Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Journal of Security, Computer, Information, Embedded, Network and Intelligence System

Implementasi Metode Port Knocking pada MikroTik RouterOS untuk Mendukung Keamanan Jaringan Fadhlirrahman Baso; Muhammad Ardiansyah
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 1 (Juni 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i1.235

Abstract

This study aims to implement the Port Knocking security method in a local network using MikroTik RouterOS. The Port Knocking method is employed to enhance system security by closing access to specific ports in the network and only allowing access to these ports when a predefined sequence of port knocks is performed. The research encompasses several stages, including the analysis of the port data to be tested, the configuration of the MikroTik router, and the security system testing. The results of this study demonstrate the successful securing of the Winbox and WWW ports on the MikroTik server using the Port Knocking method. Users are required to execute the predetermined port knocking sequence before accessing these services. Furthermore, the Port Knocking method effectively blocks ping access to the MikroTik server for users who have not completed the authentication process. These findings indicate that the implementation of the Port Knocking method significantly enhances the local network security on the MikroTik server.
Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images Fadhlirrahman Baso
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20233

Abstract

Data is often the target of irresponsible people for misuse. The theft is done is to benefit from the person who has the data. In addition to theft of work files, theft is also carried out on image files. The purpose of this file theft is to find out what the image contains. Someone has a private image that cannot be known by others. Misuse of image files will be fatal for the owner of the image. Cryptographic techniques are needed in securing images and one of the methods used to secure these images is using the base64 algorithm. The Caesar Cipher algorithm can help users secure the image file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store on a storage medium. By applying the Base64 algorithm to image files, the security and confidentiality of these files will protect data from irresponsible people.
Performance Analysis of The Last Significant Bit (LSB) Method in Steganography for Data Hiding in Image Data Fadhlirrahman Baso
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20234

Abstract

Technology as a means of conveying information can have significant implications for the security and confidentiality of data and information content. When a sender wishes to convey a message to someone and does not want the message to be easily visible, the concealment of this message becomes crucial for the sender. One commonly used method for data concealment is the Least Significant Bit (LSB) method in steganography. The LSB method is preferred for its simplicity, fast process, and greater capacity. Messages are embedded by replacing the least significant bit in the host image with the message bits, with the rule that the number of message bits does not exceed the number of bits in the host image. Based on research findings, the results of steganography are difficult to distinguish from the original content through visual observation. Therefore, it can be concluded that the steganography method is highly effective for concealing a message.
Implementasi Metode Port Knocking pada MikroTik RouterOS untuk Mendukung Keamanan Jaringan Fadhlirrahman Baso; Muhammad Ardiansyah
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 1 (Juni 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i1.235

Abstract

This study aims to implement the Port Knocking security method in a local network using MikroTik RouterOS. The Port Knocking method is employed to enhance system security by closing access to specific ports in the network and only allowing access to these ports when a predefined sequence of port knocks is performed. The research encompasses several stages, including the analysis of the port data to be tested, the configuration of the MikroTik router, and the security system testing. The results of this study demonstrate the successful securing of the Winbox and WWW ports on the MikroTik server using the Port Knocking method. Users are required to execute the predetermined port knocking sequence before accessing these services. Furthermore, the Port Knocking method effectively blocks ping access to the MikroTik server for users who have not completed the authentication process. These findings indicate that the implementation of the Port Knocking method significantly enhances the local network security on the MikroTik server.