Text
IMPLEMENTASI KEAMANAN JARINGAN BERBASIS FIREWALL RAW TERHADAP BRUTE FORCE LOGIN CYBER ATTACK
The focus of this research is to protect the network from brute force login cyber attacks, by implementing a raw firewall on one of the network devices, namely mikrotik. The network built in this study has four LANs where the first LAN, second LAN and third LAN are attackers while the fourth LAN is administrator or attacked using WiFi communication and UTP cable. Brute force attack is a type of attack carried out to gain access as a user with an authentication attempt. This attack is carried out by trying all the passwords until the correct one is found. In this study two test scenarios were conducted: (i) the first test carried out a brute force attack before the implementation of the raw firewall, and (ii) the second test carried out a brute force attack again after the implementation of the raw firewall. Raw firewall rules are applied as many as seven rules. The results obtained from the study in the form of logs and address lists that are applied successfully get the source of the attack and limit the attack, Filtered port services applied successfully protect the remote access login port, the use of cpu resources before the raw firewall implementation on average is 28.24% and the cpu resource after implementation raw firewall on average by 2.28% when an attack occurs, the implementation of raw firewall against cyber attack brute force login successfully protects the network.
Inventory Code | Barcode | Call Number | Location | Status |
---|---|---|---|---|
2007000857 | T34438 | T344382020 | Central Library (REFERENCES) | Available but not for loan - Not for Loan |
No other version available