dc.description.abstract |
Internet services have many benefits and are widely used, but they also have drawbacks that can be exploited by hackers to carry out attacks such as DDoS. One of the solutions to manage and control the internet network is to use MikroTik CHR (Cloud Hosted Router), which is a virtual router solution provided by MikroTik. CHR is designed to run on various virtualization platforms such as VMware, VirtualBox, Hyper-V, and Cloud such as Amazon Web Services, Google Cloud Platform, and Microsoft Azure. This study aims to analyze DDoS attack techniques used and implemented on the Mikrotik CHR platform and security strategy that can be used to protect MikroTik CHR from DDoS attacks which can cause service disruptions and financial losses and their handling. This research only focuses on DDoS attacks on MikroTik CHR and security strategies that can protect it from attacks. The results show that some effective security strategies include configuring a firewall, activating protection features, and monitoring and updating software regularly. In conclusion, MikroTik CHR can be protected from DDoS attacks with the right security strategy, and it is necessary to pay attention to strict security monitoring, software updates, and an integrated and comprehensive security strategy to protect MikroTik CHR from DDoS attacks.
Keywords : Mikrotik, Firewall, CHR, DDoS.
| en_US |