Implementation of Tarpit Firewall for Network Security Optimization with The NIST SP800-86 Method in KP Room
Main Article Content
Abstract
Network optimization is one of the important aspects that aims to improve the performance, efficiency and reliability of network systems and security on the network, but if the optimization is not carried out effectively it will pose a security threat to the network, one of the real threats is DdoS Attack, DdoS attack is a dangerous attack because this attack can paralyze the network server, Therefore, optimization needs to be carried out in the KP Room in order to avoid the threat of DdoS attacks, so the initial stage of this research will test the network to find out how optimal the network is in the KP room so that optimization is needed. The research method used is NSIT, which includes collection, examination, analysis, and reporting, the results after the research is carried out where, on the network in the kp room after testing at the examination stage and then by identifying the test results, it can be concluded that the network is not optimal enough against DdoS attacks and connection type attacks which, The optimization step taken is to apply a Tarpit firewall on the router. The implementation of Tarpit Firewall successfully overcomes DdoS attacks by slowing down incoming connections and stopping attacks, thereby improving network security from Port Scanning, DDoS, and Brute force attacks.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to journal Tech-E, Universitas Buddhi Dharma as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms and any other similar reproductions, as well as translations. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, such as electronic, electrostatic and mechanical copies, photocopies, recordings, magnetic media, etc. , will be allowed only with a written permission from journal Tech-E.
journal Tech-E, the Editors and the Advisory Editorial Board make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in the journal Tech-E, Universitas Buddhi Dharma are sole and exclusive responsibility of their respective authors and advertisers.

