Abstract

Data traffic on a dense network is a threat to cybercrime and a high vulnerability for technology companies so that the challenges to prevent it will be more diverse. Adding a strengthening of the boundary wall or firewall and sorting data through packet filtering plus writing firewall rules to prevent malware and attacks from outside at the network device level is an alternative to protect the traffic you have. When heavy traffic makes data exchange uncontrollable, this research will create an automation design so that the sorting of incoming data packets through selection based on the specified rules runs in real-time so that the prevention of crime that enters the network is more swiftly handled. The system is running successfully by connecting the MQTT Collector as a subscriber that uses the python programming language to retrieve profiling data from the IP Profile database. The system was tested on a mikrotik router RB951Ui-2HnD which then the blocking track record will be stored in the Dynamic Firewall Data database in MongoDB. Also added a tool for controlling data in storage in the form of a program release. The results of the test show that data with an average base score above 20 is blocked and then stored in the block list in checking the collection in the database every 30 seconds. In addition, the data in the database will be checked every day within 30 days which will then be released and recorded in the release log in MongoDB.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.