Implementasi Sistem Port Knocking Dalam Meningkatkan Keamanan Mikrotik Di PIT PT CDE COAL Bengkulu Utara

Suwandi Ramadhan(1), Dedy Abdullah(2), Yulia Darmi(3), Khairullah Khairullah(4),


(1) Program Studi Teknik Informatika, Universitas Muhammadiyah Bengkulu
(2) Program Studi Teknik Informatika, Universitas Muhammadiyah Bengkulu
(3) Program Studi Teknik Informatika, Universitas Muhammadiyah Bengkulu
(4) Program Studi Teknik Informatika, Universitas Muhammadiyah Bengkulu
Corresponding Author

Abstract


In the modern technological era, the development of computers and networks has presented various new challenges, particularly in terms of security. The Internet of Things (IoT) and next-generation network technologies such as 5G have transformed the way we interact with devices and networks, bringing significant security risks. Therefore, PT Cakrawala Dinamika Energi (PT CDE) faces similar issues at its mining site. Network security in this area remains vulnerable to attacks by unauthorized parties. This research aims to enhance network security at PT CDE by using a port knocking system on MikroTik. The port knocking method adds a layer of security by only allowing access after a correct sequence of 'knocks' on specific ports has been performed. Implementation was carried out by adding special firewall rules on MikroTik to manage login ports and address lists. The system's success was tested through several login attempts by both authorized admins and intruders who did not follow the correct port sequence. The research results show that the implementation of the port knocking system successfully increased the security of MikroTik at the PT CDE mining site. All login attempts by intruders, using various different device IPs, were blocked. Conversely, authorized admin logins were successful after following the correct port knocking sequence. With these results, it is hoped that network security in the mining area can be further assured, providing a foundation for further development in network security management.


Keywords


Mikrotik, Port Knocking, Firewall, Security

References


Dhani Irawan. (2019, September). Situs KPAI Diretas! Hacker Lempar Pesan soal KPK Dipadamkan. Detik.Com.

Eksan Nuryakin Habillah, A. (2022). Terbit online pada laman web jurnal: https://ejurnalunsam.id/index.php/jicom/ Implementasi Keamanan Jaringan Metode Port Knocking dan Port Blocking Berbasis Mikrotik PT Securindo Packatama Indonesia. Https://Ejurnalunsam.Id/Index.Php/Jicom, 04(01), 1–7. https://ejurnalunsam.id/index.php/jicom/

IT Team CDE Group. (2022). PT Cakrawala Dinamika Energi. Cde-Coal.Com.

Martselane Adias Sabara, & Ari Prayoga. (2020). KONFIGURASI MANAJEMEN BANDWIDTH MENGGUNAKAN ROUTER MIKROTIK RB2011UiAS-RM UNTUK MENGONTROL PENGGUNAAN INTERNET DI PT REKAN USAHA MIKRO ANDA TEGAL. Jurnal POLEKTRO, 09(2), 1–4.

Maydianto, & Muhammat Rasid Ridho. (2021). RANCANG BANGUN SISTEM INFORMASI POINT OF SALE DENGAN FRAMEWORK CODEIGNITER PADA CV POWERSHOP. Jurnal Comasie, 04(02), 2–10.

Mendrofa, Y., & Fauzi, R. (2023). IMPLEMENTASI KEAMANAN JARINGAN MENGGUNAKAN PORT KNOCKING. JURNAL COMASIE.

Oktaviansyah, P. D., Korespondensi, P., Paradika, :, & Oktaviansyah, D. (2022). https://jurnal.netplg.com/jnca Penerapan Sistem Pengamanan Port pada Mikrotik Menggunakan Metode Port Knocking Penerapan Sistem Pengamanan Port pada Mikrotik Menggunakan Metode Port Knocking. NetPLG Journal of Network and Computer Applications, 1(2).

Rizal, R., Ruuhwan, R., & Nugraha, K. A. (2020). Implementasi Keamanan Jaringan Menggunakan Metode Port Blocking dan Port Knocking Pada Mikrotik RB-941. Jurnal ICT : Information Communication & Technology, 19(1), 1–8. https://doi.org/10.36054/jict-ikmi.v19i1.119

Santoso, N. A., Affandi, K. B., & Kurniawan, R. D. (2022). Implementasi Keamanan Jaringan Menggunakan Port Knocking. Jurnal Janitra Informatika Dan Sistem Informasi, 2(2), 90–95. https://doi.org/10.25008/janitra.v2i2.156

Siti Nur Aeni. (2022, March 30). Memahami pengertian implementasi, tujuan, faktor, dan contohnya. Katadata.Co.Id.

Windu Farhan Fatoni, Arif Hidayat, & Mustika. (2022). IMPLEMENTASI SISTEM KEAMANAN JARINGAN KOMPUTER DENGAN METODE PORT KNOCKING PADA LKP SURYA KOMPUTER. Jurnal Mahasiswa Ilmu Komputer (JMIK), 03(01), 2–13


Full Text: PDF

Article Metrics

Abstract View : 418 times
PDF Download : 180 times

DOI: 10.56327/jtksi.v7i3.1735

Refbacks

  • There are currently no refbacks.