SlideShare a Scribd company logo
Analisis Implementasi Modsecurity dan
Reverse Proxy
Untuk Pencegahan Serangan Keamanan
DDoS pada Web Server
Ayu Rosyida Zain1, Iik Muhamad Malik Matin 2 dan Kevin Kautsar 3
Teknik Informatika dan Komputer, Teknik Multimedia dan Jaringan,
Politeknik Negeri Jakarta
SNIV, 7 Juni 2023
Latar Belakang
01 02 03
04 05
TABLE OF CONTENTS
Metode Rancangan Sistem
Pembahasan Hasil Kesimpulan
Background
01
● Indonesia menempati peringkat ke-6 terbesar di dunia dalam hal
jumlah pengguna internet di mana pada tahun 2017 diperkirakan
netter Indonesia mencapai 112 juta orang (Pranoto, et al., 2018).
● peningkatan pengguna website dapat meningkatkan pula ancaman
keamanan bagi penyedia dan pengguna layanan website.
● serangan DDoS naik tiga kali lipat selama pandemi Covid-19.
(Yulianso, 2021)
● ModSecurity dapat diimplementasikan dengan berbagai aturan
sesuai kebutuhan sehingga serangan dapat dikenali dan dicegah
sesuai rule yang telah ditetapkan, termauk didalamnya rule dalam
pencegahan serangan keamanan DDoS.
● Reverse proxy mengatur agar sebuah server dapat berperan
menjadi perantara antara klien dengan server utama. Sehingga
dengan menerapkan metode ini pada server maka komunikasi
antara klien dan server utama tidak perlu terjadi dan dapat
meningkatkan keamanan klien dari serangan termasuk DDoS
attack.
Latar Belakang
Metode Penelitian
02
Model yang digunakan pada penelitian ini
berupa rancang bangun sistem yang
mengintegrasikan dua metode
pengamanan yaitu ModSecurity dan
Reverse Proxy pada web server dan
melihat hasil kinerjanya terhadap serangan
DDoS. Data Pengujian yang didapatkan
dalam penelitian ini berupa data kuantitatif
beberapa scenario uji yang dapat
merepresentasikan kemampuan
Modsecurity dan reverse proxy dalam
menangkal serangan DDoS.
Rancangan Sistem
03
Pada penelitian ini digunakan alat:
1. Laptop Aspire E5-475G (Intel(R) CoreTM i5-
7200U) RAM: 8 GB,
2. Oracle VM VirtualBox Version 6.1.18
r142142 (Qt5.6.2),
3. Ubuntu 18.04.02,
4. NGINX 1.20.0 yang berperan sebagai
reverse proxy,
5. ModSecurity v2.x,
6. Apache2 yang berperan sebagai web
server utama,
7. Attacker (Linux).
 Apache2 berperan sebagai Web Server
 NGINX berperan sebagai reversed proxy
 NGINX telah terpasang rule ModSecurity
 Serangan akan dilakukan oleh komputer “Attacker”
 Serangan akan dilakukan menggunakan tiga tools,
yaitu file bash script, GoldenEye, dan HULK
 Semua perangkat dalam keadaan aktif ketika
dilakukan penyerangan
 Semua perangkat terhubung dalam jaringan LAN
yang sama
Pembahasan Hasil
04
Pengujian
Skenario Tools
Pengujian ini dilakukan untuk
mengetahui efektivitas kinerja
layanan ModSecurity dan reverse
proxy untuk pencegahan DDoS attack
pada server web. Pengujian ini
menghitung dan memiliki hasil akhir
berupa perbandingan antara
serangan yang dilakukan sebelum
WAF dan reverse proxy diaktifkan dan
dimatikan.
penelitian kali ini akan dilakukan
serangan DDoS berupa serangan
berbasis bandwith dengan
menggunakan tiga tools berbeda,
yaitu file bash script, GoldenEye, dan
HULK. Serangan ini dilakukan dengan
cara mengirim pesan data sampah
secara masal ke url target bertujuan
untuk menyebabkan overload yang
juga mengakibatkan berkurangnya
bandwidth jaringan yang tersedia
atau berkurangnya sumber daya
perangkat jaringan.
Hasil Uji
Data Efektivitas Kinerja ModSecurity terhadap
Serangan DDoS File Bash Script, GoldenEye, dan HULK
File Bash Script Serangan DDoS
Hasil Uji
Data Efektivitas Kinerja ModSecurity terhadap
Serangan DDoS File Bash Script
ModSecurity
Mati
ModSecurity
Menyala
Hasil Uji
Data Efektivitas Kinerja ModSecurity terhadap
Serangan DDoS GoldenEye
ModSecurity
Mati
ModSecurity
Menyala
Hasil Uji
Data Efektivitas Kinerja ModSecurity terhadap
Serangan DDoS HULK
ModSecurity
Mati
ModSecurity
Menyala
Hasil Uji
Data Efektivitas Kinerja ModSecurity terhadap
Serangan DDoS File Bash Script
Serangan
Keadaan WAF
ModSecurity
Mati
ModSecurity
Menyala
File Bash
Script
Berhasil Ditolak
GoldenEye Berhasil Ditolak
HULK Berhasil Ditolak
Hasil Uji
Data Efektivitas Kinerja Reverse Proxy terhadap
Serangan DDoS File Bash Script, GoldenEye, dan HULK
Sebelum
menggunakan
reverse proxy
(ex: Bash
script)
Setelah
menggunakan
reverse proxy (ex:
Bash Script)
Hasil Uji
Data Efektivitas Kinerja Reverse Proxy terhadap
Serangan DDoS File Bash Script, GoldenEye, dan HULK
Serangan
Keadaan
Waktu Yang Dibutuhkan
Reverse Proxy
Mati Menyala Mati Menyala
File Bash
Script
Berhasil Berhasil 47,987654ms 100,114344ms
GoldenEye Berhasil Berhasil 70,255061ms 93,292487ms
HULK Berhasil Berhasil 111,971944ms 196,183226ms
Rata-rata waktu 76,73821ms 129,8633ms
1 2 3
KESIMPULAN
Ketiga serangan tidak dapat
ditolak hanya dengan
pengimplementasian reverse
proxy. Namun, dengan jarak
tempuh yang lebih jauh dari
komputer penyerang ke server
utama waktu yang dibutuhkan
untuk sebuah serangan
mencapai tujuan menjadi lebih
lama 53,12509 ms sehingga
dapat menghambat laju kerja
serangan,
100% keberhasilan WAF
ModSecurity dalam menagkal
serangan DDoS di Web Server
Dalam pengujian 3 serangan
semua dapat ditolak dengan
integrasi reverse proxy dan
ModSecurity Sehingga dapat
dikatakan dengan
pengimplementasian keduanya
sebuah server memiliki dua
perlindungan sekaligus.
DAFTAR PUSTAKA
● Fitri, C. N., (2017). Implementasi Squid Sebagai Reverse Proxy Untuk Keperluan
Backup Server. Jurnal Manajemen Informasi, 8(BACKUP SERVER), p. 30.
● Hamzah, A., Ismail, S. J. I. & Meisaroh, L., (2019). Implementasi Sistem Monitoring
Jaringan Menggunakan Zabbix dan Web Web Application Firewall di PT PLN (Persero)
Transmisi Jawa Bagian Tengah. e-Proceeding of Applied Science, 5(Vol.5, No.3
Desember 2019), p. 3.
● Josi, A., (2017). Penerapan Metode Prototiping Dalam Pembangunan Website Desa
(Studi Kasus Desa Sugihan Kecamatan Rambang), Prabumulih: Komputerisasi
Akuntansi, Stmik Prabumulih, Prabumulih.
● Maumela, T., Nelwamondo, F. & Marwala, T., (2020). Introducing Ulimisana
Optimization Algorithm Based on Ubuntu Philosophy. IEEE Access School of Electrical
and Electronic Engineering, University of Johannesburg, Johannesburg, South Africa, p.
179245.
● Muzaki, R. A., Briliyant, O. C. & Hasditama, M. A., (2020). Improving Security of Web-
Based Application Using ModSecurity and Reverse Proxy in Web Application Firewall.
IEEE, Issue Web Security, p. 90.
● Nurkamiden, M. R., Najoan, M. E. I. & Putro, M. D., (2017). Rancang Bangun Sistem
Pengendalian Perangkat Listrik Berbasis Web Server Menggunakan Mini PC Raspberry
Pi Studi Kasus Gedung Fakultas Teknik Universitas Sam Ratulangi. E-Journal Teknik
Informatika, 11(Sistem Pengendalian Perangkat Listrik Berbasis Web), p. 3.
● Siregar, M. R., (2018). Membangun Web Application Firewall Dengan Filter
Modsecurity Sebagai Upaya Pengamanan Website. [Online] Available at:
https://eprints.akakom.ac.id/8085/1/1_175410054_HALAMAN_DEPAN.pdf [Accessed
5 March 2023].
● Sitohang, H. T., (2018). Sistem Informasi Pengagendaan Surat Berbasis Web Pada
Pengadilan Tinggi Medan. Journal Of Informatic Pelita Nusantara, 3(Vol. 3 No. 1 (2018):
Journal Of Informatic Pelita Nusantara), p. 8.
● Somani, G. et al., (2017). DDoS Attacks in Cloud Computing: Issues, Taxonomy, and
Future Directions. p. 1.
● Tao, Y. & Chen, G., (2016). An Extensible Universal Reverse Proxy Architecture.
International Conference on Network and Information Systems for Komputers, Issue
Reverse Proxy, p. 8.
● Warman, I. & Hidayat, R., (2016). Perancangan Transparent Proxy Server Clearos.
Rahmat Hidayat, p. 90.
● Widianto, S. R. & Azzam, I. A., (2018). Analisis Upaya Peretasan Web Application
Firewall Dan Notifikasi Serangan Menggunakan Bot Telegram Pada Layanan Web
Server. Elektra, 3(Upaya Peretasan Web Application Firewall), p. 19.
● Yari, I. A., Abdullahi, B. & Adeshina, S. A., (2019). Towards a Framework of
Configuring and Evaluating ModSecurity WAF on Tomcat and Apache Web
Servers. 15th International Conference on Electronics Komputer and Computation,
Issue Web Server Security, p. 1.
● Yasin, A. & Mohidin, I., (2018). Dampak Serangan Ddos Pada Software Based
Openfow Switch Di Perangkat Hg553. Jtech, 6(Dampak Serangan Ddos), pp. 72-
73.
● Yuslianson, (2021). LIPUTAN 6. [Online] Available at:
https://www.liputan6.com/tekno/read/4252904/serangan-ddos-naik-tiga-kali-lipat-
selama-pandemi-covid-19 [Accessed 13 May 2023].
● Muzaki, Rizki Agung Muzaki. Briliyant, Obrina Candra., (2020). Security of Web-
Based Application Using ModSecurity and Reverse Proxy in Web Application
Firewall. International Workshop on Big Data and Information Security (IWBIS).
IEEE
● Sobola, Timilehin David. Zavarsky, Pavol. Butakov, Sergey. 2020. Experimental
Study of ModSecurity Web Application Firewalls. IEEE 6th Intl Conference on Big
Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High
Performance and Smart Computing, (HPSC) and IEEE Intl Conference on
Intelligent Data and Security (IDS). IEEE.
● Mukhtar, Basem Ibrahim. Azer, Marianne A. 2020. Evaluating the Modsecurity
Web Application Firewall Against SQL Injection Attacks. 15th International
Conference on Computer Engineering and Systems (ICCES). IEEE.
● D. Arnaldy and T. S. Hati. 2020. Performance Analysis of Reverse Proxy and Web
Application Firewall with Telegram Bot as Attack Notification On Web Server. 3rd
International Conference on Computer and Informatics Engineering (IC2IE),
Yogyakarta, Indonesia, 2020, pp. 455-459, doi:
10.1109/IC2IE50715.2020.9274592.
CREDITS: This presentation template was created by
Slidesgo, including icons by Flaticon and infographics &
images by Freepik
THANKS!
Does anyone have any questions?
Ayu.rosyidazain@tik.pnj.ac.id
This Research Sponsored by P3M
Politeknik Negeri Jakarta
Mars
Despite being red, Mars is actually a
cold place. It's full of iron oxide dust,
which gives the planet its reddish
cast, and it’s made of basalt
Venus has a beautiful name and is the
second planet from the Sun. It’s
terribly hot, even hotter than
Mercury. It has a toxic atmosphere
FOUR IDEAS
Jupiter
Jupiter is a gas giant and the biggest
planet in the Solar System. It's the
fourth-brightest object in the night
sky. It was named after a Roman god
Saturn is a gas giant and has several
rings. It's composed mostly of
hydrogen and helium. It’s the sixth
planet from the Sun
Venus
Saturn
Venus
Despite being red, Mars is
actually a cold place. It's full of
iron oxide dust, which gives the
planet its reddish cast
Earth is the third planet from
the Sun and the only one that
harbors life in the Solar System.
We all live on this planet
Venus has a beautiful name
and is the second planet from
the Sun. It’s terribly hot, even
hotter than Mercury
Mars
SIX IDEAS
Neptune Saturn
Neptune is the farthest planet
from the Sun. It's also the
fourth-largest planet by
diameter in the Solar System
Saturn is a gas giant and has
several rings. It's composed of
hydrogen and helium. It’s the
sixth planet from the Sun
Jupiter is a gas giant and the
biggest planet in the Solar
System. It's the fourth-
brightest object in the night sky
Earth Jupiter
The Sun’s mass compared to Earth’s
Distance between Earth and the Moon
123
Jupiter's rotation period
123
123
123,123
Big numbers catch your
audience’s attention
THIS IS A CHART
This is the planet
Venus
Venus has a beautiful name and is the
second planet from the Sun. It’s
terribly hot, even hotter than
Mercury, and its atmosphere is
extremely poisonous. It’s the second-
brightest natural object in the night
sky after the Moon
60% 30% 90%
Follow the link in the graph to modify its data and then paste the new one here. For more info, click here
TABLE
Team Team A Team B Team C Team D Team E
Mercury XX XX XX XX XX
Mars XX XX XX XX XX
Saturn XX XX XX XX XX
Venus XX XX XX XX XX
Jupiter XX XX XX XX XX
Earth XX XX XX XX XX
THIS IS A
MOCKUP OF
OUR PRODUCT
You can replace the image on the screen with
your own work. Just right-click on it and
select “Replace image”
1. Mercury is very small
2. Mars is a red planet
3. Venus has a nice name
01
02
03
BUYER PERSONA INFOGRAPHIC
Bio
Despite being red, Mars is a
cold place, not hot. It’s full of
iron oxide dust, giving the
planet its reddish cast
Name
Age and occupation
“This is a quote, words
full of wisdom that
can make the reader
get inspired.”
Personality
● Mercury is the closest
planet to the Sun and the
smallest one
● Venus has a beautiful
name and is the second
planet from the Sun
● Despite being red, Mars is
actually a cold place. It’s
full of iron oxide dust
Pain points
Despite being red, Mars is a
cold place, not hot. It’s full of
iron oxide dust, giving the
planet its reddish cast
Motivations
Mercury is very small
Mars is a red planet
Venus has a nice name
1
2
3
ROADMAP INFOGRAPHIC
Initiative Objective Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Venus is very hot
Venus has a beautiful name and is
the second planet from the Sun
Earth has life
Earth is the beautiful planet on
which humans live
Mars is very cold
Despite being red, Mars is actually
a cold place
Jupiter is a gas giant
Jupiter is the biggest planet in the
Solar System
Saturn has rings
Saturn is a gas giant and has
several rings
Mercury is small
Mercury is the closest planet to the
Sun and the smallest one
MARKET SIZE INFOGRAPHIC
Jupiter
Jupiter is a gas giant and the
biggest planet in the Solar
System. It's the fourth-brightest
object in the night sky
Mars
Despite being red, Mars is
actually a cold place. It's full of
iron oxide dust, which gives the
planet its reddish cast
Saturn
Saturn is a gas giant and has
several rings. It's composed
mostly of hydrogen and helium.
It was named after a Roman god
$5M
$20M
$100M
SOCIAL MEDIA STATS
Worldwide reach
Country 1
users
Country 2
users
XXX Billion XXX Billion XXX billion
Users
worldwide
Xh xmin
Average time
spent
XX
Number of
platforms used
Platforms with most users
Follow the link in the graph to modify its data and then paste the new one here. For more info, click here
CASE STUDIES
Approach
● Mercury is the closest planet to the
sun and the smallest one
● Venus has a beautiful name and is the
second planet from the Sun
● Despite being red, Mars is actually a
cold place. It’s full of iron oxide dust
Results
Increase in
page views
Increase in
sales
Increase in
clicks
23% 80% 10%
Key takeaway 1
Key takeaway 2
Earth is the planet on
which we all live
Earth is the only planet
that harbors life
Campaign objective
Venus is very hot
Here’s an assortment of alternative resources whose style fits the one of this template:
Photos
● Medium shot man working on laptop
● High angle man working on laptop I
● High angle man working on laptop II
● Person working on animation project
● Side view of a male technician using digital tablet
● Man's hand typing on laptop over the wooden desk
● Crop man browsing laptop
● Elegant young girl holding a laptop
● Brunette business woman using laptop
● High angle man working on a blank laptop
ALTERNATIVE RESOURCES
Instructions for use
If you have a free account, in order to use this template, you must credit Slidesgo by keeping the Thanks slide. Please
refer to the next slide to read the instructions for premium users.
As a Free user, you are allowed to:
● Modify this template.
● Use it for both personal and commercial projects.
You are not allowed to:
● Sublicense, sell or rent any of Slidesgo Content (or a modified version of Slidesgo Content).
● Distribute Slidesgo Content unless it has been expressly authorized by Slidesgo.
● Include Slidesgo Content in an online or offline database or file.
● Offer Slidesgo templates (or modified versions of Slidesgo templates) for download.
● Acquire the copyright of Slidesgo Content.
For more information about editing slides, please read our FAQs or visit our blog:
https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school
As a Premium user, you can use this template without attributing Slidesgo or keeping the "Thanks" slide.
You are allowed to:
● Modify this template.
● Use it for both personal and commercial purposes.
● Hide or delete the “Thanks” slide and the mention to Slidesgo in the credits.
● Share this template in an editable format with people who are not part of your team.
You are not allowed to:
● Sublicense, sell or rent this Slidesgo Template (or a modified version of this Slidesgo Template).
● Distribute this Slidesgo Template (or a modified version of this Slidesgo Template) or include it in a database or in
any other product or service that offers downloadable images, icons or presentations that may be subject to
distribution or resale.
● Use any of the elements that are part of this Slidesgo Template in an isolated and separated way from this
Template.
● Register any of the elements that are part of this template as a trademark or logo, or register it as a work in an
intellectual property registry or similar.
For more information about editing slides, please read our FAQs or visit our blog:
https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school
Instructions for use (premium users)
This presentation has been made using the following fonts:
Noto Sans
(https://fonts.google.com/noto/specimen/Noto+Sans)
Fonts & colors used
#191919 #ebebeb #897970 #5f6057 #9d9d9c
Create your Story with our illustrated concepts. Choose the style you like the most, edit its
colors, pick the background and layers you want to show and bring them to life with the
animator panel! It will boost your presentation. Check out how it works.
Storyset
Pana Amico Bro Rafiki Cuate
You can easily resize these resources without losing quality. To change the color, just ungroup the resource and click
on the object you want to change. Then, click on the paint bucket and select the color you want. Group the resource again
when you’re done. You can also look for more infographics on Slidesgo.
Use our editable graphic resources...
JANUARY FEBRUARY MARCH APRIL
PHASE 1
Task 1
Task 2
JANUARY FEBRUARY MARCH APRIL MAY JUNE
PHASE 1
PHASE 2
Task 1
Task 2
Task 1
Task 2
You can resize these icons without losing quality.
You can change the stroke and fill color; just select the icon and click on the paint bucket/pen.
In Google Slides, you can also use Flaticon’s extension, allowing you to customize and add even more icons.
...and our sets of editable icons
Educational Icons Medical Icons
Business Icons Teamwork Icons
Help & Support Icons Avatar Icons
Creative Process Icons Performing Arts Icons
Nature Icons
SEO & Marketing Icons
ppt SNIV.pptx

More Related Content

Similar to ppt SNIV.pptx

07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed
IAESIJEECS
 
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
IJNSA Journal
 
V cnsms
V cnsmsV cnsms
An intelligent system to detect slow denial of service attacks in software-de...
An intelligent system to detect slow denial of service attacks in software-de...An intelligent system to detect slow denial of service attacks in software-de...
An intelligent system to detect slow denial of service attacks in software-de...
IJECEIAES
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
IJCI JOURNAL
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
ijcsit
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
AIRCC Publishing Corporation
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
Manimaran A
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
Claire Webber
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Deepak Bagga
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...
CSCJournals
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
IJECEIAES
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
IJNSA Journal
 
Double guard: Detecting Interruptions in N- Tier Web Applications
Double guard: Detecting Interruptions in N- Tier Web ApplicationsDouble guard: Detecting Interruptions in N- Tier Web Applications
Double guard: Detecting Interruptions in N- Tier Web Applications
IJMER
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
IJECEIAES
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and Techniques
IJCSIS Research Publications
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
IJNSA Journal
 

Similar to ppt SNIV.pptx (20)

07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed07 20251 latest trends, challenges ed
07 20251 latest trends, challenges ed
 
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION AND PREVENTION MODEL FOR IOTBA...
 
V cnsms
V cnsmsV cnsms
V cnsms
 
An intelligent system to detect slow denial of service attacks in software-de...
An intelligent system to detect slow denial of service attacks in software-de...An intelligent system to detect slow denial of service attacks in software-de...
An intelligent system to detect slow denial of service attacks in software-de...
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
 
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
EFFECTIVE MALWARE DETECTION APPROACH BASED ON DEEP LEARNING IN CYBER-PHYSICAL...
 
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical...
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...A Systematic Literature Review On Cloud Computing Security  Threats And Mitig...
A Systematic Literature Review On Cloud Computing Security Threats And Mitig...
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...An Investigation of Using Privilege Level System to Restrict Employers for Us...
An Investigation of Using Privilege Level System to Restrict Employers for Us...
 
Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...Encountering distributed denial of service attack utilizing federated softwar...
Encountering distributed denial of service attack utilizing federated softwar...
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Double guard: Detecting Interruptions in N- Tier Web Applications
Double guard: Detecting Interruptions in N- Tier Web ApplicationsDouble guard: Detecting Interruptions in N- Tier Web Applications
Double guard: Detecting Interruptions in N- Tier Web Applications
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
Preemptive modelling towards classifying vulnerability of DDoS attack in SDN ...
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and Techniques
 
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
XDOSER, A BENCHMARKING TOOL FOR SYSTEM LOAD MEASUREMENT USING DENIAL OF SERVI...
 

More from AyuRosyidaZain2

Tugas Kelompok 4_Memori Komputer_TMJ-CCIT 1A.pdf
Tugas Kelompok 4_Memori Komputer_TMJ-CCIT 1A.pdfTugas Kelompok 4_Memori Komputer_TMJ-CCIT 1A.pdf
Tugas Kelompok 4_Memori Komputer_TMJ-CCIT 1A.pdf
AyuRosyidaZain2
 
CH10-COA10e.pptx
CH10-COA10e.pptxCH10-COA10e.pptx
CH10-COA10e.pptx
AyuRosyidaZain2
 
03.pptx
03.pptx03.pptx
MATERI PKN KERAGAMAAN.pptx
MATERI PKN KERAGAMAAN.pptxMATERI PKN KERAGAMAAN.pptx
MATERI PKN KERAGAMAAN.pptx
AyuRosyidaZain2
 
Sistem Informasi PBL Polibatam.pptx
Sistem Informasi PBL Polibatam.pptxSistem Informasi PBL Polibatam.pptx
Sistem Informasi PBL Polibatam.pptx
AyuRosyidaZain2
 
pengantarmetodologipenelitian6h-220212135857.pdf
pengantarmetodologipenelitian6h-220212135857.pdfpengantarmetodologipenelitian6h-220212135857.pdf
pengantarmetodologipenelitian6h-220212135857.pdf
AyuRosyidaZain2
 
14279605.ppt
14279605.ppt14279605.ppt
14279605.ppt
AyuRosyidaZain2
 
PPT lagu B. SUNDA dan SBdP SUMATIF.pdf
PPT  lagu B. SUNDA dan SBdP SUMATIF.pdfPPT  lagu B. SUNDA dan SBdP SUMATIF.pdf
PPT lagu B. SUNDA dan SBdP SUMATIF.pdf
AyuRosyidaZain2
 
materi narsum 2.pptx
materi narsum 2.pptxmateri narsum 2.pptx
materi narsum 2.pptx
AyuRosyidaZain2
 

More from AyuRosyidaZain2 (9)

Tugas Kelompok 4_Memori Komputer_TMJ-CCIT 1A.pdf
Tugas Kelompok 4_Memori Komputer_TMJ-CCIT 1A.pdfTugas Kelompok 4_Memori Komputer_TMJ-CCIT 1A.pdf
Tugas Kelompok 4_Memori Komputer_TMJ-CCIT 1A.pdf
 
CH10-COA10e.pptx
CH10-COA10e.pptxCH10-COA10e.pptx
CH10-COA10e.pptx
 
03.pptx
03.pptx03.pptx
03.pptx
 
MATERI PKN KERAGAMAAN.pptx
MATERI PKN KERAGAMAAN.pptxMATERI PKN KERAGAMAAN.pptx
MATERI PKN KERAGAMAAN.pptx
 
Sistem Informasi PBL Polibatam.pptx
Sistem Informasi PBL Polibatam.pptxSistem Informasi PBL Polibatam.pptx
Sistem Informasi PBL Polibatam.pptx
 
pengantarmetodologipenelitian6h-220212135857.pdf
pengantarmetodologipenelitian6h-220212135857.pdfpengantarmetodologipenelitian6h-220212135857.pdf
pengantarmetodologipenelitian6h-220212135857.pdf
 
14279605.ppt
14279605.ppt14279605.ppt
14279605.ppt
 
PPT lagu B. SUNDA dan SBdP SUMATIF.pdf
PPT  lagu B. SUNDA dan SBdP SUMATIF.pdfPPT  lagu B. SUNDA dan SBdP SUMATIF.pdf
PPT lagu B. SUNDA dan SBdP SUMATIF.pdf
 
materi narsum 2.pptx
materi narsum 2.pptxmateri narsum 2.pptx
materi narsum 2.pptx
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Sourabh Kumar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
ssuserbdd3e8
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
Special education needs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
ricssacare
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
Vivekanand Anglo Vedic Academy
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

ppt SNIV.pptx

  • 1. Analisis Implementasi Modsecurity dan Reverse Proxy Untuk Pencegahan Serangan Keamanan DDoS pada Web Server Ayu Rosyida Zain1, Iik Muhamad Malik Matin 2 dan Kevin Kautsar 3 Teknik Informatika dan Komputer, Teknik Multimedia dan Jaringan, Politeknik Negeri Jakarta SNIV, 7 Juni 2023
  • 2. Latar Belakang 01 02 03 04 05 TABLE OF CONTENTS Metode Rancangan Sistem Pembahasan Hasil Kesimpulan
  • 4. ● Indonesia menempati peringkat ke-6 terbesar di dunia dalam hal jumlah pengguna internet di mana pada tahun 2017 diperkirakan netter Indonesia mencapai 112 juta orang (Pranoto, et al., 2018). ● peningkatan pengguna website dapat meningkatkan pula ancaman keamanan bagi penyedia dan pengguna layanan website. ● serangan DDoS naik tiga kali lipat selama pandemi Covid-19. (Yulianso, 2021) ● ModSecurity dapat diimplementasikan dengan berbagai aturan sesuai kebutuhan sehingga serangan dapat dikenali dan dicegah sesuai rule yang telah ditetapkan, termauk didalamnya rule dalam pencegahan serangan keamanan DDoS. ● Reverse proxy mengatur agar sebuah server dapat berperan menjadi perantara antara klien dengan server utama. Sehingga dengan menerapkan metode ini pada server maka komunikasi antara klien dan server utama tidak perlu terjadi dan dapat meningkatkan keamanan klien dari serangan termasuk DDoS attack. Latar Belakang
  • 6. Model yang digunakan pada penelitian ini berupa rancang bangun sistem yang mengintegrasikan dua metode pengamanan yaitu ModSecurity dan Reverse Proxy pada web server dan melihat hasil kinerjanya terhadap serangan DDoS. Data Pengujian yang didapatkan dalam penelitian ini berupa data kuantitatif beberapa scenario uji yang dapat merepresentasikan kemampuan Modsecurity dan reverse proxy dalam menangkal serangan DDoS.
  • 8. Pada penelitian ini digunakan alat: 1. Laptop Aspire E5-475G (Intel(R) CoreTM i5- 7200U) RAM: 8 GB, 2. Oracle VM VirtualBox Version 6.1.18 r142142 (Qt5.6.2), 3. Ubuntu 18.04.02, 4. NGINX 1.20.0 yang berperan sebagai reverse proxy, 5. ModSecurity v2.x, 6. Apache2 yang berperan sebagai web server utama, 7. Attacker (Linux).  Apache2 berperan sebagai Web Server  NGINX berperan sebagai reversed proxy  NGINX telah terpasang rule ModSecurity  Serangan akan dilakukan oleh komputer “Attacker”  Serangan akan dilakukan menggunakan tiga tools, yaitu file bash script, GoldenEye, dan HULK  Semua perangkat dalam keadaan aktif ketika dilakukan penyerangan  Semua perangkat terhubung dalam jaringan LAN yang sama
  • 10. Pengujian Skenario Tools Pengujian ini dilakukan untuk mengetahui efektivitas kinerja layanan ModSecurity dan reverse proxy untuk pencegahan DDoS attack pada server web. Pengujian ini menghitung dan memiliki hasil akhir berupa perbandingan antara serangan yang dilakukan sebelum WAF dan reverse proxy diaktifkan dan dimatikan. penelitian kali ini akan dilakukan serangan DDoS berupa serangan berbasis bandwith dengan menggunakan tiga tools berbeda, yaitu file bash script, GoldenEye, dan HULK. Serangan ini dilakukan dengan cara mengirim pesan data sampah secara masal ke url target bertujuan untuk menyebabkan overload yang juga mengakibatkan berkurangnya bandwidth jaringan yang tersedia atau berkurangnya sumber daya perangkat jaringan.
  • 11. Hasil Uji Data Efektivitas Kinerja ModSecurity terhadap Serangan DDoS File Bash Script, GoldenEye, dan HULK File Bash Script Serangan DDoS
  • 12. Hasil Uji Data Efektivitas Kinerja ModSecurity terhadap Serangan DDoS File Bash Script ModSecurity Mati ModSecurity Menyala
  • 13. Hasil Uji Data Efektivitas Kinerja ModSecurity terhadap Serangan DDoS GoldenEye ModSecurity Mati ModSecurity Menyala
  • 14. Hasil Uji Data Efektivitas Kinerja ModSecurity terhadap Serangan DDoS HULK ModSecurity Mati ModSecurity Menyala
  • 15. Hasil Uji Data Efektivitas Kinerja ModSecurity terhadap Serangan DDoS File Bash Script Serangan Keadaan WAF ModSecurity Mati ModSecurity Menyala File Bash Script Berhasil Ditolak GoldenEye Berhasil Ditolak HULK Berhasil Ditolak
  • 16. Hasil Uji Data Efektivitas Kinerja Reverse Proxy terhadap Serangan DDoS File Bash Script, GoldenEye, dan HULK Sebelum menggunakan reverse proxy (ex: Bash script) Setelah menggunakan reverse proxy (ex: Bash Script)
  • 17. Hasil Uji Data Efektivitas Kinerja Reverse Proxy terhadap Serangan DDoS File Bash Script, GoldenEye, dan HULK Serangan Keadaan Waktu Yang Dibutuhkan Reverse Proxy Mati Menyala Mati Menyala File Bash Script Berhasil Berhasil 47,987654ms 100,114344ms GoldenEye Berhasil Berhasil 70,255061ms 93,292487ms HULK Berhasil Berhasil 111,971944ms 196,183226ms Rata-rata waktu 76,73821ms 129,8633ms
  • 18. 1 2 3 KESIMPULAN Ketiga serangan tidak dapat ditolak hanya dengan pengimplementasian reverse proxy. Namun, dengan jarak tempuh yang lebih jauh dari komputer penyerang ke server utama waktu yang dibutuhkan untuk sebuah serangan mencapai tujuan menjadi lebih lama 53,12509 ms sehingga dapat menghambat laju kerja serangan, 100% keberhasilan WAF ModSecurity dalam menagkal serangan DDoS di Web Server Dalam pengujian 3 serangan semua dapat ditolak dengan integrasi reverse proxy dan ModSecurity Sehingga dapat dikatakan dengan pengimplementasian keduanya sebuah server memiliki dua perlindungan sekaligus.
  • 19. DAFTAR PUSTAKA ● Fitri, C. N., (2017). Implementasi Squid Sebagai Reverse Proxy Untuk Keperluan Backup Server. Jurnal Manajemen Informasi, 8(BACKUP SERVER), p. 30. ● Hamzah, A., Ismail, S. J. I. & Meisaroh, L., (2019). Implementasi Sistem Monitoring Jaringan Menggunakan Zabbix dan Web Web Application Firewall di PT PLN (Persero) Transmisi Jawa Bagian Tengah. e-Proceeding of Applied Science, 5(Vol.5, No.3 Desember 2019), p. 3. ● Josi, A., (2017). Penerapan Metode Prototiping Dalam Pembangunan Website Desa (Studi Kasus Desa Sugihan Kecamatan Rambang), Prabumulih: Komputerisasi Akuntansi, Stmik Prabumulih, Prabumulih. ● Maumela, T., Nelwamondo, F. & Marwala, T., (2020). Introducing Ulimisana Optimization Algorithm Based on Ubuntu Philosophy. IEEE Access School of Electrical and Electronic Engineering, University of Johannesburg, Johannesburg, South Africa, p. 179245. ● Muzaki, R. A., Briliyant, O. C. & Hasditama, M. A., (2020). Improving Security of Web- Based Application Using ModSecurity and Reverse Proxy in Web Application Firewall. IEEE, Issue Web Security, p. 90. ● Nurkamiden, M. R., Najoan, M. E. I. & Putro, M. D., (2017). Rancang Bangun Sistem Pengendalian Perangkat Listrik Berbasis Web Server Menggunakan Mini PC Raspberry Pi Studi Kasus Gedung Fakultas Teknik Universitas Sam Ratulangi. E-Journal Teknik Informatika, 11(Sistem Pengendalian Perangkat Listrik Berbasis Web), p. 3. ● Siregar, M. R., (2018). Membangun Web Application Firewall Dengan Filter Modsecurity Sebagai Upaya Pengamanan Website. [Online] Available at: https://eprints.akakom.ac.id/8085/1/1_175410054_HALAMAN_DEPAN.pdf [Accessed 5 March 2023]. ● Sitohang, H. T., (2018). Sistem Informasi Pengagendaan Surat Berbasis Web Pada Pengadilan Tinggi Medan. Journal Of Informatic Pelita Nusantara, 3(Vol. 3 No. 1 (2018): Journal Of Informatic Pelita Nusantara), p. 8. ● Somani, G. et al., (2017). DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions. p. 1. ● Tao, Y. & Chen, G., (2016). An Extensible Universal Reverse Proxy Architecture. International Conference on Network and Information Systems for Komputers, Issue Reverse Proxy, p. 8. ● Warman, I. & Hidayat, R., (2016). Perancangan Transparent Proxy Server Clearos. Rahmat Hidayat, p. 90. ● Widianto, S. R. & Azzam, I. A., (2018). Analisis Upaya Peretasan Web Application Firewall Dan Notifikasi Serangan Menggunakan Bot Telegram Pada Layanan Web Server. Elektra, 3(Upaya Peretasan Web Application Firewall), p. 19. ● Yari, I. A., Abdullahi, B. & Adeshina, S. A., (2019). Towards a Framework of Configuring and Evaluating ModSecurity WAF on Tomcat and Apache Web Servers. 15th International Conference on Electronics Komputer and Computation, Issue Web Server Security, p. 1. ● Yasin, A. & Mohidin, I., (2018). Dampak Serangan Ddos Pada Software Based Openfow Switch Di Perangkat Hg553. Jtech, 6(Dampak Serangan Ddos), pp. 72- 73. ● Yuslianson, (2021). LIPUTAN 6. [Online] Available at: https://www.liputan6.com/tekno/read/4252904/serangan-ddos-naik-tiga-kali-lipat- selama-pandemi-covid-19 [Accessed 13 May 2023]. ● Muzaki, Rizki Agung Muzaki. Briliyant, Obrina Candra., (2020). Security of Web- Based Application Using ModSecurity and Reverse Proxy in Web Application Firewall. International Workshop on Big Data and Information Security (IWBIS). IEEE ● Sobola, Timilehin David. Zavarsky, Pavol. Butakov, Sergey. 2020. Experimental Study of ModSecurity Web Application Firewalls. IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS). IEEE. ● Mukhtar, Basem Ibrahim. Azer, Marianne A. 2020. Evaluating the Modsecurity Web Application Firewall Against SQL Injection Attacks. 15th International Conference on Computer Engineering and Systems (ICCES). IEEE. ● D. Arnaldy and T. S. Hati. 2020. Performance Analysis of Reverse Proxy and Web Application Firewall with Telegram Bot as Attack Notification On Web Server. 3rd International Conference on Computer and Informatics Engineering (IC2IE), Yogyakarta, Indonesia, 2020, pp. 455-459, doi: 10.1109/IC2IE50715.2020.9274592.
  • 20. CREDITS: This presentation template was created by Slidesgo, including icons by Flaticon and infographics & images by Freepik THANKS! Does anyone have any questions? Ayu.rosyidazain@tik.pnj.ac.id This Research Sponsored by P3M Politeknik Negeri Jakarta
  • 21.
  • 22. Mars Despite being red, Mars is actually a cold place. It's full of iron oxide dust, which gives the planet its reddish cast, and it’s made of basalt Venus has a beautiful name and is the second planet from the Sun. It’s terribly hot, even hotter than Mercury. It has a toxic atmosphere FOUR IDEAS Jupiter Jupiter is a gas giant and the biggest planet in the Solar System. It's the fourth-brightest object in the night sky. It was named after a Roman god Saturn is a gas giant and has several rings. It's composed mostly of hydrogen and helium. It’s the sixth planet from the Sun Venus Saturn
  • 23. Venus Despite being red, Mars is actually a cold place. It's full of iron oxide dust, which gives the planet its reddish cast Earth is the third planet from the Sun and the only one that harbors life in the Solar System. We all live on this planet Venus has a beautiful name and is the second planet from the Sun. It’s terribly hot, even hotter than Mercury Mars SIX IDEAS Neptune Saturn Neptune is the farthest planet from the Sun. It's also the fourth-largest planet by diameter in the Solar System Saturn is a gas giant and has several rings. It's composed of hydrogen and helium. It’s the sixth planet from the Sun Jupiter is a gas giant and the biggest planet in the Solar System. It's the fourth- brightest object in the night sky Earth Jupiter
  • 24. The Sun’s mass compared to Earth’s Distance between Earth and the Moon 123 Jupiter's rotation period 123 123
  • 25. 123,123 Big numbers catch your audience’s attention
  • 26. THIS IS A CHART This is the planet Venus Venus has a beautiful name and is the second planet from the Sun. It’s terribly hot, even hotter than Mercury, and its atmosphere is extremely poisonous. It’s the second- brightest natural object in the night sky after the Moon 60% 30% 90% Follow the link in the graph to modify its data and then paste the new one here. For more info, click here
  • 27. TABLE Team Team A Team B Team C Team D Team E Mercury XX XX XX XX XX Mars XX XX XX XX XX Saturn XX XX XX XX XX Venus XX XX XX XX XX Jupiter XX XX XX XX XX Earth XX XX XX XX XX
  • 28. THIS IS A MOCKUP OF OUR PRODUCT You can replace the image on the screen with your own work. Just right-click on it and select “Replace image” 1. Mercury is very small 2. Mars is a red planet 3. Venus has a nice name 01 02 03
  • 29. BUYER PERSONA INFOGRAPHIC Bio Despite being red, Mars is a cold place, not hot. It’s full of iron oxide dust, giving the planet its reddish cast Name Age and occupation “This is a quote, words full of wisdom that can make the reader get inspired.” Personality ● Mercury is the closest planet to the Sun and the smallest one ● Venus has a beautiful name and is the second planet from the Sun ● Despite being red, Mars is actually a cold place. It’s full of iron oxide dust Pain points Despite being red, Mars is a cold place, not hot. It’s full of iron oxide dust, giving the planet its reddish cast Motivations Mercury is very small Mars is a red planet Venus has a nice name 1 2 3
  • 30. ROADMAP INFOGRAPHIC Initiative Objective Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Venus is very hot Venus has a beautiful name and is the second planet from the Sun Earth has life Earth is the beautiful planet on which humans live Mars is very cold Despite being red, Mars is actually a cold place Jupiter is a gas giant Jupiter is the biggest planet in the Solar System Saturn has rings Saturn is a gas giant and has several rings Mercury is small Mercury is the closest planet to the Sun and the smallest one
  • 31. MARKET SIZE INFOGRAPHIC Jupiter Jupiter is a gas giant and the biggest planet in the Solar System. It's the fourth-brightest object in the night sky Mars Despite being red, Mars is actually a cold place. It's full of iron oxide dust, which gives the planet its reddish cast Saturn Saturn is a gas giant and has several rings. It's composed mostly of hydrogen and helium. It was named after a Roman god $5M $20M $100M
  • 32. SOCIAL MEDIA STATS Worldwide reach Country 1 users Country 2 users XXX Billion XXX Billion XXX billion Users worldwide Xh xmin Average time spent XX Number of platforms used Platforms with most users Follow the link in the graph to modify its data and then paste the new one here. For more info, click here
  • 33. CASE STUDIES Approach ● Mercury is the closest planet to the sun and the smallest one ● Venus has a beautiful name and is the second planet from the Sun ● Despite being red, Mars is actually a cold place. It’s full of iron oxide dust Results Increase in page views Increase in sales Increase in clicks 23% 80% 10% Key takeaway 1 Key takeaway 2 Earth is the planet on which we all live Earth is the only planet that harbors life Campaign objective Venus is very hot
  • 34. Here’s an assortment of alternative resources whose style fits the one of this template: Photos ● Medium shot man working on laptop ● High angle man working on laptop I ● High angle man working on laptop II ● Person working on animation project ● Side view of a male technician using digital tablet ● Man's hand typing on laptop over the wooden desk ● Crop man browsing laptop ● Elegant young girl holding a laptop ● Brunette business woman using laptop ● High angle man working on a blank laptop ALTERNATIVE RESOURCES
  • 35. Instructions for use If you have a free account, in order to use this template, you must credit Slidesgo by keeping the Thanks slide. Please refer to the next slide to read the instructions for premium users. As a Free user, you are allowed to: ● Modify this template. ● Use it for both personal and commercial projects. You are not allowed to: ● Sublicense, sell or rent any of Slidesgo Content (or a modified version of Slidesgo Content). ● Distribute Slidesgo Content unless it has been expressly authorized by Slidesgo. ● Include Slidesgo Content in an online or offline database or file. ● Offer Slidesgo templates (or modified versions of Slidesgo templates) for download. ● Acquire the copyright of Slidesgo Content. For more information about editing slides, please read our FAQs or visit our blog: https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school
  • 36. As a Premium user, you can use this template without attributing Slidesgo or keeping the "Thanks" slide. You are allowed to: ● Modify this template. ● Use it for both personal and commercial purposes. ● Hide or delete the “Thanks” slide and the mention to Slidesgo in the credits. ● Share this template in an editable format with people who are not part of your team. You are not allowed to: ● Sublicense, sell or rent this Slidesgo Template (or a modified version of this Slidesgo Template). ● Distribute this Slidesgo Template (or a modified version of this Slidesgo Template) or include it in a database or in any other product or service that offers downloadable images, icons or presentations that may be subject to distribution or resale. ● Use any of the elements that are part of this Slidesgo Template in an isolated and separated way from this Template. ● Register any of the elements that are part of this template as a trademark or logo, or register it as a work in an intellectual property registry or similar. For more information about editing slides, please read our FAQs or visit our blog: https://slidesgo.com/faqs and https://slidesgo.com/slidesgo-school Instructions for use (premium users)
  • 37. This presentation has been made using the following fonts: Noto Sans (https://fonts.google.com/noto/specimen/Noto+Sans) Fonts & colors used #191919 #ebebeb #897970 #5f6057 #9d9d9c
  • 38. Create your Story with our illustrated concepts. Choose the style you like the most, edit its colors, pick the background and layers you want to show and bring them to life with the animator panel! It will boost your presentation. Check out how it works. Storyset Pana Amico Bro Rafiki Cuate
  • 39. You can easily resize these resources without losing quality. To change the color, just ungroup the resource and click on the object you want to change. Then, click on the paint bucket and select the color you want. Group the resource again when you’re done. You can also look for more infographics on Slidesgo. Use our editable graphic resources...
  • 40.
  • 41.
  • 42. JANUARY FEBRUARY MARCH APRIL PHASE 1 Task 1 Task 2 JANUARY FEBRUARY MARCH APRIL MAY JUNE PHASE 1 PHASE 2 Task 1 Task 2 Task 1 Task 2
  • 43.
  • 44.
  • 45. You can resize these icons without losing quality. You can change the stroke and fill color; just select the icon and click on the paint bucket/pen. In Google Slides, you can also use Flaticon’s extension, allowing you to customize and add even more icons. ...and our sets of editable icons
  • 48. Help & Support Icons Avatar Icons
  • 49. Creative Process Icons Performing Arts Icons