Implementation of Bridge Filtering to Prevent DHCP Starvation Attack (Case Study: SD Inpres Papindung)
DOI:
https://doi.org/10.59934/jaiea.v4i2.761Keywords:
MikroTikDHCP, Yersinia, DHCP Starvation attack, Bridge Filtering.Abstract
The impact of internet cut off or disrupted at SD Inpres Papindung, the teachers will have difficulty finding teaching materials and may have to return to traditional methods that are less effective. Updating Dapodik data will also be disrupted, which could affect school administration and evaluation. The unavailability of an internet connection does occur due to technical reasons or due to intentional elements, one of which is the use of Yersinia software. Yersinia is a piece of software that is commonly used to attack available networks by sending fake MAC addresses continuously so that the IP address on the DHCP server runs out, so that the client does not get an IP address which causes the client unable to access the internet. This attack are called DHCP Starvation Attack. This can be prevented using Bridge Filtering method. Bridge Filtering can filter only recognized MAC addresses to transmit data or can request an IP address from the DHCP server, while MAC addresses that are not recognized or foreign devices will not be allowed to request from that port or will not receive an IP address from the DHCP server.
The aim of implementing Bridge Filtering is to measure the creativity of the Bridge Filtering method in preventing DHCP Starvation Attack attacks so that clients who want to connect to the network can access the internet and improve network quality at SD Inpres Papindung.The results show that the Bridge Filtering method effective in preventing DHCP Starvation Attacks and improves network quality at SD Inpres Papindung which is shown by an increase of throughput, before implementation it was 794.66 Kbps and after implementation it was 1283.70 Kbps, there was a decrease of delay from 6.89 ms before implementation to 4.06 ms after implementation. There was also a decrease in jitter before implementation 10.56 ms and after implementation 6.05 ms, but caused an increase in packet loss which was 0.30% before implementation and after implementation increased to 0.79%. Of the four variables, all of them remain at the same level except for the throughput variable, where there is a change from the fair category to the good category, so that it has an impact on the quality of the internet network at SD Inpres Papindung after implementing Bridge Filtering which is stated to be better than before implementing Bridge Filtering on the internet network at SD Inpres Papindung.
Downloads
References
Amarudin, A. (2018). Desain Keamanan Jaringan Pada MikroTik Router OS Menggunakan Metode Port Knocking. Jurnal Teknoinfo, 12(2), 72. https://doi.org/10.33365/jti.v12i2.121
Ariyadi, T., Nur Riyansyah, A., Agung, M., & Ikrar, M. A. (2023). Analisis Serangan Dhcp Starvation Attack Pada Router Os MikroTik. Jurnal Ilmiah Informatika, 11(01), 85–93. https://doi.org/10.33884/jif.v11i01.7162
Dara, Y. C., Hariadi, F., Alfa, P., & Leo, R. (2022). Analisis Penerapan Sistem Keamanan Jaringan Menggunakan Metode DHCP Snooping dan Switch Port Security. Jurnal Inovatif Wira Wacana, 01(03), 187–196. https://ojs.unkriswina.ac.id/index.php/inovatif/article/view/337
Fikri, K., & Djuniadi. (2021). Keamanan Jaringan Menggunakan Switch Port Security. InfoTekJar : Jurnal Nasional Informatika Dan Teknologi Jaringan, 5(2), 302–307. http://bit.ly/InfoTekJar
Hanifia, R. (2019). Penerapan Quality of Service (QoS) Differentiated Service Pada Jaringan Multi-Protocol Label Switching (MPLS). Jurnal Manajemen Informatika, 9(2), 1–7.
Ishak, N., Hamza, S., & Hamid, M. (2023). Analisis Keamanan Jaringan Menggunakan Switch Port Security Padawarnet Gramit Kelurahan Sasa Ternate Selatan. Jurnal PRODUKTIF, 7(1), 611–618.
Rodiyah, A., Diana Mustafa, L., & Elfa M., P. (2018). Implementasi Management Bandwidth Pada Sistem Billing Kafe Menggunakan Autentikasi Qr Code. Jartel, 7(2), 1–7.
Sanjaya, T., & Setiyadi, D. (2019). 1-10 Teknik Informatika; STMIK Bina Insani. Rawa Panjang Bekasi Timur, 4(1), 17114.
Saputra, B. R. (2022). Simulasi Keamanan Jaringan Dengan Metode DHCP Snooping Dan VLAN Mengggunakan CISCO. JATISI (Jurnal Teknik Informatika Dan Sistem Informasi), 9(4), 3481–3488. https://doi.org/10.35957/jatisi.v9i4.2730
Sarip, N., & Setyanto, A. (2019). Packet Filtering Based On Differentiated Services Code Point For DHCP Starvation Attacks Prevention. Journal Pekommas, 4(2), 137. https://doi.org/10.30818/jpkm.2019.2040204
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.