The Effectiveness of the Port Knocking Method in Computer Security
DOI:
https://doi.org/10.55927/ijis.v2i6.4526Keywords:
Computer Network, Security, Port KnockingAbstract
Computer network is a group of autonomous computers that are interconnected with each other using communication protocols through communication media so that they can share information, programs, share hardware devices such as printers, hard disks, and so on. One of the most important network components is network security, computer security involves various aspects, including protection against unauthorized access, data theft, system tampering, and operational disruptions. This research method uses descriptive method. At this stage specifications are determined regarding the system that will be designed to meet the objectives of this study, the Port Knocking method to secure the Router can be applied to Mikrotik routers by utilizing a firewall which functions to guard against illegal access and overcome problems caused by Attackers
Downloads
References
A. Z. Mardiansyah, Y. M. Abdussyakur, and A. H. Jatmika, “OPTIMASI PORT KNOCKING DAN HONEYPOT MENGGUNAKAN IPTABLES SEBAGAI KEAMANAN JARINGAN PADA SERVER (Port Knocking and Honeypot Optimization using IPTables for Serverrs Network Security ),” vol. 3, no. 2, 2021, [Online]. Available: http://jtika.if.unram.ac.id/index.php/JTIKA/
R. Damanik and P. Andika, “TERHADAP SERANGAN CYBER WARFARE”.
A. Amarudin, “Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking,” J. Teknoinfo, vol. 12, no. 2, p. 72, 2018, doi: 10.33365/jti.v12i2.121.
T. Taslim, D. Toresa, and S. Syahtriatna, “Pengaruh Pengaplikasian E-learning Terhadap Hasil Belajar (Studi Kasus : Mahasiswa Keamanan Komputer Fasilkom Unilak),” INOVTEK Polbeng - Seri Inform., vol. 2, no. 2, p. 182, 2017, doi: 10.35314/isi.v2i2.205.
R. Nurbahri and G. W. Nurcahyo, “Jurnal Sistim Informasi dan Teknologi Analisis Penggunaan Metode Port Knocking pada Sistem Keamanan Jaringan Komputer ( Studi Kasus di Universitas Baiturrahmah ),” vol. 5, pp. 102–108, 2023, doi: 10.37034/jsisfotek.v5i1.211.
P. Riska, P. Sugiartawan, and I. Wiratama, “Sistem Keamanan Jaringan Komputer Dan Data Dengan Menggunakan Metode Port Knocking,” J. Sist. Inf. dan Komput. Terap. Indones., vol. 1, no. 2, pp. 53–64, 2018, doi: 10.33173/jsikti.12.
E. A. R. and B. L. P. Mehran, “PKT: Secure Port Knock-Tunneling, an enhanced port security authentication mechanism,",” in IEEE Symposium on Computers & Informatics (ISCI), malaysia, 2012, pp. 145–149. doi: doi: 10.1109/ISCI.2012.6222683.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Muhammad Nur, Teguh, Wasis Waskito, Azhar Fathoni, Bagas, Yuda, Ramadan Galih, Alif Ainnun Qoyum, Samsoni
This work is licensed under a Creative Commons Attribution 4.0 International License.