Analisa Penerapan Fitur Firewall pada Mikrotik untuk Mengamankan dari Serangan Denial of Service (DoS)
DOI:
https://doi.org/10.36312/panthera.v5i3.546Keywords:
Denial of Service, Firewall, Mikrotik, Port ScanningAbstract
Cybercrimes such as Denial of Service (DoS) attacks pose a serious threat to the stability of computer networks, especially those without adequate protection. This study aims to analyze the implementation of firewall features on Mikrotik routers as an effort to improve network security against DoS attacks. The method used refers to the Network Development Life Cycle (NDLC) approach, which includes the stages of analysis, design, simulation, implementation, and testing. The results show that the firewall configuration successfully closed several vulnerable ports (FTP, SSH, Telnet, and HTTP) while maintaining critical operational ports (DNS and Winbox). Furthermore, the CPU load on the router decreased dramatically from 100% to 3-4% after implementation, indicating success in mitigating malicious traffic. These findings confirm that the firewall feature on Mikrotik can significantly increase network resilience against DoS attacks.
Downloads
References
BSSN. (2020). Retrieved June 17, 2025, from BSSN. Interactwebsite: https://www.bssn.go.id/rekap-serangan-siber-januari-april-2020/
Jaya, B., Yuhandri, Y., & Sumijan, S. (2020). Peningkatan Keamanan Router Mikrotik terhadap Serangan Denial of Service (DoS). Jurnal Sistem Informasi dan Teknologi, 2(4), 115-123. https://doi.org/10.37034/jsisfotek.v2i4.32
Marta, I. K. K. A., Hartawan, I. N. B., & Satwika, I. K. S. (2020). Analisis Sistem Monitoring Keamanan Server dengan SMS Alert Berbasis Snort. Insert : Information System and Emerging Technology Journal, 1(1), 25-40. https://doi.org/10.23887/insert.v1i1.25874
Nurilahi, D. K., Munial, R., Syahrial, S., & Bahri, A. (2022). Penerapan Metode Naïve Bayes pada Honeypot Dionaea dalam Mendeteksi Serangan Port Scanning. Elkomika : Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika, 10(2), 309-321. https://doi.org/10.26760/elkomika.v10i2.309
Putra, F. P. E., Hamzah, A., Agel, W., & Kusuma, R. O. F. (2023). Implementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking. Jurnal Sistim Informasi dan Teknologi, 5(4), 82-87. https://doi.org/10.60083/jsisfotek.v5i4.329
Romadhan, I. A., Syaifudin, S., & Akbi, D. R. (2020). Implementasi Multiple Honeypot pada Raspberry Pi dan Visualisasi Log Honeypot Menggunakan ELK Stack. Jurnal Repositor, 2(4), 475-484. https://doi.org/10.22219/repositor.v2i4.30525
Syaftahan, P. (2024). Retrieved June 17, 2025, from CyberHub. Interactwebsite: https://cyberhub.id/berita/gcore-ungkap-lonjakan-serangan-ddos
Syahputra, A., Nurcahyo, Y., & Arlis, S. (2024). Penerapan Metode Live Forensik untuk Analisis Serangan DoS pada Router Mikrotik. Variable Research Journal, 1(2), 721-731. https://doi.org/10.35134/komtekinfo.v11i4.555
Tambunan, M. R. H., & Neyman, S. N. (2024). Implementasi Firewall pada Linux untuk Pencegahan dari Serangan DoS. Journal of Technology and System Information, 1(4), 10-17. https://doi.org/10.47134/jtsi.v1i4.2648
Wicaksono, D., & Widiasari, I. R. (2022). Sistem Keamanan Jaringan Menggunakan Firewall dengan Metode Port Blocking dan Firewall Filtering. Jurnal Ilmiah Sistem Informasi, 9(2), 1380-1392.
Zukhruf, A., Fatkhurrozi, B., & Kurniawan, A. A. (2023). Comparative Study of Distributed Denial of Service (DDoS) Attack Detection in Computer Networks. Jurnal Teknik Informatika (JUTIF), 4(5), 1033-1039. https://doi.org/10.52436/1.jutif.2023.4.5.756
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Frederico Indra Wijaya, Muhammad Innuddin, & Kurniadin Abd. Latif

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.

