Integrated Random Forest over Network-Based Firewall Implementation on Mikrotik Network for Phishing Filtering

Authors

Agustinus Noertjahyana

Tenggilis Utara II / 7., Surabaya (Indonesia)

Stephanus Antonius Ananda

Tenggilis Utara II / 7., Surabaya (Indonesia)

Juven Axel Wedianto

Tenggilis Utara II / 7., Surabaya (Indonesia)

Article Information

DOI: 10.51244/IJRSI.2026.13010117

Subject Category: Social science

Volume/Issue: 13/1 | Page No: 1333-1341

Publication Timeline

Submitted: 2026-01-22

Accepted: 2026-01-27

Published: 2026-02-06

Abstract

Phishing attacks have escalated significantly, necessitating robust yet cost-effective network security solutions. Addressing the limitations of static blocking in Mikrotik and the prohibitive costs of dedicated hardware firewalls, this paper proposes an automated filtering system that integrates the Random Forest Machine Learning algorithm with Mikrotik architecture via a Python-based RouterOS API. The proposed system enables dynamic monitoring of DNS caches to automatically identify and block phishing domains through firewall drop rules. Experimental evaluation involved feature selection, offline validation, and real-world deployment. Results demonstrate that the 10-feature model delivers the optimal balance between accuracy and latency, achieving 90% accuracy with an average classification time of 11.5 seconds. In live network testing, the system successfully detected and mitigated phishing threats within 7 to 21 seconds. While CPU utilization increased by 7-40% during active detection, memory efficiency remained stable. This study validates that integrating Random Forest with Mikrotik offers an adaptive, scalable, and economical solution for network-based phishing prevention.

Keywords

Cognitive Security, Firewall Automation, Mikrotik, Phishing Filtering

Downloads

References

1. Cloudflare, "What is phishing? | Phishing attack prevention," Cloudflare Learning Center. [Online]. Available: https://www.cloudflare.com/learning/access-management/phishing-attack/. [Accessed: Jan. 23, 2026]. [Google Scholar] [Crossref]

2. Petrosyan, "Number of phishing domain names worldwide from 1st quarter 2013 to 4th quarter 2024," Statista, Sep. 1, 2025. [Online]. Available: https://www.statista.com/statistics/266155/number-of-phishing-domain-names-worldwide/. [Google Scholar] [Crossref]

3. RocketMeUpNetworking, "Next-Generation Firewalls (NGFW) — Beyond Traditional Security Measures," Medium, Oct. 28, 2024. [Online]. Available: https://medium.com/@RocketMeUpNetworking/next-generation-firewalls-ngfw-beyond-traditional-security-measures-d2ebe6dcab8b. [Google Scholar] [Crossref]

4. RevoU, "Apa itu Mikrotik? Pengertian, Fungsi, dan Jenisnya," RevoU.co. [Online]. Available: https://www.revou.co/kosakata/Mikrotik. [Google Scholar] [Crossref]

5. H. P. Fitrian, F. Dani, I. Fadilah, R. D. Fauzan, and M. R. Ardhyansyah, "Implementasi Mikrotik firewall sebagai solusi filtering situs judi online dalam jaringan," JATI (Jurnal Mahasiswa Teknik Informatika), vol. 9, no. 1, pp. 1685–1691, 2025. DOI: 10.36040/jati.v9i1.12781. [Google Scholar] [Crossref]

6. B. Māris, "API Implementation Details," Mikrotik Documentation, Feb. 27, 2025. [Online]. Available: https://help.Mikrotik.com/docs/spaces/ROS/pages/47579160/API. [Google Scholar] [Crossref]

7. T. Jason, "Prediksi phishing menggunakan machine learning support vector, dan random forest," Undergraduate Thesis, Informatics Dept., Petra Christian University, Surabaya, Indonesia, 2024. [Online]. Available: https://dewey.petra.ac.id/digital/view/59221. [Google Scholar] [Crossref]

8. Mostafavi, "Farah_phishing Dataset, Version 1," Kaggle Datasets, Nov. 2024. [Online]. Available: https://www.kaggle.com/datasets/akrammostafavi/farah-phishing. [Google Scholar] [Crossref]

9. D. Kurniawan, Pengenalan Machine Learning dengan Python, 6th ed. Jakarta, Indonesia: Elex Media Komputindo, 2020. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles