Sistem Keamanan Jaringan Komputer dan Data Dengan Menggunakan Metode Port Knocking

Abstract views: 6635 , pdf downloads: 4106

Putu Riska
Putu Sugiartawan
Ichsan Wiratama

Abstract

 Data and information security makes information technology must be updated at all times. Along with the ever-changing information technology development, making information security is very important. Many attacks carried out by irresponsible people to attack the server. These attacks are often performed on open ports, which in turn will allow unauthorized and unauthorized people to easily control ports that have been entered. So to do security on computer network in overcoming attack on ports, one of them is by using Port knoking method. In order to avoid attacks carried out in the open port state a Port knoking method is used and set parameters for this computer device to have no open communication ports to enter, but the device is still accessible from the outside. So as to make people who do not have access rights do not have the opportunity to enter the ports that exist.

Downloads

Download data is not yet available.
How to Cite
Riska, P., Sugiartawan, P., & Wiratama, I. (2018). Sistem Keamanan Jaringan Komputer dan Data Dengan Menggunakan Metode Port Knocking. Jurnal Sistem Informasi Dan Komputer Terapan Indonesia (JSIKTI), 1(2), 53-64. https://doi.org/10.33173/jsikti.12

References

[1] M. Khader, A. Hadi, and A. Hudaib, “Covert Communication Using Port Knocking,” 2016 Cybersecurity Cyberforensics Conf., pp. 22–27, 2016.
[2] B. Mahbooba and M. Schukat, “Digital Certificate-based Port Knocking for Connected Embedded Systems,” 2017 28th Irish Signals Syst. Conf., pp. 1–5, 2017.
[3] J. Liew, S. Lee, and I. Ong, “One-Time Knocking Framework using SPA and IPsec,” 2010 2nd Int. Conf. Educ. Technol. Comput., vol. 5, pp. V5-209-V5-213, 2010.
[4] F. H. M. Ali, R. Yunos, and M. A. M. Alias, “Simple port knocking method: Against TCP replay attack and port scanning,” in International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012, pp. 247–252.
[5] M. Pourvahab, R. E. Atani, and L. Boroumand, “SPKT : Secure Port Knock-Tunneling , an Enhanced Port Security Authentication Mechanism,” 2012 IEEE Symp. Comput. Informatics, pp. 145–149, 2012.
[6] V. Srivastava, A. K. Keshri, A. D. Roy, V. K. Chaurasiya, and R. Gupta, “Advanced Port Knocking Authentication Scheme with QRC using AES,” 2011 Int. Conf. Emerg. Trends Networks Comput. Commun., pp. 159–163, 2011.
[7] B. W. Moedeen and A. S. H. Jeerooburkhan, “Evaluating the strategic role of Social Media Analytics to gain business intelligence in Higher Education Institutions,” 2016 IEEE Int. Conf. Emerg. Technol. Innov. Bus. Pract. Transform. Soc., pp. 303–308, 2016.
[8] Z. A. Khan, N. Javaid, M. H. Arshad, A. Bibi, and B. Qasim, “Performance Evaluation of Widely used Portknoking Algorithms,” 2012 IEEE 14th Int. Conf. High Perform. Comput. Commun. 2012 IEEE 9th Int. Conf. Embed. Softw. Syst., pp. 903–907, 2012.
[9] T. Popeea, V. Olteanu, L. Gheorghe, and R. Rughiniș, “Extension of a port knocking client-server architecture with NTP synchronization,” 2011 RoEduNet Int. Conf. 10th Ed. Netw. Educ. Res., pp. 1–5.
[10] D. Sel, S. H. Totakura, and G. Carle, “sKnock : Port-Knocking for Masses,” 2016 IEEE 35th Symp. Reliab. Distrib. Syst. Work., pp. 1–6, 2016.
[11] A. Narayanan, “A critique of port knocking,” Linux J., vol. 1, no. 1, 2004.
[12] Boroumand, L., Shiraz, M., Gani, A., and Khokhar, R, "Virtualization Technique for Port Knocking in Mobile Cloud Computing". Ist.J.Advance.Soft.Comput.Appl, 6(1), 2014
[13] I. Marzuki, “Perancangan dan Implementasi Sistem Keamanan Jaringan Komputer Menggunakan Metode Port Knocking Pada Sistem Operasi Linux,” J. Teknol. Inf. Indones., vol. 2, no. 2, pp. 18–24, 2017.
[14] R. Muzawi, “Aplikasi Pengendalian Port dengan Utilitas Port Knocking untuk Optimalisasi Sistem Keamanan Jaringan Komputer,” SATIN – Sains dan Teknol. Inf., vol. 2, no. 1, 2016.
[15] Yewale, M. P. R. "A Modified Hybrid Port Knocking Technique for Host Authentication : A Review". IJRITCC International Journal on Recent and Innovation Trends in Computing and Communication, 2(3), 673–677, 2014.
[16] Sahu, P., Singh, M., & Kulhare, D. "Implementation of Modified Hybrid Port Knocking ( MHPK ) with Strong Authentication ", International Journal of Computer Applications, 64(22), 31–36, 2013.
[17] Saleh, M., Fajri, H., Suhatman, R., Putra, Y. E., Studi, P., Informatika, TCaltex, P, "Analisa Port Knocking Pada Sistem Operasi Linux Ubuntu Server", 2(1), 59–67, 2014.
[18] Prihanto, A., and Knocking, P., "Implementasi Port-Knocking di Mikrotik dengan Menggunakan Komponen Delphi TcpClient". Prosiding Seminar Teknik Elektro Dan Pendidikan Teknik Elektro, (Ste), 533–538, 2013.