IMPLEMENTASI PORT KNOCKING PADA MIKROTIK DENGAN MENERAPKAN INTRUSION PREVENTION SYSTEM (IPS) UNTUK SISTEM KEAMANAN JARINGAN

Muhammad, Nur Fauzi Akmal Akbar (2023) IMPLEMENTASI PORT KNOCKING PADA MIKROTIK DENGAN MENERAPKAN INTRUSION PREVENTION SYSTEM (IPS) UNTUK SISTEM KEAMANAN JARINGAN. Undergraduate Thesis thesis, Institut Teknologi Telkom Purwokerto.

[img] Text
Cover.pdf

Download (1MB)
[img] Text
Abstract.pdf

Download (184kB)
[img] Text
Abstrak.pdf

Download (185kB)
[img] Text
BAB I.pdf

Download (309kB)
[img] Text
BAB II.pdf

Download (615kB)
[img] Text
BAB III.pdf

Download (2MB)
[img] Text
BAB IV.pdf
Restricted to Registered users only

Download (1MB)
[img] Text
BAB V.pdf

Download (184kB)
[img] Text
Daftar Pustaka.pdf

Download (301kB)

Abstract

In today's era of modern technology, computer network security is a very important thing to pay attention to. A computer network is a system consisting of several computers designed to be able to share data, information and resources. The increasing number of intrusions or attacks carried out by hackers is one of the main factors in this case, especially when the server computer is connected to the Internet, attacks will increase and various attack techniques continue to develop including Port Scanning and DDoS which cannot be ignored. Based on the problems that occur, the authors need to monitor network access and prevent unauthorized use of network resources by using the Port Knocking method from Mikrotik and the Intrusion Prevention System (IPS) on servers that can withstand cyber attacks in the form of Port Scanning and DDoS. Mikrotik is a computer network device in the form of hardware and software that can function as a router, as a filtering, switching and other tool. Port Knocking is the concept of hiding a remote service inside a firewall that allows access to that port only to find out the service after the client has successfully authenticated to the firewall. Intrusion Prevention System (IPS) is a device that works for monitoring network traffic, detecting suspicious activity and making early prevention of intrusions or events that can make the network run inappropriately. In the process of this method, install tools and apply Port Knocking and IPS rules on network security systems. The results of this study are the authors successfully apply Snort rules to detect and prevent DDoS attacks and successfully apply Port Knocking rules to close all ports attacked by Port Scanning, so that when an attack occurs, action can be taken quickly. Keyword : Security Network, Intrusion Prevention System, Port Knocking, Denial of Service, Port Scanning.

Item Type: Thesis (Undergraduate Thesis)
Subjects: T Technology > TS Manufactures
Divisions: Faculty of Industrial Engineering and Design > Industrial Engineering
Depositing User: repository staff
Date Deposited: 29 Jul 2024 03:42
Last Modified: 29 Jul 2024 03:42
URI: http://repository.ittelkom-pwt.ac.id/id/eprint/10794

Actions (login required)

View Item View Item