Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI

The PT PUSRI Information Technology Services Department plays a vital role in supporting operations and providing IT services across the company. To ensure secure internet access, robust security measures have been implemented, with firewall filtering as a key strategy. This study analyzes the ef...

Full description

Bibliographic Details
Main Authors: Misinem, ., M. Syaiful Huda, Mubarok, Timur, Dalipurwanto, Tamsir, Ariyadi, Nurul Adha Oktarini, Saputri
Format: Article
Language:English
Published: INTI International University 2024
Subjects:
Online Access:http://eprints.intimal.edu.my/2020/
http://eprints.intimal.edu.my/2020/1/jods2024_40.pdf
_version_ 1848766898781552640
author Misinem, .
M. Syaiful Huda, Mubarok
Timur, Dalipurwanto
Tamsir, Ariyadi
Nurul Adha Oktarini, Saputri
author_facet Misinem, .
M. Syaiful Huda, Mubarok
Timur, Dalipurwanto
Tamsir, Ariyadi
Nurul Adha Oktarini, Saputri
author_sort Misinem, .
building INTI Institutional Repository
collection Online Access
description The PT PUSRI Information Technology Services Department plays a vital role in supporting operations and providing IT services across the company. To ensure secure internet access, robust security measures have been implemented, with firewall filtering as a key strategy. This study analyzes the effectiveness of firewall filtering in mitigating threats such as SYN flood attacks and unauthorized access by focusing on data-driven insights into traffic patterns and threat prevention. The firewall filtering system scrutinizes incoming TCP connections, manages critical ports (e.g., ports 22 and 80), filters IP address ranges, and continuously monitors suspicious network traffic patterns. Data analysis of network activity revealed a significant reduction in security incidents. By blocking illegitimate traffic and managing commonly targeted entry points, the system has minimized disruptions caused by SYN flood attacks and unauthorized access attempts. Filtering source IPs associated with malicious activities and analyzing traffic anomalies further strengthen network security. The results demonstrate increased network stability and enhanced operational efficiency at PT PUSRI, with data indicating fewer disruptions and threats. The department's ability to analyze traffic patterns has enabled proactive threat mitigation, contributing to a secure IT environment. This research highlights the strategic importance of integrating data analysis into firewall filtering to sustain and improve network security while supporting seamless operational activities.
first_indexed 2025-11-14T11:58:28Z
format Article
id intimal-2020
institution INTI International University
institution_category Local University
language English
last_indexed 2025-11-14T11:58:28Z
publishDate 2024
publisher INTI International University
recordtype eprints
repository_type Digital Repository
spelling intimal-20202024-12-31T07:08:04Z http://eprints.intimal.edu.my/2020/ Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI Misinem, . M. Syaiful Huda, Mubarok Timur, Dalipurwanto Tamsir, Ariyadi Nurul Adha Oktarini, Saputri QA75 Electronic computers. Computer science QA76 Computer software ZA4450 Databases The PT PUSRI Information Technology Services Department plays a vital role in supporting operations and providing IT services across the company. To ensure secure internet access, robust security measures have been implemented, with firewall filtering as a key strategy. This study analyzes the effectiveness of firewall filtering in mitigating threats such as SYN flood attacks and unauthorized access by focusing on data-driven insights into traffic patterns and threat prevention. The firewall filtering system scrutinizes incoming TCP connections, manages critical ports (e.g., ports 22 and 80), filters IP address ranges, and continuously monitors suspicious network traffic patterns. Data analysis of network activity revealed a significant reduction in security incidents. By blocking illegitimate traffic and managing commonly targeted entry points, the system has minimized disruptions caused by SYN flood attacks and unauthorized access attempts. Filtering source IPs associated with malicious activities and analyzing traffic anomalies further strengthen network security. The results demonstrate increased network stability and enhanced operational efficiency at PT PUSRI, with data indicating fewer disruptions and threats. The department's ability to analyze traffic patterns has enabled proactive threat mitigation, contributing to a secure IT environment. This research highlights the strategic importance of integrating data analysis into firewall filtering to sustain and improve network security while supporting seamless operational activities. INTI International University 2024-12 Article PeerReviewed text en cc_by_4 http://eprints.intimal.edu.my/2020/1/jods2024_40.pdf Misinem, . and M. Syaiful Huda, Mubarok and Timur, Dalipurwanto and Tamsir, Ariyadi and Nurul Adha Oktarini, Saputri (2024) Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI. Journal of Data Science, 2024 (40). pp. 1-11. ISSN 2805-5160 http://ipublishing.intimal.edu.my/jods.html
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
ZA4450 Databases
Misinem, .
M. Syaiful Huda, Mubarok
Timur, Dalipurwanto
Tamsir, Ariyadi
Nurul Adha Oktarini, Saputri
Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
title Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
title_full Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
title_fullStr Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
title_full_unstemmed Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
title_short Data-Driven on Resilient Network Security Against SYN Flood Attacks at PT PUSRI
title_sort data-driven on resilient network security against syn flood attacks at pt pusri
topic QA75 Electronic computers. Computer science
QA76 Computer software
ZA4450 Databases
url http://eprints.intimal.edu.my/2020/
http://eprints.intimal.edu.my/2020/
http://eprints.intimal.edu.my/2020/1/jods2024_40.pdf