The Effectiveness of the Port Knocking Method in Computer Security

Authors

  • Muhammad Nur Pamulang University
  • Teguh Pamulang University
  • Wasis Waskito Pamulang University
  • Azhar Fathoni Pamulang University
  • Bagas Pamulang University
  • Yuda Pamulang University
  • Ramadan Galih Pamulang University
  • Alif Ainnun Qoyum Pamulang University
  • Samsoni Pamulang University

DOI:

https://doi.org/10.55927/ijis.v2i6.4526

Keywords:

Computer Network, Security, Port Knocking

Abstract

Computer network is a group of autonomous computers that are interconnected with each other using communication protocols through communication media so that they can share information, programs, share hardware devices such as printers, hard disks, and so on. One of the most important network components is network security, computer security involves various aspects, including protection against unauthorized access, data theft, system tampering, and operational disruptions. This research method uses descriptive method. At this stage specifications are determined regarding the system that will be designed to meet the objectives of this study, the Port Knocking method to secure the Router can be applied to Mikrotik routers by utilizing a firewall which functions to guard against illegal access and overcome problems caused by Attackers

Downloads

Download data is not yet available.

References

A. Z. Mardiansyah, Y. M. Abdussyakur, and A. H. Jatmika, “OPTIMASI PORT KNOCKING DAN HONEYPOT MENGGUNAKAN IPTABLES SEBAGAI KEAMANAN JARINGAN PADA SERVER (Port Knocking and Honeypot Optimization using IPTables for Serverrs Network Security ),” vol. 3, no. 2, 2021, [Online]. Available: http://jtika.if.unram.ac.id/index.php/JTIKA/

R. Damanik and P. Andika, “TERHADAP SERANGAN CYBER WARFARE”.

A. Amarudin, “Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking,” J. Teknoinfo, vol. 12, no. 2, p. 72, 2018, doi: 10.33365/jti.v12i2.121.

T. Taslim, D. Toresa, and S. Syahtriatna, “Pengaruh Pengaplikasian E-learning Terhadap Hasil Belajar (Studi Kasus : Mahasiswa Keamanan Komputer Fasilkom Unilak),” INOVTEK Polbeng - Seri Inform., vol. 2, no. 2, p. 182, 2017, doi: 10.35314/isi.v2i2.205.

R. Nurbahri and G. W. Nurcahyo, “Jurnal Sistim Informasi dan Teknologi Analisis Penggunaan Metode Port Knocking pada Sistem Keamanan Jaringan Komputer ( Studi Kasus di Universitas Baiturrahmah ),” vol. 5, pp. 102–108, 2023, doi: 10.37034/jsisfotek.v5i1.211.

P. Riska, P. Sugiartawan, and I. Wiratama, “Sistem Keamanan Jaringan Komputer Dan Data Dengan Menggunakan Metode Port Knocking,” J. Sist. Inf. dan Komput. Terap. Indones., vol. 1, no. 2, pp. 53–64, 2018, doi: 10.33173/jsikti.12.

E. A. R. and B. L. P. Mehran, “PKT: Secure Port Knock-Tunneling, an enhanced port security authentication mechanism,",” in IEEE Symposium on Computers & Informatics (ISCI), malaysia, 2012, pp. 145–149. doi: doi: 10.1109/ISCI.2012.6222683.

Downloads

Published

2023-06-30

How to Cite

Muhammad Nur, Teguh, Wasis Waskito, Azhar Fathoni, Bagas, Yuda, Ramadan Galih, Alif Ainnun Qoyum, & Samsoni. (2023). The Effectiveness of the Port Knocking Method in Computer Security. International Journal of Integrative Sciences, 2(6), 861–868. https://doi.org/10.55927/ijis.v2i6.4526

Issue

Section

Articles