Implementation of a Network Security System Using the Simple Port Knocking Method on a Mikrotik-Based Router

Dian Novianto, Lukas Tommy, Yohanes Setiawan Japriadi
{"title":"Implementation of a Network Security System Using the Simple Port Knocking Method on a Mikrotik-Based Router","authors":"Dian Novianto, Lukas Tommy, Yohanes Setiawan Japriadi","doi":"10.53697/jkomitek.v1i2.375","DOIUrl":null,"url":null,"abstract":"One of the problems in remote access to the system is the act of hacking to illegally gain access rights to a system. Therefore the need for an additional mechanism in user authentication in addition to the username and password parameters. The port knocking method is an option that can be implemented in this problem. Port knocking is a security system that functions to open or close access to certain ports by using a firewall on network devices by sending certain packets or connections. The connection used can be in the form of TCP, UDP, or ICMP protocols. The network system development method used in this research is the PPDIOO method developed by CISCO, where the cycle sequence includes: . prepare (preparation), Plan (planning), Design (Design), Implement (Implementation), Operate (Operation) and Optimize (Optimization). The result of implementing the Port Knocking method on a system on a computer network is that the system will refuse if the login activity on the system does not or sends additional parameters incorrectly, besides that the network admin can find out the activity on the network system if someone from outside fails when accessing the system through the port. so that actions can be taken according to system security requirements.","PeriodicalId":371693,"journal":{"name":"Jurnal Komputer, Informasi dan Teknologi (JKOMITEK)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Komputer, Informasi dan Teknologi (JKOMITEK)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.53697/jkomitek.v1i2.375","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

One of the problems in remote access to the system is the act of hacking to illegally gain access rights to a system. Therefore the need for an additional mechanism in user authentication in addition to the username and password parameters. The port knocking method is an option that can be implemented in this problem. Port knocking is a security system that functions to open or close access to certain ports by using a firewall on network devices by sending certain packets or connections. The connection used can be in the form of TCP, UDP, or ICMP protocols. The network system development method used in this research is the PPDIOO method developed by CISCO, where the cycle sequence includes: . prepare (preparation), Plan (planning), Design (Design), Implement (Implementation), Operate (Operation) and Optimize (Optimization). The result of implementing the Port Knocking method on a system on a computer network is that the system will refuse if the login activity on the system does not or sends additional parameters incorrectly, besides that the network admin can find out the activity on the network system if someone from outside fails when accessing the system through the port. so that actions can be taken according to system security requirements.
基于microsoft路由器的简单端口敲门网络安全系统的实现
远程访问系统的问题之一是黑客行为非法获得对系统的访问权限。因此,除了用户名和密码参数之外,还需要在用户身份验证中添加额外的机制。端口敲门方法是该问题中可以实现的一种方法。端口敲门是一种安全系统,通过发送特定的数据包或连接,在网络设备上利用防火墙打开或关闭对某些端口的访问。使用的连接可以是TCP、UDP或ICMP协议。本研究使用的网络系统开发方法是CISCO公司开发的PPDIOO方法,其中循环顺序包括:。prepare(准备)、Plan(计划)、Design(设计)、Implement(实施)、Operate(操作)和Optimize(优化)。在计算机网络上的系统上实现端口敲门方法的结果是,如果系统上的登录活动没有或发送错误的附加参数,系统将拒绝,此外,如果外部人员通过端口访问系统时失败,网络管理员可以发现网络系统上的活动。以便根据系统安全需求采取相应的操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信