Helmi Hasyim, , (2025) ANALISIS EFEKTIVITAS KOMBINASI MODSECURITY DAN DDOS DEFLATE TERHADAP SERANGAN DDOS PADA WEB SERVER. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.
![]() |
Text
ABSTRAK.pdf Download (183kB) |
![]() |
Text
AWAL.pdf Download (427kB) |
![]() |
Text
BAB I.pdf Restricted to Repository UPNVJ Only Download (296kB) |
![]() |
Text
BAB II.pdf Restricted to Repository UPNVJ Only Download (675kB) |
![]() |
Text
BAB III.pdf Restricted to Repository UPNVJ Only Download (712kB) |
![]() |
Text
BAB IV.pdf Restricted to Repository UPNVJ Only Download (870kB) |
![]() |
Text
BAB V.pdf Download (274kB) |
![]() |
Text
DAFTAR PUSTAKA.pdf Download (245kB) |
![]() |
Text
RIWAYAT HIDUP.pdf Restricted to Repository UPNVJ Only Download (100kB) |
![]() |
Text
LAMPIRAN.pdf Restricted to Repository UPNVJ Only Download (1MB) |
![]() |
Text
HASIL PLAGIARISME.pdf Restricted to Repository staff only Download (14MB) |
![]() |
Text
ARTIKEL KI.pdf Restricted to Repository staff only Download (564kB) |
Abstract
Distributed Denial of Service (DDoS) attacks pose a significant threat to the availability of web server services. This study aims to evaluate the effectiveness of combining ModSecurity OWASP Core Rule Set (CRS) and DDoS Deflate in detecting and mitigating DDoS attacks. The research was conducted in a controlled laboratory environment using three scenarios: without protection, with ModSecurity alone, and with a combination of ModSecurity and DDoS Deflate. The testing involved simulated HTTP Flood and SYN Flood attacks over a duration of 10 minutes, with performance metrics observed using Prometheus, Grafana, and tcpdump. The results indicate that in the unprotected scenario, server CPU usage spiked up to 97%, accompanied by a high volume of incoming traffic without any mitigation. The implementation of ModSecurity alone provided limited protection, primarily at the application layer, by partially blocking HTTP requests. In contrast, the combined use of ModSecurity and DDoS Deflate significantly improved mitigation effectiveness, successfully blocking over 5 million malicious connections and achieving a bandwidth efficiency of 87.76% against HTTP Flood attacks. In conclusion, the layered mitigation approach demonstrated a superior ability to maintain server performance stability and is highly recommended as a strategy for protecting web servers from DDoS attacks.
Item Type: | Thesis (Skripsi) |
---|---|
Additional Information: | [No.Panggil: 2110511046] [Pembimbing 1: Supriyanto] [Pembimbing 2: Hamonangan Kinantan Prabu] [Penguji 1: I Wayan Widi Pradnyana] [Penguji 2: Nurhuda Maulana] |
Uncontrolled Keywords: | ModSecurity, Deflate DDoS, HTTP Flood, SYN Flood, Mitigation |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Fakultas Ilmu Komputer > Program Studi Informatika (S1) |
Depositing User: | HELMI HASYIM |
Date Deposited: | 06 Aug 2025 06:29 |
Last Modified: | 06 Aug 2025 06:29 |
URI: | http://repository.upnvj.ac.id/id/eprint/37482 |
Actions (login required)
![]() |
View Item |