Implementasi Multiple Port knocking dan Port blocking Untuk Peningkatan Keamanan Hak Akses Administrator Pada Router board Mikrotik

Dian Novianto(1), Yohanes Setiawan Japriadi(2), Lukas Tommy(3),


(1) Program Studi Teknik Informatika, ISB Atma Luhur, Pangkal Pinang
(2) Program Studi Teknik Informatika, ISB Atma Luhur, Pangkal Pinang
(3) Program Studi Teknik Informatika, ISB Atma Luhur, Pangkal Pinang
Corresponding Author

Abstract


Access rights to network systems are things that must be limited because they involve the operations of an organization. Making a password alone is not enough, because there is a brute force attack that can guess the password, so that other people who are not entitled, can get access rights to the network system. Therefore it is necessary to create a mechanism to avoid brute force attacks to secure access rights, especially administrator access rights. One combinations of method that can be used is port knocking and port blocking, using 3 combinations of port knocking and port blocking will increase the chances of a brute force attack failing because failure to knock will activate the firewall to enable port blocking. For the application of this method, a tool is needed in the form of an RB951Ui-2nD routerboard, besides that, a network system development method is needed which is a reference in system development, in this study the method used is PPDIOO which consists of Prepare, Plan, Design, Implement, Operate, and Optimize. And also some supporting tools for the development of the system in the form of Unified Modeling Language (UML). The result of applying 3 combinations of multiple port knocking, produces 6 opportunities that can strengthen the router's access security system from brute force attacks.


Keywords


Port knocking, port blocking, mikrotik

References


https://www.cnnindonesia.com/teknologi/20210421113409-185-632702/waspada-serangan-bruteforce-di-ri-dan-cara-mengatasinya

A. Z. Mardiansyah, Y. M. Abdussyakur, and A. H. Jatmika, “OPTIMASI PORT KNOCKING DAN HONEYPOT MENGGUNAKAN Security ),” vol. 3, no. 2, 2

Amarudin, “Analisis Dan Implementasi Keamanan Jaringan Pada Mikrotik Router Menggunakan Metode Port knocking,” Semin. Nas. Sains dan Teknol. 2018, pp. 1–7, 2018.

U. B. Darma, T. Brades, T. Komputer, F. Vokasi, and U. B. Darma, “PEMANFATAAN METODE PORT KNOCKING DAN BLOCKING,” pp. 99–107.

Imam Solikin. 2017. Penerapan Metode PPDIOO dalam Pengembangan LAN dan WLAN. TEKNOMATIKA, Vol.07, No.01, hal 65-73.

Dian Novianto, Tri Sugihartono. 2020. Sistem Deteksi Kualitas Buah Jambu Air Berdasarkan Warna Kulit Menggunakan Algoritma Principal Component Analysis (Pca) dan K-Nearest Neigbor (K-NN). JURNAL ILMIAH INFORMATIKA GLOBAL VOLUME 11 No. 2 Desember 2020

R. Rizal, R. Ruuhwan, and K. A. Nugraha, “Implementasi Keamanan Jaringan Menggunakan Metode Port blocking dan Port knocking Pada Mikrotik RB-941,” J. ICT Inf. Commun. Technol., vol. 19, no. 1, pp. 1–8, 2020, doi: 10.36054/jict-ikmi.v19i1.119.

D. Desmira and R. Wiryadinata, “Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port knocking,” J. Ilmu Komput. dan Sist. Inf., vol. 5, no. 1, pp. 28–33, 2022, doi: 10.55338/jikomsi.v5i1.242.

J. Al Amien, “Implementasi Keamanan Jaringan Dengan Iptables Sebagai Firewall Menggunakan Metode Port knocking,” J. Fasilkom, vol. 10, no. 2, pp. 159–165, 2020.

M. Julkarnain and A. J. Afahar, “Implementasi Port knocking Untuk Keamanan Jaringan Smkn 1 Sumbawa Besar,” J. Inform. Teknol. dan Sains, vol. 3, no. 2, pp. 326–335, 2021, [Online]. Available: http://www.jurnal.uts.ac.id/index.php/JINTEKS/article/view/1016.

A. Z. Mardiansyah, Y. M. Abdussyakur, and A. H. Jatmika, “OPTIMASI PORT KNOCKING DAN HONEYPOT MENGGUNAKAN Security ),” vol. 3, no. 2, 2021.


Full Text: PDF

Article Metrics

Abstract View : 112 times
PDF Download : 36 times

DOI: 10.56327/jtksi.v6i1.1399

Refbacks

  • There are currently no refbacks.