Denial of Service (DoS) is a serious cyber threat and has a destructive impact because it makes target unavailable by flooding large amounts of traffic. The router as a gateway plays a vital role in the network, if its function is disrupted it will have a direct impact on the overall network performance. This study aims to analyze of securing network from DoS using a mikrotik router by utilizing the built-in security features and assessing the level of effectiveness. By using the PPDIOO methodology, there are six router conditions tested against DoS with five indicators being measured. The results obtained are that the security with firewall raw in condition 6 is the most effective and efficient compared to other conditions. CPU consumption...
Teknologi virtualisasi telah mengubah arah revolusi industri komputer dengan cara penurunan biaya-bi...
This research is carried out an analysis and investigation of digital log file data retrieval from D...
Network forensics is a computer security investigation to find sources of the attack s on the networ...
Denial of Service (DoS) menjadi ancaman siber serius dan berdampak destruktif karena dapat melumpuhk...
Denial of Service (DoS) attack adalah ancaman yang serius untuk jaringan komputer seperti Lokal Area...
Internet services provide many benefits that are public, this is the cause of many people using the ...
The router plays an important role in managing data packet traffic in the network infrastructure, so...
The development of network technology from time to time is growing rapidly, therefore, a secure netw...
Peningkatan jumlah serangan cyber menjadi persoalan yang rumit bagi instansi maupun penyedia jasa ya...
The e-Rapor is an additional app/tool for teachers and educational units to report student learning ...
DoS and DDoS are attacks on computer networks that flood network traffic with continuous requests. F...
ABSTRAKSI: Sebagai salah satu jenis serangan terhadap sistem komputer, Denial of service senantiasa ...
Telah terjadi suatu gangguan keamanan berupa serangan Denial Of Services (DoS Attack) yang menyerang...
Teknologi virtualisasi telah mengubah arah revolusi industri komputer dengan cara penurunan biaya-bi...
Serangan cyber yang semakin meningkat menjadikan persoalan bagi penyedia layanan jasa internet. Cont...
Teknologi virtualisasi telah mengubah arah revolusi industri komputer dengan cara penurunan biaya-bi...
This research is carried out an analysis and investigation of digital log file data retrieval from D...
Network forensics is a computer security investigation to find sources of the attack s on the networ...
Denial of Service (DoS) menjadi ancaman siber serius dan berdampak destruktif karena dapat melumpuhk...
Denial of Service (DoS) attack adalah ancaman yang serius untuk jaringan komputer seperti Lokal Area...
Internet services provide many benefits that are public, this is the cause of many people using the ...
The router plays an important role in managing data packet traffic in the network infrastructure, so...
The development of network technology from time to time is growing rapidly, therefore, a secure netw...
Peningkatan jumlah serangan cyber menjadi persoalan yang rumit bagi instansi maupun penyedia jasa ya...
The e-Rapor is an additional app/tool for teachers and educational units to report student learning ...
DoS and DDoS are attacks on computer networks that flood network traffic with continuous requests. F...
ABSTRAKSI: Sebagai salah satu jenis serangan terhadap sistem komputer, Denial of service senantiasa ...
Telah terjadi suatu gangguan keamanan berupa serangan Denial Of Services (DoS Attack) yang menyerang...
Teknologi virtualisasi telah mengubah arah revolusi industri komputer dengan cara penurunan biaya-bi...
Serangan cyber yang semakin meningkat menjadikan persoalan bagi penyedia layanan jasa internet. Cont...
Teknologi virtualisasi telah mengubah arah revolusi industri komputer dengan cara penurunan biaya-bi...
This research is carried out an analysis and investigation of digital log file data retrieval from D...
Network forensics is a computer security investigation to find sources of the attack s on the networ...