Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
The PT PUSRI Information Technology Services Department plays a vital role in supporting operations and providing IT services across the company. To ensure secure internet access, robust security measures have been implemented, with firewall filtering as a key strategy. This study analyzes the ef...
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
INTI International University
2024
|
| Subjects: | |
| Online Access: | http://eprints.intimal.edu.my/2020/ http://eprints.intimal.edu.my/2020/1/jods2024_40.pdf |
| _version_ | 1848766898781552640 |
|---|---|
| author | Misinem, . M. Syaiful Huda, Mubarok Timur, Dalipurwanto Tamsir, Ariyadi Nurul Adha Oktarini, Saputri |
| author_facet | Misinem, . M. Syaiful Huda, Mubarok Timur, Dalipurwanto Tamsir, Ariyadi Nurul Adha Oktarini, Saputri |
| author_sort | Misinem, . |
| building | INTI Institutional Repository |
| collection | Online Access |
| description | The PT PUSRI Information Technology Services Department plays a vital role in supporting
operations and providing IT services across the company. To ensure secure internet access, robust
security measures have been implemented, with firewall filtering as a key strategy. This study
analyzes the effectiveness of firewall filtering in mitigating threats such as SYN flood attacks and
unauthorized access by focusing on data-driven insights into traffic patterns and threat prevention.
The firewall filtering system scrutinizes incoming TCP connections, manages critical ports (e.g.,
ports 22 and 80), filters IP address ranges, and continuously monitors suspicious network traffic
patterns. Data analysis of network activity revealed a significant reduction in security incidents.
By blocking illegitimate traffic and managing commonly targeted entry points, the system has
minimized disruptions caused by SYN flood attacks and unauthorized access attempts. Filtering
source IPs associated with malicious activities and analyzing traffic anomalies further strengthen
network security. The results demonstrate increased network stability and enhanced operational
efficiency at PT PUSRI, with data indicating fewer disruptions and threats. The department's
ability to analyze traffic patterns has enabled proactive threat mitigation, contributing to a secure
IT environment. This research highlights the strategic importance of integrating data analysis into
firewall filtering to sustain and improve network security while supporting seamless operational
activities. |
| first_indexed | 2025-11-14T11:58:28Z |
| format | Article |
| id | intimal-2020 |
| institution | INTI International University |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-14T11:58:28Z |
| publishDate | 2024 |
| publisher | INTI International University |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | intimal-20202024-12-31T07:08:04Z http://eprints.intimal.edu.my/2020/ Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI Misinem, . M. Syaiful Huda, Mubarok Timur, Dalipurwanto Tamsir, Ariyadi Nurul Adha Oktarini, Saputri QA75 Electronic computers. Computer science QA76 Computer software ZA4450 Databases The PT PUSRI Information Technology Services Department plays a vital role in supporting operations and providing IT services across the company. To ensure secure internet access, robust security measures have been implemented, with firewall filtering as a key strategy. This study analyzes the effectiveness of firewall filtering in mitigating threats such as SYN flood attacks and unauthorized access by focusing on data-driven insights into traffic patterns and threat prevention. The firewall filtering system scrutinizes incoming TCP connections, manages critical ports (e.g., ports 22 and 80), filters IP address ranges, and continuously monitors suspicious network traffic patterns. Data analysis of network activity revealed a significant reduction in security incidents. By blocking illegitimate traffic and managing commonly targeted entry points, the system has minimized disruptions caused by SYN flood attacks and unauthorized access attempts. Filtering source IPs associated with malicious activities and analyzing traffic anomalies further strengthen network security. The results demonstrate increased network stability and enhanced operational efficiency at PT PUSRI, with data indicating fewer disruptions and threats. The department's ability to analyze traffic patterns has enabled proactive threat mitigation, contributing to a secure IT environment. This research highlights the strategic importance of integrating data analysis into firewall filtering to sustain and improve network security while supporting seamless operational activities. INTI International University 2024-12 Article PeerReviewed text en cc_by_4 http://eprints.intimal.edu.my/2020/1/jods2024_40.pdf Misinem, . and M. Syaiful Huda, Mubarok and Timur, Dalipurwanto and Tamsir, Ariyadi and Nurul Adha Oktarini, Saputri (2024) Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI. Journal of Data Science, 2024 (40). pp. 1-11. ISSN 2805-5160 http://ipublishing.intimal.edu.my/jods.html |
| spellingShingle | QA75 Electronic computers. Computer science QA76 Computer software ZA4450 Databases Misinem, . M. Syaiful Huda, Mubarok Timur, Dalipurwanto Tamsir, Ariyadi Nurul Adha Oktarini, Saputri Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI |
| title | Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI |
| title_full | Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI |
| title_fullStr | Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI |
| title_full_unstemmed | Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI |
| title_short | Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI |
| title_sort | data-driven on resilient network security against syn flood attacks at pt pusri |
| topic | QA75 Electronic computers. Computer science QA76 Computer software ZA4450 Databases |
| url | http://eprints.intimal.edu.my/2020/ http://eprints.intimal.edu.my/2020/ http://eprints.intimal.edu.my/2020/1/jods2024_40.pdf |