{"id":81,"date":"2023-04-10T07:41:56","date_gmt":"2023-04-10T00:41:56","guid":{"rendered":"https:\/\/www.goldenfast.net\/blog\/?p=81"},"modified":"2023-12-29T15:50:44","modified_gmt":"2023-12-29T08:50:44","slug":"ddos-adalah","status":"publish","type":"post","link":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/","title":{"rendered":"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya"},"content":{"rendered":"<span style=\"font-weight: 400;\">Jika Anda adalah seorang <\/span><i><span style=\"font-weight: 400;\">webmaster<\/span><\/i><span style=\"font-weight: 400;\">, pasti Anda sering mendengar istilah DDoS attack bukan? <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Faktanya, jenis serangan <\/span><i><span style=\"font-weight: 400;\">cyber<\/span><\/i><span style=\"font-weight: 400;\"> ini bukanlah hal baru di dunia maya bahkan sering mengincar website besar. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Sejak pertama kali muncul pada tahun <\/span><span style=\"font-weight: 400;\">1974<\/span><span style=\"font-weight: 400;\">, DDoS bahkan terus mengalami perkembangan secara kualitas dan kuantitasnya.\u00a0<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Berdasarkan laporan dari <em><a href=\"https:\/\/securelist.com\/category\/ddos-reports\/\" target=\"_blank\" rel=\"nofollow noopener\">Securelist<\/a><\/em>, jumlah serangan DDoS selalu meningkat pada setiap tahunnya<\/span><span style=\"font-weight: 400;\">.<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Sejarah pun mencatat bahwa perusahaan-perusahaan ternama dunia seperti Amazon Web Services, Bank of America, GitHub, Citigroup, dan CloudFlare juga tidak terlepas dari ancaman serangan ini.\u00a0<\/span>\r\n\r\nJangan sampai website Golden Friends menjadi salah satu korban selanjutnya ya.\r\n\r\n<span style=\"font-weight: 400;\">Tertarik untuk mempelajari mengenai DDoS Attack? Yuk lanjutkan membaca sampai selesai! <img decoding=\"async\" class=\"size-full wp-image-84 aligncenter\" src=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/10\/pengertian-ddos-attack-tipe-dan-cara-mencegahnya.jpg\" alt=\"Pengertian DDoS Attack, Tipe, dan Cara Mencegahnya\" width=\"960\" height=\"420\" srcset=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/10\/pengertian-ddos-attack-tipe-dan-cara-mencegahnya.jpg 960w, https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/10\/pengertian-ddos-attack-tipe-dan-cara-mencegahnya-300x131.jpg 300w, https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2020\/10\/pengertian-ddos-attack-tipe-dan-cara-mencegahnya-768x336.jpg 768w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/span>\r\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Daftar isi :<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69e49346e5983\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69e49346e5983\" checked aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#Apa_Itu_DDoS_Attack\" >Apa Itu DDoS Attack?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#Beberapa_Jenis_DDoS_Attack\" >Beberapa Jenis DDoS Attack\u00a0<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#1_Volumetric_Attacks\" >1. Volumetric Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#2_Application_Attacks\" >2. Application Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#3_Protocol_Attacks\" >3. Protocol Attacks<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#Tujuan_DDoS_Attack\" >Tujuan DDoS Attack<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#1_Permusuhan\" >1. Permusuhan<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#2_Persaingan_Bisnis\" >2. Persaingan Bisnis<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#3_Peretasan_dan_Pencurian_Data\" >3. Peretasan dan Pencurian Data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#4_Uang\" >4. Uang<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#Tips_Mencegah_DDoS_Attack\" >Tips Mencegah DDoS Attack<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#Monitoring_Traffic_Secara_Reguler_Adalah_Sebuah_Keharusan\" >Monitoring Traffic Secara Reguler Adalah Sebuah Keharusan\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#Tingkatkan_Kapasitas_Sumber_Daya_Server_Anda\" >Tingkatkan Kapasitas Sumber Daya Server Anda<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#Terapkan_Strategi_Proteksi_Berlapis\" >Terapkan Strategi Proteksi Berlapis<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#Rekomendasi_Server_yang_Aman\" >Rekomendasi Server yang Aman\u00a0<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Apa_Itu_DDoS_Attack\"><\/span><strong>Apa Itu DDoS Attack?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<span style=\"font-weight: 400;\">DDoS adalah salah satu jenis <\/span><i><span style=\"font-weight: 400;\">cyber-attacks <\/span><\/i><span style=\"font-weight: 400;\">yang menyasar website, layanan online, maupun jaringan dengan cara membanjirinya dengan <\/span><i><span style=\"font-weight: 400;\">fake traffic <\/span><\/i><span style=\"font-weight: 400;\">yang sangat banyak.<\/span>\r\n\r\nDDoS kepanjangan dari <span style=\"font-weight: 400;\"><em>Distributed Denial of Service<\/em>.<\/span>\r\n\r\n<span style=\"font-weight: 400;\"> Motif utamanya adalah agar <\/span><i><span style=\"font-weight: 400;\">server <\/span><\/i><span style=\"font-weight: 400;\">atau jaringan Anda tidak mampu mengakomodasi lalu lintas lintas tersebut, sehingga menyebabkan website\/layanan Anda <\/span><i><span style=\"font-weight: 400;\">down<\/span><\/i><span style=\"font-weight: 400;\"> dan tidak bisa beroperasi.\u00a0\u00a0<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Ada beberapa gejala yang umumnya terjadi ketika Anda terkena DDoS attack, diantaranya yaitu:<\/span>\r\n<ul>\r\n \t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Website, aplikasi, atau layanan yang Anda jalankan tiba-tiba menjadi lambat atau tidak bisa diakses;<\/span><\/li>\r\n \t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Adanya <\/span><i><span style=\"font-weight: 400;\">traffic<\/span><\/i><span style=\"font-weight: 400;\"> yang tidak wajar dari IP address tertentu, atau <\/span><i><span style=\"font-weight: 400;\">visitors <\/span><\/i><span style=\"font-weight: 400;\">tersebut mempunyai pola\/profil perilaku yang serupa; seperti kesamaan versi <\/span><i><span style=\"font-weight: 400;\">browser<\/span><\/i><span style=\"font-weight: 400;\">, lokasi, hingga tipe perangkat yang digunakan;<\/span><\/li>\r\n \t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Koneksi internet lambat sehingga Anda kesulitan mengakses <\/span><i><span style=\"font-weight: 400;\">files<\/span><\/i><span style=\"font-weight: 400;\"> atau website apapun dalam waktu yang lama;<\/span><\/li>\r\n \t<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Munculnya <\/span><span style=\"font-weight: 400;\">spam email<\/span><span style=\"font-weight: 400;\"> dalam jumlah yang banyak<\/span><\/li>\r\n<\/ul>\r\n<span style=\"font-weight: 400;\">Tapi ingat, ada kalanya gejala-gejala di atas juga bisa terjadi karena faktor-faktor lain bukan dari DDoS.<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Misalnya karena sedang dilakukannya proses <\/span><i><span style=\"font-weight: 400;\">maintenance <\/span><\/i><span style=\"font-weight: 400;\">oleh <\/span><i><span style=\"font-weight: 400;\">system administrator<\/span><\/i><span style=\"font-weight: 400;\">, adanya masalah teknis dengan koneksi Anda, perangkat Anda terkena virus, atau website Anda memang benar-benar sedang mengalami lonjakan pengunjung.\u00a0<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Oleh karena itu, untuk semakin meyakinkan apakah Anda memang terkena DDoS attack atau tidak, ada baiknya untuk meminta tim teknis profesional perusahaan Anda untuk melakukan analisis lebih lanjut. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Jika Anda adalah pengguna sistem operasi Linux, Anda juga bisa melakukan proses <\/span><span style=\"font-weight: 400;\">pengecekan<\/span><span style=\"font-weight: 400;\"> melalui Command Line Interface (CLI) dengan bantuan beberapa <\/span><span style=\"font-weight: 400;\">perintah Linux<\/span><span style=\"font-weight: 400;\">.\u00a0 \u00a0<\/span>\r\n<h2><span class=\"ez-toc-section\" id=\"Beberapa_Jenis_DDoS_Attack\"><\/span><strong>Beberapa Jenis DDoS Attack\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<span style=\"font-weight: 400;\">Beberapa kategori DDoS attack diantaranya adalah:<\/span>\r\n<h3><span class=\"ez-toc-section\" id=\"1_Volumetric_Attacks\"><\/span><strong>1. Volumetric Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<span style=\"font-weight: 400;\">Volumetric attacks merupakan bentuk serangan DDoS paling umum yang tercatat mencapai angka <\/span><span style=\"font-weight: 400;\">65%<\/span><span style=\"font-weight: 400;\">. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Dalam kategori ini, <\/span><i><span style=\"font-weight: 400;\">Attacker <\/span><\/i><span style=\"font-weight: 400;\">menggunakan <\/span><i><span style=\"font-weight: 400;\">botnet <\/span><\/i><span style=\"font-weight: 400;\">untuk membanjiri <\/span><i><span style=\"font-weight: 400;\">bandwidth<\/span><\/i><span style=\"font-weight: 400;\"> website maupun server Anda dengan traffic dalam jumlah yang sangat besar. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Beberapa tipe serangan yang masuk dalam kategori ini meliputi DNS amplification, UDP flood, TCP flood, dan NTP amplification.\u00a0\u00a0\u00a0<\/span>\r\n<h3><span class=\"ez-toc-section\" id=\"2_Application_Attacks\"><\/span><strong>2. Application Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<span style=\"font-weight: 400;\">Application attacks mengeksploitasi layer 7\u2014yaitu layer di mana <\/span><i><span style=\"font-weight: 400;\">server<\/span><\/i><span style=\"font-weight: 400;\"> akan menerima dan merespon http requests serta memuat halaman website. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Itulah mengapa application attacks juga sering dikenal dengan Layer 7 attacks. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Kategori serangan ini cenderung sulit diidentifikasi dan diatasi karena menyerupai lalu lintas web yang natural\/organik. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Salah satu tipe serangan yang termasuk dalam kategori adalah HTTP flood.\u00a0<\/span>\r\n<h3><span class=\"ez-toc-section\" id=\"3_Protocol_Attacks\"><\/span><strong>3. Protocol Attacks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<span style=\"font-weight: 400;\">Protocol attacks (atau state-exhaustion attacks) menyasar kelemahan layer 3 dan layer 4. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Caranya yakni dengan membuat penggunaan sumber daya <\/span><i><span style=\"font-weight: 400;\">server <\/span><\/i><span style=\"font-weight: 400;\">maupun perangkat jaringan seperti firewalls dan <a href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/load-balancing\/\" target=\"_blank\" rel=\"noopener\">load balancers<\/a> menjadi berlebihan dan melebihi kapasitasnya. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Contoh tipe serangan yang masuk dalam kategori ini adalah Syn flood, Smurf DDoS, dan ping of death.\u00a0<\/span>\r\n<p style=\"text-align: center;\"><a class=\"wp-block-button__link has-luminous-vivid-amber-background-color has-background\" href=\"https:\/\/www.goldenfast.net\/cloud-vps\/?utm_source=website&amp;utm_medium=artikel&amp;utm_campaign=artikel+GFN+ddos+attack\" target=\"_blank\" rel=\"nofollow noopener\">Server dengan Keamanan Terbaik<\/a><\/p>\r\n\r\n<h2><span class=\"ez-toc-section\" id=\"Tujuan_DDoS_Attack\"><\/span>Tujuan DDoS Attack<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\nDDoS Attack dilakukan bertujuan untuk menganggu keberadaan website target.\r\n\r\nBerikut beberapa tujuan para pelaku siber crime melakukan DDoS Attack:\r\n<h3><span class=\"ez-toc-section\" id=\"1_Permusuhan\"><\/span><strong>1. Permusuhan<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\nSalah satu tujuan penyerangan DDoS Attack karena faktor permusuhan.\r\n\r\nSehingga pelaku membuat website down sehingga tidak bisa diakses oleh para pengunjung website.\r\n<h3><span class=\"ez-toc-section\" id=\"2_Persaingan_Bisnis\"><\/span><strong>2. Persaingan Bisnis<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\nSerangan DDoS Attack bisa dilakukan oleh kompetitor bisnis Anda dengan tujuan menjatuhkan bisnis.\r\n\r\nSehingga saat website tidak bisa diakses dan kepercayaan pelanggan turun, kompetitor bisa memperoleh keuntungan dari masalah ini.\r\n<h3><span class=\"ez-toc-section\" id=\"3_Peretasan_dan_Pencurian_Data\"><\/span><strong>3. Peretasan dan Pencurian Data<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\nTujuan lain dari DDoS Attack bisa saja untuk melakukan peretasan dan pencurian data.\r\n\r\nSaat website tidak bisa diakses, pelaku akan dengan mudah masuk ke sistem dan melakukan peretasan data website.\r\n<h3><span class=\"ez-toc-section\" id=\"4_Uang\"><\/span><strong>4. Uang<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\nTujuan DDoS yang terakhir karena uang, pelaku akan meminta tebusan kepada pemilik website agar menghentikan serangan.\r\n\r\nJika sudah dibayar tebusannya, DDoS akan dimatikan dan website bisa kembali normal.\r\n\r\nJika website sudah down dan tidak bisa diakses, maka korban akan mengalami kerugian.\r\n\r\nContohnya saat website toko online terkena DDoS, pelanggan akan batal melakukan transaksi sehingga mengakibatkan kerugian.\r\n<h2><span class=\"ez-toc-section\" id=\"Tips_Mencegah_DDoS_Attack\"><\/span><strong>Tips Mencegah DDoS Attack<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<span style=\"font-weight: 400;\">Sekarang, mari kita bahas beberapa tips jitu mencegah DDoS attack<\/span>\r\n<ul>\r\n \t<li>\r\n<h3><span class=\"ez-toc-section\" id=\"Monitoring_Traffic_Secara_Reguler_Adalah_Sebuah_Keharusan\"><\/span><strong>Monitoring Traffic Secara Reguler Adalah Sebuah Keharusan\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<\/li>\r\n<\/ul>\r\n<span style=\"font-weight: 400;\">Pertama, lakukan pengecekan aktivitas <\/span><i><span style=\"font-weight: 400;\">traffic <\/span><\/i><span style=\"font-weight: 400;\">Anda secara berkala. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Harapannya, Anda akan mendapatkan gambaran mendalam mengenai <\/span><i><span style=\"font-weight: 400;\">traffic trends <\/span><\/i><span style=\"font-weight: 400;\">website, serta bisa membedakan mana yang termasuk ke dalam <\/span><i><span style=\"font-weight: 400;\">normal <\/span><\/i><span style=\"font-weight: 400;\">maupun <\/span><i><span style=\"font-weight: 400;\">high traffic<\/span><\/i><span style=\"font-weight: 400;\">. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Dari hasil <\/span><a href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/monitoring\/\" target=\"_blank\" rel=\"noopener\"><i><span style=\"font-weight: 400;\">monitoring<\/span><\/i><\/a><span style=\"font-weight: 400;\"> tersebut pula, Anda akan bisa mengidentifikasi gejala DDoS attack lebih awal, terutama jika ada lalu lintas pengunjung yang mencurigakan.\u00a0 <\/span><i><span style=\"font-weight: 400;\">\u00a0\u00a0<\/span><\/i>\r\n<ul>\r\n \t<li>\r\n<h3><span class=\"ez-toc-section\" id=\"Tingkatkan_Kapasitas_Sumber_Daya_Server_Anda\"><\/span><strong>Tingkatkan Kapasitas Sumber Daya Server Anda<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<\/li>\r\n<\/ul>\r\n<span style=\"font-weight: 400;\">Selanjutnya, pastikan bahwa website maupun layanan online Anda didukung dengan kapasitas <\/span><i><span style=\"font-weight: 400;\">bandwidth <\/span><\/i><span style=\"font-weight: 400;\">yang mampu mengatasi lonjakan <\/span><i><span style=\"font-weight: 400;\">traffic<\/span><\/i><span style=\"font-weight: 400;\">. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Untuk itu, ketahui terlebih dahulu level <\/span><i><span style=\"font-weight: 400;\">traffic <\/span><\/i><span style=\"font-weight: 400;\">web Anda, kemudian siapkan <\/span><i><span style=\"font-weight: 400;\">bandwidth<\/span><\/i><span style=\"font-weight: 400;\"> ekstra di atas kebutuhan tersebut sebagai langkah antisipasi.\u00a0<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Tapi perlu diingat, langkah ini hanyalah dimaksudkan agar Anda bisa mendapatkan waktu tambahan untuk mengatasi serangan. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Pasalnya, cara ini tidak lagi menjadi solusi efektif untuk mengatasi DDoS attack; mengingat kualitas dan kuantitas serangan pun juga semakin meningkat dari hari ke hari.<\/span>\r\n<ul>\r\n \t<li>\r\n<h3><span class=\"ez-toc-section\" id=\"Terapkan_Strategi_Proteksi_Berlapis\"><\/span><strong>Terapkan Strategi Proteksi Berlapis<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n<\/li>\r\n<\/ul>\r\n<span style=\"font-weight: 400;\">Jangan lupa bekali <\/span><i><span style=\"font-weight: 400;\">server<\/span><\/i><span style=\"font-weight: 400;\">, jaringan, maupun aplikasi Anda dengan sistem proteksi yang berlipat ganda. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Sebagai contoh, Anda dapat memperkuat layer keamanan Anda dengan mengkombinasikan penggunaan <a href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/firewall\/\" target=\"_blank\" rel=\"noopener\">firewalls<\/a>, anti-spam, content filtering, Virtual Private Network (VPN), serta sistem <a href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/\" target=\"_blank\" rel=\"noopener\">keamanan VPS<\/a> lainnya. \u00a0 \u00a0 <\/span><span style=\"font-weight: 400;\">\u00a0\u00a0<\/span>\r\n<h2><span class=\"ez-toc-section\" id=\"Rekomendasi_Server_yang_Aman\"><\/span><strong>Rekomendasi Server yang Aman\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n<span style=\"font-weight: 400;\">Dalam artikel ini, Anda sudah mempelajari pengetahuan dasar mengenai DDoS attack\u2014mulai dari pengertian, gejala, hingga kategori serangannya. <\/span>\r\n\r\n<span style=\"font-weight: 400;\">Anda juga sudah mengetahui beberapa tips jitu untuk mengantisipasi dan mengatasi ancaman DDoS tersebut.<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Singkatnya, DDoS adalah salah satu jenis <\/span><i><span style=\"font-weight: 400;\">cyber-attacks <\/span><\/i><span style=\"font-weight: 400;\">yang bisa menyerang website siapapun\u2014baik itu <\/span><i><span style=\"font-weight: 400;\">personal website<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><span style=\"font-weight: 400;\">website sekolah<\/span><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">e-commerce<\/span><\/i><span style=\"font-weight: 400;\">\/<\/span><i><span style=\"font-weight: 400;\">online shop<\/span><\/i><span style=\"font-weight: 400;\">, hingga website level <\/span><i><span style=\"font-weight: 400;\">enterprise <\/span><\/i><span style=\"font-weight: 400;\">sekalipun. Yang sangat disayangkan, jenis dan motivasi serangan ini juga terus berevolusi seiring dengan berkembangnya teknologi.<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Jika Anda adalah seorang <\/span><i><span style=\"font-weight: 400;\">webmaster<\/span><\/i><span style=\"font-weight: 400;\">, pastikan layanan web hosting\/server yang Anda pilih juga sudah dilengkapi dengan fitur keamanan untuk mencegah dan mengatasi DDoS attack.\u00a0<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Sebagai rekomendasi, Anda bisa memanfaatkan layanan terbaik dari<a href=\"https:\/\/www.goldenfast.net\/\" target=\"_blank\" rel=\"noopener\"><strong> GoldenFast Network<\/strong><\/a>, seperti <\/span><strong>dedicated server<\/strong><span style=\"font-weight: 400;\">, <\/span><strong>colocation server<\/strong><span style=\"font-weight: 400;\">, hingga <strong>Cloud VPS Server<\/strong><a href=\"https:\/\/www.goldenfast.net\/cloud-vps\/\">\u00a0<\/a><\/span><span style=\"font-weight: 400;\">.<\/span>\r\n<p style=\"text-align: center;\"><a class=\"wp-block-button__link has-luminous-vivid-amber-background-color has-background\" href=\"https:\/\/www.goldenfast.net\/cloud-vps\/?utm_source=website&amp;utm_medium=artikel&amp;utm_campaign=artikel+GFN+ddos+attack\" target=\"_blank\" rel=\"nofollow noopener\">Cek Rekomendasi Layanan Server yang Aman<\/a><\/p>\r\n<span style=\"font-weight: 400;\">Kabar baiknya, semua layanan tersebut didukung oleh tim teknis profesional, 24\/7 <\/span><i><span style=\"font-weight: 400;\">monitoring<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">unmetered bandwidth<\/span><\/i><span style=\"font-weight: 400;\">, <\/span><i><span style=\"font-weight: 400;\">hardware <\/span><\/i><span style=\"font-weight: 400;\">kelas terbaik, serta fitur dan fasilitas terbaik lainnya untuk memastikan jika website\/layanan online Anda akan terbebas dari ancaman DDoS attack.<\/span>\r\n\r\n<span style=\"font-weight: 400;\">Semoga berhasil!\u00a0<\/span>\r\n\r\n<!-- \/wp:post-content -->","protected":false},"excerpt":{"rendered":"<p>Jika Anda adalah seorang webmaster, pasti Anda sering mendengar istilah DDoS attack bukan? Faktanya, jenis serangan cyber ini bukanlah hal baru di dunia maya bahkan sering mengincar website besar. Sejak pertama kali muncul pada tahun 1974, DDoS bahkan terus mengalami perkembangan secara kualitas dan kuantitasnya.\u00a0 Berdasarkan laporan dari Securelist, jumlah serangan DDoS selalu meningkat pada [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2596,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,71,3],"tags":[73,80,78,72,75,76,74,81,77,79],"class_list":["post-81","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-glossary","category-security","category-tips","tag-apa-itu-ddos","tag-application-attacks","tag-cara-mencegah-ddos-attack","tag-ddos-adalah","tag-ddos-attack","tag-kategori-ddos-attack","tag-pengertian-ddos","tag-protocol-attacks","tag-tipe-ddos-attack","tag-volumetric-attacks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya<\/title>\n<meta name=\"description\" content=\"Mari pelajari apa itu DDoS attack dan beberapa tipe serangannya. Di artikel ini, Anda juga akan memahami beberapa tips mencegah DDoS attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya\" \/>\n<meta property=\"og:description\" content=\"Mari pelajari apa itu DDoS attack dan beberapa tipe serangannya. Di artikel ini, Anda juga akan memahami beberapa tips mencegah DDoS attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/\" \/>\n<meta property=\"og:site_name\" content=\"GFN Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-10T00:41:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-29T08:50:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/DDoS-Attack.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1333\" \/>\n\t<meta property=\"og:image:height\" content=\"992\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Amera P. Safira\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amera P. Safira\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/\"},\"author\":{\"name\":\"Amera P. Safira\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/person\\\/c916afa27bf5efd317c18ac835b33dff\"},\"headline\":\"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya\",\"datePublished\":\"2023-04-10T00:41:56+00:00\",\"dateModified\":\"2023-12-29T08:50:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/\"},\"wordCount\":1045,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/DDoS-Attack.webp\",\"keywords\":[\"apa itu ddos\",\"application attacks\",\"cara mencegah ddos attack\",\"ddos adalah\",\"ddos attack\",\"kategori ddos attack\",\"pengertian ddos\",\"protocol attacks\",\"tipe ddos attack\",\"volumetric attacks\"],\"articleSection\":[\"Glossary\",\"Security\",\"Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/\",\"name\":\"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/DDoS-Attack.webp\",\"datePublished\":\"2023-04-10T00:41:56+00:00\",\"dateModified\":\"2023-12-29T08:50:44+00:00\",\"description\":\"Mari pelajari apa itu DDoS attack dan beberapa tipe serangannya. Di artikel ini, Anda juga akan memahami beberapa tips mencegah DDoS attack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/DDoS-Attack.webp\",\"contentUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/DDoS-Attack.webp\",\"width\":1333,\"height\":992,\"caption\":\"DDoS Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/tips-memilih-vps\\\/keamanan\\\/ddos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\",\"name\":\"GFN Blog\",\"description\":\"Blog | GoldenFast Network\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#organization\",\"name\":\"Goldenfast Network\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logogoldenfast.png\",\"contentUrl\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logogoldenfast.png\",\"width\":232,\"height\":80,\"caption\":\"Goldenfast Network\"},\"image\":{\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/#\\\/schema\\\/person\\\/c916afa27bf5efd317c18ac835b33dff\",\"name\":\"Amera P. Safira\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g\",\"caption\":\"Amera P. Safira\"},\"description\":\"With a newfound love of the IT world, Amera likes to turn complex topics into easy-to-read and comprehensive articles. In her spare times, Amera enjoys playing video games and reading every book she can find.\",\"url\":\"https:\\\/\\\/www.goldenfast.net\\\/blog\\\/author\\\/amera-p-safira\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya","description":"Mari pelajari apa itu DDoS attack dan beberapa tipe serangannya. Di artikel ini, Anda juga akan memahami beberapa tips mencegah DDoS attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/","og_locale":"en_US","og_type":"article","og_title":"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya","og_description":"Mari pelajari apa itu DDoS attack dan beberapa tipe serangannya. Di artikel ini, Anda juga akan memahami beberapa tips mencegah DDoS attack.","og_url":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/","og_site_name":"GFN Blog","article_published_time":"2023-04-10T00:41:56+00:00","article_modified_time":"2023-12-29T08:50:44+00:00","og_image":[{"width":1333,"height":992,"url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/DDoS-Attack.webp","type":"image\/webp"}],"author":"Amera P. Safira","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Amera P. Safira","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#article","isPartOf":{"@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/"},"author":{"name":"Amera P. Safira","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/person\/c916afa27bf5efd317c18ac835b33dff"},"headline":"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya","datePublished":"2023-04-10T00:41:56+00:00","dateModified":"2023-12-29T08:50:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/"},"wordCount":1045,"commentCount":0,"publisher":{"@id":"https:\/\/www.goldenfast.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/DDoS-Attack.webp","keywords":["apa itu ddos","application attacks","cara mencegah ddos attack","ddos adalah","ddos attack","kategori ddos attack","pengertian ddos","protocol attacks","tipe ddos attack","volumetric attacks"],"articleSection":["Glossary","Security","Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/","url":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/","name":"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya","isPartOf":{"@id":"https:\/\/www.goldenfast.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#primaryimage"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/DDoS-Attack.webp","datePublished":"2023-04-10T00:41:56+00:00","dateModified":"2023-12-29T08:50:44+00:00","description":"Mari pelajari apa itu DDoS attack dan beberapa tipe serangannya. Di artikel ini, Anda juga akan memahami beberapa tips mencegah DDoS attack.","breadcrumb":{"@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#primaryimage","url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/DDoS-Attack.webp","contentUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/DDoS-Attack.webp","width":1333,"height":992,"caption":"DDoS Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.goldenfast.net\/blog\/tips-memilih-vps\/keamanan\/ddos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.goldenfast.net\/blog\/"},{"@type":"ListItem","position":2,"name":"DDoS Attack: Pengertian, Tipe, dan Cara Mencegahnya"}]},{"@type":"WebSite","@id":"https:\/\/www.goldenfast.net\/blog\/#website","url":"https:\/\/www.goldenfast.net\/blog\/","name":"GFN Blog","description":"Blog | GoldenFast Network","publisher":{"@id":"https:\/\/www.goldenfast.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.goldenfast.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.goldenfast.net\/blog\/#organization","name":"Goldenfast Network","url":"https:\/\/www.goldenfast.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2021\/04\/logogoldenfast.png","contentUrl":"https:\/\/www.goldenfast.net\/blog\/wp-content\/uploads\/2021\/04\/logogoldenfast.png","width":232,"height":80,"caption":"Goldenfast Network"},"image":{"@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.goldenfast.net\/blog\/#\/schema\/person\/c916afa27bf5efd317c18ac835b33dff","name":"Amera P. Safira","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb34a857ff46cf1b57b799f039a6a8c64d42a84f067d80dc2c8bab4bbe54c07d?s=96&d=mm&r=g","caption":"Amera P. Safira"},"description":"With a newfound love of the IT world, Amera likes to turn complex topics into easy-to-read and comprehensive articles. In her spare times, Amera enjoys playing video games and reading every book she can find.","url":"https:\/\/www.goldenfast.net\/blog\/author\/amera-p-safira\/"}]}},"_links":{"self":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/81","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/comments?post=81"}],"version-history":[{"count":19,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/81\/revisions"}],"predecessor-version":[{"id":3178,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/posts\/81\/revisions\/3178"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/media\/2596"}],"wp:attachment":[{"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/media?parent=81"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/categories?post=81"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.goldenfast.net\/blog\/wp-json\/wp\/v2\/tags?post=81"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}