Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal Informatika Global

Implementasi Keamanan Akses Terhadap Website Menggunakan Wireguard VPN Di Routerboard Mikrotik Dian Novianto; Yohanes Setiawan Japriadi; Lukas Tommy
Jurnal Informatika Global Vol 13, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v13i2.2308

Abstract

The need for the availability of information is currently very high, especially in the conditions of the COVID-19 pandemic, all organizational activities are carried out online. Human dependence on the role of information technology is increasing and this has consequences for long distance communication between devices, which requires users to be authenticated for access rights granted by the system. The problem that arises is the security of data travel during the authentication process, where there is the possibility of leaking account information. This is because communication is done on a public network while accessing resources that require privacy. Therefore we need a network connection that is safe and efficient. Virtual Private Network (VPN) is a network communication technology that allows you to connect to public networks safely and quickly. The VPN used in the solution to this problem is Wireguard. Wireguard is a VPN protocol built with advanced cryptography and makes it extremely fast and secure. The method used by the author in developing this system is PPDIOO which consists of, Prepare, Plan, Design, Implement, Operate, and Optimize. And also some supporting tools for the development of the system Unified Modeling Language. By using Wireguard VPN, the expected result is the security of the data sent to be more secure and can connect two remote networks privately using the public internet.Keywords : VPN, Wireguard, Mikrotik
Mitigasi Serangan DNS Cache Poisoning Pada Local Area Network Berbasis Routerboard Mikrotik Novianto, Dian; Tommy, Lukas; Japriadi, Yohanes Setiawan; Sujono
Jurnal Ilmiah Informatika Global Vol. 15 No. 3: Desember 2024
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v15i3.4816

Abstract

Domain Name System (DNS) enables users to access websites via domain names, offering convenient navigation. However, criminals can exploit this convenience to redirect connections from user devices to fake servers for a variety of purposes. A form of attack known as DNS cache poisoning exploits vulnerabilities in the Domain Name System (DNS) to redirect connections from a legitimate website address to an illegitimate one. As a consequence of the fact that users of networked systems are typically unaware that they are accessing an illegitimate site, this attack can have a particularly damaging impact. Such incidents can give rise to several issues, including the theft of data, the distribution of malware, and other security threats. To address this issue, this study employs a firewall in conjunction with DoH (DNS over HTTPS) and the utilization of registered certificates. The Domain Name System over HTTPS (DoH) protocol encrypts DNS requests and responses, preventing third parties (such as attackers who manipulate DNS) from reading or modifying DNS requests. The data employed in this study is derived from a review of existing literature. Furthermore, this study employs the PPDIOO model (Preparation, Planning, Design, Implementation, Operation, and Optimization) for the development of the network. Furthermore, the Mikrotik RB951ui-2Hnd routerboard is employed in this study. The outcome is the implementation of a multifaceted security strategy that effectively mitigates DNS cache poisoning attacks by 100%, while simultaneously reducing CPU usage to 11.5%. This approach enhances the security and reliability of user search activities on the internet.