Firewall Analytics in DNS and SYN Flood Protection on Mikrotik CCR in the North Aceh District Government
Abstract
This study investigates the implementation of an analytical firewall on the Mikrotik Cloud Core Router (CCR) device for network protection against Domain Name System (DNS) and Synchronise Flood (SYN Flood attacks in the information technology infrastructure of the North Aceh Regency Government. DNS-based attacks and SYN Flood have demonstrated a significant disruptive capacity for the continuity of electronic public services, illustrating the urgency of robust security protocols on government infrastructure. The study implemented a quantitative-experimental approach, with methodological triangulation in empirical data acquisition through controlled attack simulations, firewall log analysis, and semi-structured interviews with technical personnel. Experiments are designed with variations in attack intensity to evaluate system resilience thresholds, while firewall log analysis facilitates the identification of anomalous patterns through detection algorithms. The analytics process applies parametric evaluation to temporal mitigation metrics, packet processing capacity, and operational implications on network performance, complemented by descriptive statistical analysis that explores data distribution and temporal trends. The results indicate the differential effectiveness of the specific firewall configuration against a specific attack typology, with an empirical determination of optimisation parameters for real-time mitigation. This research contributes to the corpus of knowledge regarding the security of government networks through the derivation of protective models that are adaptive to the operational characteristics of public infrastructure. The findings have substantive implications for cybersecurity policy formulation in the administrative context of local governments, with extensive significance for the implementation of network architectures that are resilient to volumetric attacks and protocol exploitation.
Keywords
References
W. Yunus and M. E. Lasulika, “Security system analysis against flood attacks using tcp, udp, and icmp protocols on mikrotik routers,” Int. J. Adv. Data Inf. Syst., vol. 3, no. 1, pp. 11–19, 2022.
M. Faisal, N. Nurdin, F. Fajriana, and Z. Fitri, “Information and Communication Technology Competencies Clustering For Students For Vocational High School Students Using K-Means Clustering Algorithm,” Int. J. Eng. Sci. Inf. Technol., vol. 2, no. 3, pp. 111–120, 2022, doi: 10.52088/ijesty.v2i3.318.
Y. Gautam, K. Sato, and B. P. Gautam, “Layer Based Firewall Application for Detection and Mitigation of Flooding Attack on SDN Network,” Muroran Institute of Technology, 2022.
D. Mustofa, A. Wirasto, A. Muttakin, D. N. Astrida, and D. I. S. Saputra, “Implementation of Load Balancing Per Connection Classifier on Mikrotik for Internet Services at Private Vocational Schools,” SAGA J. Technol. Inf. Syst., vol. 1, no. 3, pp. 104–113, 2023.
A. I. Haris, B. Riyanto, F. Surachman, and A. A. Ramadhan, “Analisis Pengamanan Jaringan Menggunakan Router Mikrotik dari Serangan DoS dan Pengaruhnya Terhadap Performansi,” Komputika J. Sist. Komput., vol. 11, no. 1, pp. 67–76, 2022.
S. Sapriadi, Y. Yunus, and R. W. Dari, “Prediction of the Number of Arrivals of Training Students with the Monte Carlo Method,” J. Inf. dan Teknol., vol. 4, pp. 1–6, 2022, doi: 10.37034/jidt.v4i1.168.
M. Fakhmi and L. M. Gultom, “Peningkatan Keamanan Router Mikrotik Terhadap Serangan Syn Flood dengan Menggunakan Firewall Raw (Studi kasus: Sekolah Menengah Kejuruan Negeri 3 Bengkalis),” in Seminar Nasional Industri dan Teknologi, 2021, pp. 260–277.
C. S. Silvia, M. Ikhsan, M. Safriani, and T. P. Gusmilia, “Efficiency Rainwater Harvesting at the Roof Campus Buildings,” Int. J. Eng. Sci. Inf. Technol., vol. 1, no. 3, 2021, doi: 10.52088/ijesty.v1i3.80.
D. Aprilianto, T. Fadila, and M. A. Muslim, “Sistem pencegahan UDP DNS Flood dengan filter Firewall pada router Mikrotik,” Techno. com, vol. 16, no. 2, pp. 114–119, 2017.
D. B. Sufardy, “Penggunaan PFSense dan Suricata Sebagai Alat Pendeteksi danPencegahan Serangan Keamanan Jaringan pada Web server,” 2024.
A. J. Alhasan and N. Surantha, “Evaluation of Data Center Network Security based on Next-Generation Firewall,” Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 9, 2021.
P. A. Khairunnisa, N. Annisa, J. Parhusip, and others, “Perancangan Sistem Keamanan Jaringan Berbasis Cybersecurity untuk Mitigasi Ancaman Siber pada Infrastruktur TI: Studi Kasus di Indonesia,” Tek. J. Ilmu Tek. Dan Inform., vol. 4, no. 2, pp. 9–16, 2024.
M. G. S. Putra, F. Falahah, and A. F. Santoso, “Analisis Dan Perancangan Arsitektur Enterprise Sistem Pemerintahan Berbasis Elektronik (Spbe) Pada Domain Data Di Lingkungan Badan Pengelolaan Keuangan Daerah (Bpkd),” eProceedings Eng., vol. 11, no. 4, 2024.
Y. S. Aritonang, P. Siagian, and S. Aryza, “Inovasi dan Tantangan dalam Pengembangan Sistem Transmisi Tenaga Listrik Berbasis Teknologi Tinggi Ultra High Voltage untuk Meningkatkan Keandalan dan Efisiensi Energi (Sebuah Tinjauan Literatur),” J. Inform. dan Tek. Elektro Terap., vol. 12, no. 3S1, 2024.
A. R. Rozzaqi and others, “Analisa Jaringan Kampus pada Lingkungan Kampus Multi-Lokasi Universitas PGRI Semarang,” JIPETIK J. Ilm. Penelit. Teknol. Inf. & Komput., vol. 4, no. 2, pp. 112–120, 2023.
F. Fitri, “Analisa Kinerja VPN dengan Layer 2 Tunneling Protocol dan IPSec Menggunakan Router Mikrotik (Studi Kasus RSU Bunda Margonda),” Sekolah Tinggi Teknologi Terpadu Nurul Fikri, 2023.
A. R. Rozzaqi, W. Wijayanto, and F. Amin, “IMPLEMENTASI USER MANAGER DENGAN DATA RESMI UNTUK MONITORING PENGGUNAAN JARINGAN DI LINGKUNGAN KAMPUS,” J. Ilm. Teknosains, vol. 10, no. 2/Nov, pp. 65–71, 2024.
N. Hafifah and A. Nurhayati, “Analisis Keamanan Jaringan LAN berdasarkan Log Data CCR (Cloud Core Router) pada Laboratorium SMK Telkom Jakarta,” eJournal Mahasiswwa Akad. Telkom Jakarta, 2020.
V. T. Aditya, “Manajemen Ancaman dan Keamanan Jaringan melalui Penggunaan Firewall dengan Mikrotik pada PT Dinamika Mediakom,” Universitas Islam Indonesia, 2024.
A. Martani, S. Sukirman, and J. Junaedy, “Jaringan komputer dengan mikrotik.” PT MAFY MEDIA LITERASI INDONESIA, 2024.
H. Ulfa, A. I. Basuki, G. M. Suranegara, and A. Fauzi, “DDoS Protection System for SDN Network Based on Multi Controller and Load Balancer,” SISTEMASI, vol. 13, no. 2, pp. 555–571, 2024.
M. K. Zein, M. Is’ ad, A. S. Wardhana, and M. Pradana, “Implementasi Smart Home Berbasis ESP32 dan Integrasi Protokol MQTT, Node-RED serta Google Assistant melalui NORA,” J. Instrum. Hardw., vol. 2, no. 2, pp. 29–37, 2024.
H. P. Fitrian, F. Anisa, M. Agustina, N. Masitoh, and A. Gunawan, “OPTIMALISASI KONEKTIVITAS JARINGAN KAMPUS MELALUI SIMULASI ARP DAN DHCP MENGGUNAKAN CISCO PACKET TRACER,” JATI (Jurnal Mhs. Tek. Inform., vol. 9, no. 2, pp. 1978–1986, 2025.
DOI: https://doi.org/10.52088/ijesty.v5i4.1791
Refbacks
- There are currently no refbacks.
Copyright (c) 2026 Nanda Imanda, Dahlan Abdullah, Fajriana Fajriana, Nurdin Nurdin, Munirul Ula




























