Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi)

Implementasi Sistem Port Knocking Dalam Meningkatkan Keamanan Mikrotik Di PIT PT CDE COAL Bengkulu Utara Ramadhan, Suwandi; Abdullah, Dedy; Darmi, Yulia; Khairullah, Khairullah
JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) Vol 7, No 3 (2024): JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi)
Publisher : Institut Bakti Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/jtksi.v7i3.1735

Abstract

In the modern technological era, the development of computers and networks has presented various new challenges, particularly in terms of security. The Internet of Things (IoT) and next-generation network technologies such as 5G have transformed the way we interact with devices and networks, bringing significant security risks. Therefore, PT Cakrawala Dinamika Energi (PT CDE) faces similar issues at its mining site. Network security in this area remains vulnerable to attacks by unauthorized parties. This research aims to enhance network security at PT CDE by using a port knocking system on MikroTik. The port knocking method adds a layer of security by only allowing access after a correct sequence of 'knocks' on specific ports has been performed. Implementation was carried out by adding special firewall rules on MikroTik to manage login ports and address lists. The system's success was tested through several login attempts by both authorized admins and intruders who did not follow the correct port sequence. The research results show that the implementation of the port knocking system successfully increased the security of MikroTik at the PT CDE mining site. All login attempts by intruders, using various different device IPs, were blocked. Conversely, authorized admin logins were successful after following the correct port knocking sequence. With these results, it is hoped that network security in the mining area can be further assured, providing a foundation for further development in network security management.
Co-Authors Abdullah, Dedy Achmad Lutfi Adi Wijaya Aditya, Rio Agus Syahrani Agus Wartiningsih Agus, Mat Ahadi Sulissusiawan Aldi, Gustomi Anggraeni, Arera Ayu Annisa, Ayu Antonius Totok Priyadi Aritonang, Wendy Ricardho Balga, Nakata Beny Beny Budi Susarianto Darnita, Yulia Dwi Anggraeni, Meri Elofhia, Loriya Fabriandi, Gilang Pramudia Fadillah, Adnan Faizal Faizal, Faizal Fernandez, Shandy Fransiska, Nora Giova, Giova Guntur Alam Hadi , Alam Kurnia Hamzani Hamzani Heavenlim, Natalia Rosi Henny Sanulita Hermawan, Ferri Imanullah, Muhammad Juanda Juanda Juhardi, Ujang Julyani, Siska Jumadi Jumadi Junia, Wiyana Karolina, Adelia Kirana, Eka Chandra Kusuma, Erwin Arry Lala, Andi Lingga, Rafi Putra Luthfi, Achmad Mahfuzhi, A.R. Walad Mahfuzi, A.R Walad Mahfuzi, AR. Walad Maizuar Maizuar Marbun, Andre Samuel William marhalim, marhalim Martono Martono Marzam Marzam Mellisa Jupitasari Muhammad Arsyad Mulyadi Mulyadi Muntahanah, Muntahanah Musthofa, Ahmadal olyvia, tasya Padila, Kurnia Pahriza, Pahriza Pahrizal, Pahrizal Panggabean, Gidion Pitriyo, Ari Purba, Boy Randy Putra, Wahyu Dharma Rahmadona, Evita Rahmawanti, Novi Rajes, Achmad Ramadan, Muhammad Fadli Ilham Ramadhan, Suwandi Reswan , Yuza Rezwan, Yuza Rice Haryati Rifqo, Muhammad Husni Ronny Saputra, Ronny Sabila, Lisa Safrizal, Edy Sahputra , Eka Sahputra, Dedi Sahutni, Reza Utami Saragi, Yosafat Steven Sastya Hendri Wibowo Silviani, Irene Sinaga, Andika Ariyoga Sinaga, Naomi Septiana Siti Abidah Sofyan Sofyan Solehah, Gusti Hadiatus Sonita, Anisya Surya Ade Saputera Syafruddin Ritonga, Syafruddin Syahrial, Muhfi Syambasril, Syambasril Tampubolon, Parulian Tarihoran, Yuli Kartika Teuku Ikmal Thiara, Rekhi Toyib, Rozali Wahyu Febriansyah, Eky Wahyudi Ariannor Wesli Wesli Widianto, Indra Yoga Wijaya, Ardi Witriyono, Harry Yoan Joupin, Muhammad Yudihartanti, Yulia Yulia Darmi Yuza Reswan