Implementation of Border Gateway Protocol (BGP) Community for DDoS Flooding Mitigation in the Communication and Information Agency of East Java Province
Downloads
Distributed Denial-of-Service (DDoS) attacks are a serious threat to network infrastructure that can cripple services by flooding systems with malicious traffic. This study implements the attributes of the Border Gateway Protocol (BGP) Community together with Remote Triggered Black Hole (RTBH) as an effective mitigation strategy for the Communication and Information Service of East Java Province. The developed solution leverages BGP routing capabilities to quickly identify and discard attack traffic at the network edge through coordinated route marking. Implementation includes the use of BGP Community tags (300:222) to flag dangerous traffic routes, automatic blackhole routing setup through coordination with upstream service providers, and validation of the framework through real-time simulations using GNS3. The results show this solution can mitigate volumetric attacks in seconds, with a 100% blocking rate for marked prefixes while maintaining normal operation for unaffected routes. This approach offers significant improvements in response speed and scalability for government networks facing advanced DDoS threats. The findings of the study provide practical implementation guidance and empirical evidence supporting BGP-based DDoS mitigation, particularly for the Indonesian government's digital infrastructure.
Copyright (c) 2025 Adi Dwi Cahyono, Made Kamisutara

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International (CC-BY-SA). that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.



