International Journal of Advances in Data and Information Systems Vol. 3, No. 1, April 2022, pp. 11~19 ISSN: 2721-3056, DOI: 10.25008/ijadis.v3i1.1231 r 11 Journal homepage: http://ijadis.org Security System Analysis Against Flood Attacks Using TCP, UDP, and ICMP Protocols on Mikrotik Routers Warid Yunus 1 , Mohamad Efendi Lasulika 2 1,2 Faculty of Computer Science, Ichsan Gorontalo University, Gorontalo, Indonesia Article Info ABSTRACT Article history: Received Feb 24, 2022 Revised Mar 19, 2022 Accepted Apr 30, 2022 Advances in information technology today require all existing computer networks to be able to show that the security system model continues to be considered very important for users who want security both from inside and outside the network. An attack on a network server can occur at any time, as for an attack that can cause a dangerous effect on a router, namely DDOS / flood by flooding the router with very many data packets so that the router can be paralyzed in terms of handling the network system. In this study, descriptive research was applied to obtain data directly by conducting flooding techniques and analyzing and designing flooding prevention techniques with filtering techniques. The application of filtering on the firewall on MikroTik can minimize attacks and prevention directly by dropping flooding packets automatically so that MikroTik performance remains stable. Keywords: Mikrotik Flooding DDOS TCP UDP ICMP Firewall This is an open access article under the CC BY-SA license. Corresponding Author: Mohamad Efendi Lasulika, fendidsn.ui@gmail.com Faculty of Computer Science, Ichsan Gorontalo University 1. INTRODUCTION The advancement of information technology today requires all computer networks that exist today to be able to show that the security system model continues to be considered very important for users who want security both from inside and outside the network because the internet has very open access in the world and has included invaluable contributions to its users, but it also results in abuse that can harm the users themselves, so that the consequence that must be borne is the guaranteed security of users who are connected directly to the internet network [1]. The use and management of internet-based information technology for Ichsan Gorontalo University are one of the implementations of technology in supporting academic processes and supporting activities in various activities of lecturers and students, but in the internet world there are often negative impacts felt in its use, one of which is the use of weaknesses in network systems, such as hacking of network systems, destruction and even information theft in users who use such internet technology. Various forms of attacks and even threats directly or indirectly will have an impact on the activities that occur on the internet network, so to protect various forms of possible attacks on the network, a security mode such as a firewall is needed [2]. Firewall itself is a concept of the security system contained in the operating system. The operating system on a computer network is a resource regulatory medium which provides security or protection on the network, as well as being a controller for users to always be able to connect to