Abstract

Information technology is currently one of the things that almost all universities widely adopt. The development of information technology requires universities to manage potential resources effectively and efficiently. as stated in the regulation of the Minister of Research, Technology, and Higher Education Number 62 of 2017 concerning the governance of information technology in the university environment that is to support the achievement of increasing access, relevance, quality of higher education, innovation, and strengthening governance and accountability of a university. The consequence of the application of information technology is the emergence of information security risks, the threat of this attack is a concern that every university must be wary of to secure network infrastructure from these attacks. Open access provides great potential for everyone to commit crimes against network infrastructure. as explained that computer network security is part of a system that is very important to be maintained, for that it is necessary to make efforts that can be made by the party responsible for securing the University X network from DDoS attacks. the method used to secure the network infrastructure makes a filtering policy to block DDoS attacks, the results obtained from the application according to the filter rules applied to the proxy device successfully block DDoS attacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call