1
Munawara, 2kadek Anjani
ABSTRACT
Security on computer networks is currently a matter that must be considered especially for internet
users because many risks must be borne if this is negligent of attention. Data theft, system
destruction, and so on are threats to users, especially on the server-side. DDoS is a method of
attack that is quite popular and is often used to bring down servers. This method runs by
consuming resources on the server computer so that it can no longer serve requests from the user
side. With this problem, security is needed to prevent the DDoS attack, one of which is using
iptables that has been provided by Linux. Implementing iptables can prevent or stop external
DDoS attacks aimed at the server.
Rules pertama :
iptables -A INPUT -p tcp --dport 80 -m
state --state NEW -m limit --limit
100/second --limit-burst 100 -j ACCEPT
Rules kedua :
iptables -A INPUT -m state --state
RELATED,ESTABLISHED -m limit --limit
100/second --limit-burst 100 -j ACCEPT
Rules ketiga :
iptables -A INPUT -p tcp -m state --
state NEW -j LOG --log-prefix 'DDoS Gambar 9. Kondisi Server Akhir
Detected'
Setelah dimasukkannya rules iptables pada
Penjelasan rules ketiga : server dilakukan kembali serangan yang sama, dan
Rules ketiga digunakan untuk mendeteksi adanya pada gambar 9 terlihat CPU usage pada server tidak
serangan DDoS dengan memasukkan peringatan semasif seperti sebelum diterapkannya rules pada
tersebut ke dalam log iptables dan peringatannya server. Terlihat hanya 5% pada CPU usage yang
berupa ‘DDoS Detected’. berarti server tidak terlalu terbebani walaupun dalam
kondisi serangan DDoS.
Rules keempat :
Iptables -A INPUT -p tcp -m state --
state NEW -j DROP