IMPLEMENTASI KEAMANAN MIKROTIK MENGUNAKAN METODE SIMPLE PORT KNOCKING PADA SMAN 1 NGANTANG

  • Nasrul Firdaus Program Studi Sistem Informasi, STMIK PPKIA Pradnya Paramita
  • Angga Fitriawan Program Studi Teknologi Informasi, STMIK PPKIA Pradnya Paramita

Abstract

A computer network is a group of computers or more that are connected to each other electronically.Network security is currently one of the most important and growing issues.Microtic security at SMAN 1 NGANTANG is still not fully considered, it makes the network administrator nervous about the Brute Force attack.SMAN 1 NGANTANG is a high school located in the poor district of Malang, SMAN 1 NGANTANG has services for students and teachers, namely wifi based on mikrotik.At present the security of mikrotik there has not been prioritized, even the microticists there are still vulnerable to attacks from those who do not have authorization.Because security has not been prioritized, mikrotik there is vulnerable to attacks from outside and inside.Therefore, researchers are interested in implementing the Simple Port Knocking method on the mikrotik server of SMAN 1 NGANTANG.Testing in this study using a router that uses a mikrotik operating system, this study will compare mikrotik without using Simple Port Knocking with mikrotik that use Simple Port Knocking and will be attacked by Brute Force. The results of this study are the comparison table of security mikrotik without using Simple Port Knocking and using Simple Port Knocking.

 

Keywords: Mikrotik Security, Firewall, Simple Port Knocking, Brute Force Method, SMAN 1 NGANTANG

References

Anonim. 2005. Simple Port Knocking.(http://mikrotik.co.id/artikel_lihat.php?id=105, 12 November 2016 14.24 WIB).

Anonim. 2011. WINBOX (http://www.trainingmikrotik.co.id/artikel/winbox-22.html, 12 November 2016 15.24 WIB).

Aprianto, Asmunin. 2016.Implementasi simple port knocking pada dynamic routing (ospf) menggunakan simulasi gns3.Manajemen Informatika, 5(2): 7 – 17.

Asyikin, Noor Arifin. 2013. Arsitektur Jaringan Komputer Di Perpustakaan Madrasah Aliyah Negeri 1 Yogyakarta.Poros Teknik, 5(1): 33 – 50.

Gunawan, I. 2016.Penggunaan Brute Force Attack Dalam Penerapannya Pada Crypt8 Dan Csa-Rainbow Tool Untuk Mencari Biss.InfoTekJar, 1(1): 52 – 55.

Harwood, Mike. (2009). CompTIA Network+. N10-004 Exam Prep (3rd Edition)

Haryanto, E., Widyawan., Adhipta, D. 2016. Meningkatkan Mekanisme Keamanan Otorisasi Port Dengan Metode Simple Port KnockingTunneling. SRITI, issn: 2502-6526 : 187 – 194.

Ikhwan. S., Elfitri, I. Analisa delay yang terjadi pada penerapandemilitarized zone (dmz) terhadap server universitas andalas. Jurnal Nasional Teknik Elektro, 3 (2): 118-124.

Irawan, Budhi. 2005. Jaringan Komputer. Graha Ilmu, Yogyakarta: 69-70.

Irawan, Dedi. 2015. Keamanan Jaringan Komputer Dengan Metode Blocking Port Pada Laboratorium Komputer Program Diploma-Iii Sistem Informasi Universitas Muhammadiyah Metro. Jurnal Manajemen Informatika Program Diploma III UM Metro, 2 (5): 1-9 .

Iswadi, Arie. 2012. Optimalisasi Jaringan Wireless Dengan Router Mikrotik Studi Kasus Kampus Bsi Tangerang. BSI Purwokerto, ISSN: 2338 - 8161 2(1): 37 – 45.

Krzywinski, M. 2003. Network Authentication Across Closed Ports. Sys Admin, 12 (6): 9-12.

Pamungkas, Ajika Canggih. 2016. Manajemen Bandwith Menggunakan Mikrotik Routerboard Di Politeknik Indonusa Surakarta. Politeknik Indonusa Surakarta, ISSN : 2442-7942

Permadi, A. F., Raharjo. D.S., Christyowidiasmoro.2013. Keamanan Jaringan pada IPTV. POMITS, 1 (1): 1-6.

Pratama, I.P.A.E. 2014.Smart City Beserta Cloud Computing dan Teknologi – Teknologi Pendukung Lainnya. Bandung: Informatika Bandung.

Sumardi, Triyono, R.A. 2013. Rancang bangun sistem keamanan jaringan dengan metode blocking port pada sekolahmenengah kejuruan karya nugraha boyolali.IJNS.issn: 2302-5700. 2 (1):16 - 21.

Sweetania, D. (2012). Uji Coba Teknologi Security Firewall Pada System Networking Dengan Menggunakan Microsoft Forefront Threat Management Gateway. UG Jurnal. 6(2): 1 – 8.

Syakur, M. S., Wijanarto. 2015. Generator Teka-Teki Silang Menggunakan Algoritma Backtracking dan Brute Force. Journal of Applied Intelligent System, 1(1): 25-34.

Tamutama, Luka, Tamutama, H. 1993 .Mengenal Local Area Network (LAN). Jakarta: PT Elex Media Komputindo

Wijayanta, S., Muslihudin.2013. Pembangunan Web Proxy Dengan Mikrotik Untuk Mendukung Internet Sehat Di Smk Muhammadiyah 1 Patuk Gunungkidul. Universitas Ahmad Dahlan. 1 (1) : 259 – 267.

Yuwono, Tjahyadi. 1994. Base III + Fox Base + Multi User (Local Area Network). Jakarta: PT Elex Media Komputindo.

Published
2018-10-30