Mikrotik Login Security with Port-Knocking and Brute Force Firewall at PT. Time Excelindo

Authors

  • Iwan Giri Waluyo Pamulang University
  • Dedy Kurniawan Pamulang University

DOI:

https://doi.org/10.55927/ijis.v2i7.4782

Keywords:

Mikrotik Router, Computer Network , Security , Port Knoking, Firewall, Brute force

Abstract

In today's digital era, the use of MikroTik routers is increasingly common in companies, including PT Time Excelindo. However, attacks on MikroTik router logins are a frequent problem, and the company has a need to have a cheap and simple security system. This thesis aims to implement login security techniques using Port-Knocking and brute force firewalls on MikroTik routers at PT Time Excelindo, with the aim of providing solutions that are affordable and easy to implement. This study focuses on identifying the problems faced by PT Time Excelindo, namely repeated attacks against MikroTik router logins. The proposed solution involves implementing a Port- Knocking technique which will hide the login port on the router, so that only legitimate access will be allowed after a series of specific requests are made to certain ports. In addition, the firewall will also be activated to block brute force attacks by limiting the number of failed login attempts

Downloads

Download data is not yet available.

References

Aji, R. P., Prayudi, Y., & Luthfi, A. (2023). Analysis of Brute Force Attack Logs toward Nginx Web Server on Dashboard: Improved Log Logging System Using Forensic Investigation Method, 39-48.

Amarudin, A., & Ulum, F. (2018). Network Security Design on Mikrotik Router OS Using the Port Knocking Method.

Amarudin. (2018). Analysis and Implementation of Network Security on Mikrotik Router OS Using the Port Knocking Method

Amarudin. (2018). Analysis and Implementation of Network Security on Mikrotik Router OS Using the Port Knocking Method. (Unpublished thesis). [Name of Univers Rahmatillah, A., Firdaus, A., & Laila, E. (2021). Implementation of Intrusion Prevention System (IPS) on Network Security with Telegram-Based Notifications in Computer Engineering Department. ity/Institution], [Location].

Basorudin, B., Rouza, E., Yanto, B., & Mustafa, S. R. (2021). Design and Implementation of Configuration of Wifi Routers and Wireless Networks with Rb951ui-2nd.

Fran, Afrian. (2019) The Importance of Computer Security.

Mulyanto, Y., Julkarnain, M., & Afahar, A.

J. (2021). Implementation of Port Knocking for Network Security at SMKN 1 Sumbawa Besar.

Setiawan D, Erwin, Ridwansyah, and Raharjo M. 2023. “Next-Generation Firewall Network Security Design Using Routers,

Fortinet At PT. Alodokter Technology Solutions”. Integrated Informatics Journal 9 (1):34-39.

Downloads

Published

2023-07-30

How to Cite

Iwan Giri Waluyo, & Kurniawan, D. (2023). Mikrotik Login Security with Port-Knocking and Brute Force Firewall at PT. Time Excelindo. International Journal of Integrative Sciences, 2(7), 971–978. https://doi.org/10.55927/ijis.v2i7.4782

Issue

Section

Articles