scholarly journals Implementasi Filtering Firewall Dan Hardening Web Server Untuk Mencegah Serangan Http Dos Pada Dinas Lingkungan Hidup Pematangsiantar

Device ◽  
2021 ◽  
Vol 11 (2) ◽  
pp. 21-29
Author(s):  
Rizki Josua Tampubolon ◽  
Poningsih Poningsih ◽  
Solikhun Solikhun ◽  
Indra Gunawan ◽  
Zulaini Masruro Nasution

Denial of Service (DoS) merupakan masalah keamanan jaringan yang saat ini sedang berkembang. Semakin tinggi kapasitas komputasi suatu komputer penyerang, serangan DoS yang dapat dihasilkan juga semakin berbahaya. Serangan ini dapat menyebabkan ketidakberdayaan server untuk melayani service request yang sah, karena itu serangan DoS sangat merugikan dan perlu diberikan antisipasi yang efektif agar keamanan web server aman dari serangan Denial of Service (DoS). Terkadang internet disalahgunakan dengan adanya waktu luang setelah kegiatan maupun saat kegiatan berlangsung seperti mengakses browser, media sosial serta mengakses youtube. Tanpa disadari kemungkinan adanya sebuah serangan muncul yang dapat mengakibatkan lambatnya internet sehingga terjadinya kegagalan akses pada internet. Maka diperlukan adanya penerapan filtering firewall serta hardening web server dengan menggunakan mikrotik router untuk memblokir akses internet untuk menunjang kegiatan pekerjaan pegawai Dinas Lingkungan Hidup Pematangsiantar lebih baik dan nyaman.

Techno Com ◽  
2021 ◽  
Vol 20 (1) ◽  
pp. 59-68
Author(s):  
Jupriyadi Jupriyadi ◽  
Budi Hijriyanto ◽  
Faruk Ulum
Keyword(s):  

Web server merupakan server yang memberikan layanan berbasis web dan harus mampu melayani pengguna saat dibutuhkam. Namun tidak menutup kemungkinan web server dapat mengalami gangguan akibat ancaman dan serangan yang dilakukan oleh pihak yang tidak bertanggungjawab. Salah satu ancaman yang dapat menggangu web server adalah  serangan Denial of Service (DOS) menggunakan teknik slow post yang dapat menyebabkan layanan pada web server tidak dapat diakses. Penelitian ini akan menguji dua buah metode pengamanan yang dapat digunakan untuk mengurangi dampak serangan DoS yaitu mod-evasive dan ddos deflate. Berdasarkan eksperimen yang telah dilakukan dapat diambil kesimpulan bahwa ddos deflate merupakan metode yang lebih baik dibandingkan dengan mod-evasive dalam mengatasi serangan DOS karena ddos deflate mampu mendeteksi dan dapat memutus koneksi yang berlebihan sesuai dengan konfigurasi yang dilakukan.


Author(s):  
Kannan Balasubramanian

Most merchant Web servers are contacted by completely unknown, often even anonymous, users. Thus they cannot generally protect themselves by demanding client authentication, but rather by employing carefully configured access control mechanisms. These range from firewall mechanisms and operating system security to secured execution environments for mobile code. Generally, all types of mechanisms that allow a client to execute a command on the server should be either completely disabled or provided only to a limited extent. Denial-of-service attacks on Web servers have much more serious consequences for Web servers than for Web clients because for servers, losing availability means losing revenue. Web publishing issues include anonymous publishing and copyright protection. Web servers must take special care to protect their most valuable asset. Information. which is usually stored in databases and in some cases requires copyright protection.


Respati ◽  
2020 ◽  
Vol 15 (2) ◽  
pp. 6
Author(s):  
Lukman Lukman ◽  
Melati Suci

INTISARIKeamanan jaringan pada web server merupakan bagian yang paling penting untuk menjamin integritas dan layanan bagi pengguna. Web server sering kali menjadi target serangan yang mengakibatkan kerusakan data. Salah satunya serangan SYN Flood merupakan jenis serangan Denial of Service (DOS) yang memberikan permintaan SYN secara besar-besaran kepada web server.Untuk memperkuat keamanan jaringan web server penerapan Intrusion Detection System (IDS) digunakan untuk mendeteksi serangan, memantau dan menganalisa serangan pada web server. Software IDS yang sering digunakan yaitu IDS Snort dan IDS Suricata yang memiliki kelebihan dan kekurangannya masing-masing. Tujuan penelitian kali ini untuk membandingkan kedua IDS menggunakan sistem operasi linux dengan pengujian serangan menggunakan SYN Flood yang akan menyerang web server kemudian IDS Snort dan Suricata yang telah terpasang pada web server akan memberikan peringatan jika terjadi serangan. Dalam menentukan hasil perbandingan, digunakan parameter-parameter yang akan menjadi acuan yaitu jumlah serangan yang terdeteksi dan efektivitas deteksi serangan dari kedua IDS tersebut.Kata kunci: Keamanan jaringan, Web Server, IDS, SYN Flood, Snort, Suricata. ABSTRACTNetwork security on the web server is the most important part to guarantee the integrity and service for users. Web servers are often the target of attacks that result in data damage. One of them is the SYN Flood attack which is a type of Denial of Service (DOS) attack that gives a massive SYN request to the web server.To strengthen web server network security, the application of Intrusion Detection System (IDS) is used to detect attacks, monitor and analyze attacks on web servers. IDS software that is often used is IDS Snort and IDS Suricata which have their respective advantages and disadvantages.The purpose of this study is to compare the two IDS using the Linux operating system with testing the attack using SYN Flood which will attack the web server then IDS Snort and Suricata that have been installed on the web server will give a warning if an attack occurs. In determining the results of the comparison, the parameters used will be the reference, namely the number of attacks detected and the effectiveness of attack detection from the two IDS.Keywords: Network Security, Web Server, IDS, SYN Flood, Snort, Suricata.


Information ◽  
2019 ◽  
Vol 10 (3) ◽  
pp. 84 ◽  
Author(s):  
Anastasia Gurina ◽  
Vladimir Eliseev

The article discusses the problem of detecting network attacks on a web server. The attention is focused on two common types of attacks: “denial of service” and “code injection”. A review and an analysis of various attack detection techniques are conducted. A new lightweight approach to detect attacks as anomalies is proposed. It is based on recognition of the dynamic response of the web server during requests processing. An autoencoder is implemented for dynamic response anomaly recognition. A case study with the MyBB web server is described. Several flood attacks and SQL injection attack are modeled and successfully detected by the proposed method. The efficiency of the detection algorithm is evaluated, and the advantages and disadvantages of the proposed approach are analyzed.


2013 ◽  
Vol 39 (7) ◽  
pp. 2252-2262 ◽  
Author(s):  
Luis Campo Giralte ◽  
Cristina Conde ◽  
Isaac Martin de Diego ◽  
Enrique Cabello
Keyword(s):  

2020 ◽  
Vol 202 ◽  
pp. 15003
Author(s):  
Kagiraneza Alexis Fidele ◽  
Suryono ◽  
Wahyul Amien Syafei

Network-based intruders such as (DoS) attacks have become one of the most significant internet interruptions. Some operations that rely on the internet, such as banking transactions, education, trade marketing, and social networking, have become the primary targets. The attacker is trying to surround and making it difficult for the system to defend. The research's objective is to recognize the characteristics and level of DoS attacks. In understanding the behavior of intruders against a target web server, Wireshark was used in all traffic networks—capturing the traffic in a networked environment. In this research, the user identifies the attack levels (TCP SYN, UDP, and HTTP protocol), ranging from low (Q1), medium (Q2), and high (Q4) attacks. The approach is to simulate the TCP, HTTP, and UDP flood attacks and analyze the attacks' effects on the network environment. In this work, normal scenarios and pattern attacks were compared. In this case, the intruder floods unwanted packets to the victim with a massive number of request packets; the SYN from the corresponding SYN-ACK replies are not achieved. This paper will identify the DoS attacks level and analyze the behavior of traffics.


2020 ◽  
Vol 7 (1) ◽  
pp. 56-70
Author(s):  
Molavi Arman

Meningkatnya kecepatan internet selalu diikuti meningkatnya pula gangguan keamanan dalam jaringan komputer.Hal ini cukup mengganggu layanan yang terhubung ke jaringan LAN maupun internet. Gangguan keamanan ini dikenal dengan DDoS (Distributed Denial of Service).  Serangan DoS slow HTTP adalah salah satu metode serangan DoS yang menargetkan server HTTP. Metode ini menghambat layanan dengan membanjiri sehingga menimbulkan kumpulan koneksi dengan permintaan yang lambat dan banyak menuju web server. Diketahui bahwa serangan slow HTTP DoS oleh satu penyerang dapat dicegah secara efektif dengan membatasi jumlah koneksi untuk setiap alamat IP. Di sisi lain, juga diketahui bahwa sulit untuk bertahan dari serangan slow HTTP DoS dari beberapa penyerang. Ancaman serangan DDoS semakin serius, jadi membutuhkan metode pertahanan yang efektif terhadap serangan DoS slow HTTP terdistribusi. Ketika web server berada di jaringan publik atau internet, maka melindungi komputer dan keamanan jaringan adalah masalah penting. Setelah mengidentifikasi dan menganalisis cara kerja serangan slow HTTP, serta deteksi serangannya, tulisan ini menjelaskan sistem kerja, cara mendeteksi, dan cara mempertahankan diri terhadap serangan slow HTTP.


Author(s):  
Subhi Rafeeq Zeebaree ◽  
Karwan Fahmi Jacksi ◽  
Rizgar Ramadhan Zebari

<p>In recent, the high available internet service is main demand of the most people. However, online services occasionally become inaccessible due to various threats and attacks. Synchronization (SYN) flood Distributed Denial of Service (DDoS) is the most used and has a serious effect on the public network services. Hence, the outcome of this attack on the commonly utilized cluster-based web servers is systematically illustrated in this paper. Moreover, performance of Internet Information Service 10.0 (IIS 10.0) on Windows server 2016 and Apache 2 on Linux Ubuntu 16.04 server is evaluated efficiently. The performance measuring process is done on both Network Load Balancing (NLB) and High Available Proxy (HAProxy) in Windows and Linux environments respectively as methods for web server load balancing.  Furthermore, stability, efficiency and responsiveness of the web servers are depended as the study evaluation metrics. Additionally, average CPU usage and throughput of the both mechanisms are measured in the proposed system. The results show that the IIS 10.0 cluster-based web servers are more responsiveness, efficiency and stable with and without SYN flood DDoS attack. Also, the performance of IIS 10.0 web server is better than of the Apache 2 in term of the average CPU usage and throughput.</p>


Sensors ◽  
2020 ◽  
Vol 20 (14) ◽  
pp. 3820
Author(s):  
Abdul Ghafar Jaafar ◽  
Saiful Adli Ismail ◽  
Mohd Shahidan Abdullah ◽  
Nazri Kama ◽  
Azri Azmi ◽  
...  

Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect. The shortfall at the application layer allows formation of HTTP DDoS as the request headers are not compulsory to be attached in an HTTP request. Furthermore, the header is editable, thus providing an attacker with the advantage to execute HTTP DDoS as it contains almost similar request header that can emulate a genuine client request. To the best of the authors’ knowledge, there are no recent studies that provide forged request headers pattern with the execution of the current HTTP DDoS attack scripts. Besides that, the current dataset for HTTP DDoS is not publicly available which leads to complexity for researchers to disclose false headers, causing them to rely on old dataset rather than more current attack patterns. Hence, this study conducted an analysis to disclose forged request headers patterns created by HTTP DDoS. The results of this study successfully disclose eight forged request headers patterns constituted by HTTP DDoS. The analysis was executed by using actual machines and eight real attack scripts which are capable of overwhelming a web server in a minimal duration. The request headers patterns were explained supported by a critical analysis to provide the outcome of this paper.


Sign in / Sign up

Export Citation Format

Share Document