TY - GEN
T1 - The impact analysis and mitigation of DDoS attack on local government electronic procurement service (LPSE)
AU - Akbar, Salman
AU - Endroyono,
AU - Wibawa, Adhi Dharma
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2017/1/20
Y1 - 2017/1/20
N2 - The Internet nowadays has become important to current society; it has changed the way of communication and business models, The Electronic Procurement Services to government agencies which is called Layanan Pengadaan Secara Elektronik (LPSE) has become a very important part for central and local government agencies. LPSE for an agency can be termed as one of the most important assets in the process of regional development. As one of the important assets, LPSE must be protected to ensure continuity of services as well as to minimize the risk of service interruption. With the increase of sophisticated information systems and technology, the threat will also become more sophisticated. DDoS attacks are one of the most threat to the government procurement service. In this paper, we evaluated the impact of DDoS attacks on the existing network infrastructure of government procurement service and also evaluates the existing network defense mechanisms such firewall router and web server. We also compared the implementation of Intrusion Detection system, firewall server based and honeypot in the network to mitigate DDoS Attacks. During UDP Flood the results showed that on the existing network infrastructure, CPU usage of integrated firewall reaching 100 % and at 500 requests to the LPSE web server, there were only 30 requests that could be processed. Comparing to new network topology using Firewall Server Based, showed only 15,79 % of CPU usage of Firewall. Furthermore, LPSE web server response times took only 1,10 ms at 500 requests.
AB - The Internet nowadays has become important to current society; it has changed the way of communication and business models, The Electronic Procurement Services to government agencies which is called Layanan Pengadaan Secara Elektronik (LPSE) has become a very important part for central and local government agencies. LPSE for an agency can be termed as one of the most important assets in the process of regional development. As one of the important assets, LPSE must be protected to ensure continuity of services as well as to minimize the risk of service interruption. With the increase of sophisticated information systems and technology, the threat will also become more sophisticated. DDoS attacks are one of the most threat to the government procurement service. In this paper, we evaluated the impact of DDoS attacks on the existing network infrastructure of government procurement service and also evaluates the existing network defense mechanisms such firewall router and web server. We also compared the implementation of Intrusion Detection system, firewall server based and honeypot in the network to mitigate DDoS Attacks. During UDP Flood the results showed that on the existing network infrastructure, CPU usage of integrated firewall reaching 100 % and at 500 requests to the LPSE web server, there were only 30 requests that could be processed. Comparing to new network topology using Firewall Server Based, showed only 15,79 % of CPU usage of Firewall. Furthermore, LPSE web server response times took only 1,10 ms at 500 requests.
KW - DDoS
KW - Firewall
KW - Government Procurement Service
KW - Honeypot
KW - IDS
KW - LPSE
UR - http://www.scopus.com/inward/record.url?scp=85016751314&partnerID=8YFLogxK
U2 - 10.1109/ISITIA.2016.7828694
DO - 10.1109/ISITIA.2016.7828694
M3 - Conference contribution
AN - SCOPUS:85016751314
T3 - Proceeding - 2016 International Seminar on Intelligent Technology and Its Application, ISITIA 2016: Recent Trends in Intelligent Computational Technologies for Sustainable Energy
SP - 405
EP - 410
BT - Proceeding - 2016 International Seminar on Intelligent Technology and Its Application, ISITIA 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2016 International Seminar on Intelligent Technology and Its Application, ISITIA 2016
Y2 - 28 July 2016 through 30 July 2016
ER -