Implementation of Real-Time DoS Attack Detection and Automatic Mitigation on C-Based VPS Server
Implementasi Deteksi Serangan DoS Real-Time dan Mitigasi Otomatis pada Server VPS Berbasis C
DOI:
https://doi.org/10.21070/ups.9642Keywords:
Cyber Attack, DoS, NIST Cybersecurity Framework, Server, LinuxAbstract
Denial of Service (DoS) is a type of attack that aims to make a service or system unusable by users or servers using malicious resources. This is particularly relevant for digital services that use Virtual Private Servers (VPS) with high attack resources. To detect and mitigate DoS quickly, efficiently, and effectively, a solution is needed. This research aims to develop a detection and mitigation system based on the C programming language, integrated with Linux as a daemon service, and based on the five functions of the NIST Cybersecurity Framework (CSF). The method used is implementing libpcap to capture data packets in real-time and analyze packet flow based on IP, protocol (TCP, UDP, ICMP), and port. If an anomaly occurs, the system will automatically block packet data using iptables and store it in SQLite for audit and evaluation.
Downloads
References
Y. Y. Santika, R. Rianto, E. Ujianto, M. T. Informasi, and U. T. Yogyakarta, “Studi Komprehensif Keamanan Siber: Perbandingan Teknologi AI dengan Sistem Non-AI dalam Deteksi dan Pencegahan Ancaman,” vol. 9, no. 1, 2025, doi: 10.31603/komtika.v9i1.13149.
“1317-Article Text-3505-1-10-20210225”.
R. Perangkat, K. Kriptografi, P. Siber, S. Negara, ) Rekayasa, and K. Siber, “Cloud Storage untuk Embedded Intrusion Detection System Arial 11 Agus Reza Aristiadi Nurwa 1) ; Dimas Febriyan Priambodo 2*) ; Fahdel Achmad 3),” Jurnal TIKomSiN, vol. 11, no. 1, 2023, doi: 10.30646/tikomsin.v11i1.641.
W. S. Admass, Y. Y. Munaye, and A. A. Diro, “Cyber security: State of the art, challenges and future directions,” Jan. 01, 2024, KeAi Communications Co. doi: 10.1016/j.csa.2023.100031.
R. Perangkat, K. Kriptografi, P. Siber, S. Negara, ) Rekayasa, and K. Siber, “Cloud Storage untuk Embedded Intrusion Detection System Arial 11 Agus Reza Aristiadi Nurwa 1) ; Dimas Febriyan Priambodo 2*) ; Fahdel Achmad 3),” Jurnal TIKomSiN, vol. 11, no. 1, 2023, doi: 10.30646/tikomsin.v11i1.641.
A. Mishra et al., “Stroke genetics informs drug discovery and risk prediction across ancestries,” Nature, vol. 611, no. 7934, pp. 115–123, Nov. 2022, doi: 10.1038/s41586-022-05165-3.
Crossmark, “Public Draft: The NIST Cybersecurity Framework 2.0 National Institute of Standards and Technology Note to Reviewers,” 2023.
M. Alshar’e, “CYBER SECURITY FRAMEWORK SELECTION: COMPARISION OF NIST AND ISO27001,” Applied computing Journal, pp. 245–255, Feb. 2023, doi: 10.52098/acj.202364.
P. Pfsense et al., “THE USE OF PFSENSE AND SURICATA AS A NETWORK SECURITY ATTACK DETECTION AND PREVENTION TOOL ON WEB SERVERS,” vol. 9, no. 2, p. 2024.
D. Said, “Quantum Computing and Machine Learning for Cybersecurity: Distributed Denial of Service (DDoS) Attack Detection on Smart Micro-Grid,” Energies (Basel), vol. 16, no. 8, Apr. 2023, doi: 10.3390/en16083572.
S. Hartono and K. Khotimah, “Deteksi Dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog.”
F. A. Saputra and J. C. Chandra, “Prototipe Sistem Keamanan Ruang Server Otomatis Menggunakan ESP32CAM dan Algoritma You Only Look Once (YOLO),” Jurnal TICOM: Technology of Information and Communication, vol. 11, no. 1, 2022.
Pemrograman Bahasa C#.
Wahyudi et al., “Meningkatkan Keamanan dan Mitigasi pada Arsitektur Software Defined Network,” Jurnal Interkom: Jurnal Publikasi Ilmiah Bidang Teknologi Informasi dan Komunikasi, vol. 20, no. 1, pp. 18–28, Apr. 2025, doi: 10.35969/interkom.v20i1.435.
H. Setiawan, W. Sulistyo, F. Teknologi Informasi, and U. Kristen Satya Wacana, “SIEM (Security Information Event Management) Model for Malware Attack Detection Using Suricata and Evebox,” International Journal of Engineering, vol. 5, no. 2, 2023.
M. Hamidouche, B. F. Demissie, and B. Cherif, “Real-time Threat Detection Strategies for Resource-constrained Devices,” Mar. 2024, [Online]. Available: http://arxiv.org/abs/2403.15078
J. Kaur and K. R. Ramkumar, “The recent trends in cyber security: A review,” Sep. 01, 2022, King Saud bin Abdulaziz University. doi: 10.1016/j.jksuci.2021.01.018.
Dr. Y. Perwej, S. Qamar Abbas, J. Pratap Dixit, Dr. N. Akhtar, and A. Kumar Jaiswal, “A Systematic Literature Review on the Cyber Security,” International Journal of Scientific Research and Management, vol. 9, no. 12, pp. 669–710, Dec. 2021, doi: 10.18535/ijsrm/v9i12.ec04.
P. Szynkiewicz, “Signature-Based Detection of Botnet DDoS Attacks,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13300 LNCS, Springer Science and Business Media Deutschland GmbH, 2022, pp. 120–135. doi: 10.1007/978-3-031-04036-8_6.
S. AlDaajeh, H. Saleous, S. Alrabaee, E. Barka, F. Breitinger, and K.-K. Raymond Choo, “The role of national cybersecurity strategies on the improvement of cyb ersecurity e ducation.”
Downloads
Additional Files
Posted
License
Copyright (c) 2026 UMSIDA Preprints Server

This work is licensed under a Creative Commons Attribution 4.0 International License.
