengan menggunakan firewall iptables guna meminimalisir gangguan tersebut.References
Id-SIRTII, “Id-SIRTII,” Jakarta, 2018. [Online]. Available: https://www.idsirtii.or.id/halaman/tentang/laporan-kegiatan.html.
M. Merouane, “An approach for detecting and preventing DDoS attacks in campus,” Autom. Control Comput. Sci., vol. 51, no. 1, pp. 13–23, 2017, doi: 10.3103/S0146411616060043.
A. Prakash and R. Priyadarshini, “An Intelligent Software defined Network Controller for preventing Distributed Denial of Service Attack,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, no. Icicct, pp. 585–589, 2018, doi: 10.1109/ICICCT.2018.8473340.
S. H. Lee, Y. L. Shiue, C. H. Cheng, Y. H. Li, and Y. F. Huang, “Detection and Prevention of DDoS Attacks on the IoT,” Appl. Sci., vol. 12, no. 23, 2022, doi: 10.3390/app122312407.
S. T. Zargar, J. Joshi, and D. Tipper, “A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks,” IEEE Commun. Surv. Tutorials, vol. 15, no. 4, pp. 2046–2069, 2013, doi: 10.1109/SURV.2013.031413.00127.
N. Gandotra and L. Sen Sharma, “Exploring the use of Iptables as an Application Layer Firewall,” J. Inst. Eng. Ser. B, vol. 101, no. 6, pp. 707–715, 2020, doi: 10.1007/s40031-020-00497-y.
A. R. Assistant Professor, “Experimentation Of Denial Of Service Attack In Wireless Local Area Infrastructure Network Using Loic Tool,” Arunadevi R J. Eng. Res. Appl. www.ijera.com, vol. 8, no. 8, pp. 51–55, 2018, doi: 10.9790/9622-0808035155.
Virtualbox.org, “VirtualBox,” 2023. https://virtualbox.org (accessed Apr. 11, 2023).
W3techs.com, “Web Technology Surveys,” 1 April 2023, 2023. https://w3techs.com/ (accessed Apr. 30, 2023).
M. Ba? Seyyar, F. Ö. Çatak, and E. Gül, “Detection of attack-targeted scans from the Apache HTTP Server access logs,” Appl. Comput. Informatics, vol. 14, no. 1, pp. 28–36, 2018, doi: 10.1016/j.aci.2017.04.002.
Y. S. Pratama, A. Budiono, and A. Almaarif, “Analisis Dan Perancangan Cooling Management Data Center Berdasarkan Standar Tia-942 Menggunakan Ppdioo Life-Cycle Approach Di Pemerintahan Kabupaten Bandung Barat Analysis And Designing Of Cooling Management Data Center Based On Tia-942 Standards Using Ppdioo Life-Cycle Approach In West Bandung District Government,” 2020, pp. 6656–6663, Accessed: Nov. 07, 2022. [Online]. Available: https://openlibrarypublications.telkomuniversity.ac.id/index.php/engineering/article/view/12484/12253.
E. S. J. Atmadji, B. M. Susanto, and R. Wiratama, “Pemanfaatan IPTables Sebagai Intrusion Detection System (IDS) dan Intrusion Prevention System (IPS) Pada Linux Server,” Teknika, vol. 6, no. 1, pp. 19–23, 2017, doi: 10.34148/teknika.v6i1.55.
Downloads
Published
Issue
Section
License
License Terms
All articles published in Techno.COM Journal are licensed under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0). This means:
1. Attribution
Readers and users are free to:
-
Share – Copy and redistribute the material in any medium or format.
-
Adapt – Remix, transform, and build upon the material.
As long as proper credit is given to the original work by citing the author(s) and the journal.
2. Non-Commercial Use
-
The material cannot be used for commercial purposes.
-
Commercial use includes selling the content, using it in commercial advertising, or integrating it into products/services for profit.
3. Rights of Authors
-
Authors retain copyright and grant Techno.COM Journal the right to publish the article.
-
Authors can distribute their work (e.g., in institutional repositories or personal websites) with proper acknowledgment of the journal.
4. No Additional Restrictions
-
The journal cannot apply legal terms or technological measures that restrict others from using the material in ways allowed by the license.
5. Disclaimer
-
The journal is not responsible for how the published content is used by third parties.
-
The opinions expressed in the articles are solely those of the authors.
For more details, visit the Creative Commons License Page:
? https://creativecommons.org/licenses/by-nc/4.0/