2021
DOI: 10.46880/methoda.vol11no3.pp241-246
|View full text |Cite
|
Sign up to set email alerts
|

Pengamanan Mikrotik Routerboard Dari Serangan Keamanan Dengan Notifikasi Bot Telegram

Abstract: The task of the network administrator is also not easy, this is because an admin must secure his network from an attack that can cause the network router to go down until it is damaged. There are so many ways to prevent a person/company from being able to provide optimal service, one of which is to attack the router using a DDoS attack type. Therefore, network security is needed with the Intrusion Detection System (IDS) method. An intrusion Detection System (IDS) is a method used to detect suspicious activity … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0
1

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
0
0
1
Order By: Relevance
“…Sedangkan Brute Force tipe FTP dapat menggunakan fitur Destination Limit (Destination Limit) pada rule Firewall [16]. Untuk menahan serangan Denial of Service berupa SYN Flood bisa diatasi dengan menggunakan konfigurasi Firewall Raw dan ditambah fitur Destination Limit [17] [18]. Cara bagaimana konfigurasi IPS pada router MikroTik menggunakan konfigurasi rule pada Firewall secara jelas telah dilakukan pada penelitian [19].…”
Section: Pengumpulan Dataunclassified
“…Sedangkan Brute Force tipe FTP dapat menggunakan fitur Destination Limit (Destination Limit) pada rule Firewall [16]. Untuk menahan serangan Denial of Service berupa SYN Flood bisa diatasi dengan menggunakan konfigurasi Firewall Raw dan ditambah fitur Destination Limit [17] [18]. Cara bagaimana konfigurasi IPS pada router MikroTik menggunakan konfigurasi rule pada Firewall secara jelas telah dilakukan pada penelitian [19].…”
Section: Pengumpulan Dataunclassified