Analisis Perbandingan Optimalisasi Port Knocking Dan Honeypot dengan Iptables Pada Server Untuk Keamanan Jaringan

Anjun Dermawan(1*), Y Yuhandri(2), S Sumijan(3),

(1) Universitas Putra Indonesia “YPTK” Padang, Indonesia
(2) Universitas Putra Indonesia “YPTK” Padang, Indonesia
(3) Universitas Putra Indonesia “YPTK” Padang, Indonesia
(*) Corresponding Author

Abstract


Computer network systems are designed to share resources together, so that the security of resources on the server must be maintained and the resources used must be optimized. The aim of this research is to analyze the comparative level of optimization of Port knocking and Honeypot using the IPTables method for network security on servers with different CPU and memory resources. The security methods used in this research are Port knocking, Honeypot and IPTables. The data used includes ports that were successfully attacked as well as resource usage before and after IPTables implementation on a server with 2 CPU resources and 1507284KiB memory obtained from previous research. The results of this research show that 80% of ports cannot be attacked while 20% of ports, namely port 22, are designed to be attacked. The server CPU and Memory resource usage graph shows a decrease after implementing IPTables from Denial of Service (DoS) and Brute force testing. On a server with 1 CPU and 1015852KiB of memory resources, CPU usage decreased by 36%, and memory usage decreased by 41%. Meanwhile, on a server with 4 CPU resources and 6036624 KiB of memory, CPU usage decreased by 41%, and memory usage decreased by 46%. This shows increased effectiveness compared to using just the Port knocking and Honeypot methods. It is hoped that this research can be a guide in measuring server optimization in overcoming Denial of Service (DoS) and Brute force attacks

Full Text:

PDF

References


Brades, T., & Irwansyah. (2022). Pemanfataan Metode Port Knocking Dan Blocking Untuk Keamanan Jaringan Bpkad Provinsi Sumsel. pp. 99–107.

Ernawati, T., & Rachmat, F, F, F. (2021). Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System. J, RESTI, Vol. 5, No. 1, pp. 180-186.

Gunawan, A, R., Sastra, N, P., & Wiharta, D, M. (2021). Penerapan Keamanan Jaringan Menggunakan Sistem Snort dan Honeypot Sebagai Pendeteksi dan Pencegah Malware. Majalah. Ilmiah. Teknologi. Elektro, Vol. 20, No. 1, pp. 81–88.

Wibawa, G, H, P., Sasmita, I, G, M, A., & Raharja, I, M, S. (2020). Analisis Data Log Honeypot Menggunakan Metode K-Means Clustering. J. Ilmiah. Merpati, Vol. 8, No. 1, pp. 13–21.

Mardiansyah, A, Z., Abdussyakur, Y, M., & Jatmika, A, H. (2021). Optimasi Port Knocking Dan Honeypot Menggunakan Iptables Sebagai Keamanan Jaringan Pada Server. JTIK, Vol. 3, No. 2, pp. 189-199.

Novianto, D., Japriadi, Y, S., & Tommy, L. (2023). Implementasi Multiple Port knocking dan Port blocking Untuk Peningkatan Keamanan Hak Akses Administrator Pada Routerboard Mikrotik. JTKSI, Vol. 6, No. 1, pp. 94–101.

Pratama, R., Wijaya, A., Fatoni., & Suryayusra. (2022). Strategi Pengamanan Akses Jaringan Dengan L2TP Over IP Security Pre-shared Key. J. JUPITER, Vol. 14 No. 2, pp. 306–316.

Anggreni, N, K, A, S., & Jasa, L. (2022). Literatur Review Analisis metode De-Militarized Zone (DMZ) dan Switch Port security Sebagai Metode Keamanan Jaringan. Majalah. Ilmiah. Teknologi. Elektro, Vol. 21, No. 2, pp. 195–200.

Amien, J, A. (2020). Implementasi Keamanan Jaringan Dengan Iptables Sebagai Firewall Menggunakan Metode Port Knocking. J. FASILKOM, Vol. 10, No. 2, pp. 159–165.

Rizal, R., Ruuhwan., & Nugraha, K, A. (2020). Implementasi Keamanan Jaringan Menggunakan Metode Port Blocking dan Port Knocking Pada Mikrotik RB-941. J. ICT, Vol. 19, No. 1, pp. 1-8.

Rosyid, N, R., Murti, B, B., Prayudha, B., Ramadloni, A, F., & Subekti, L. (2023). Deteksi Malware pada Jaringan Lokal Berbasis Honeypot dan Yara. J. Sistem Informasi, Vol. 12, No. 1, pp. 186–193.

Nida, N., & Adrian, R. (2023). Analisis Perbedaan Pengaruh Penggunaan Iptables Chains dalam Mencegah Denial of Service (DoS) pada Jaringan IoT. Journal of Internet and Software Engineering (JISE), Vol. 4, No.1.




DOI: https://doi.org/10.30645/kesatria.v5i2.364

DOI (PDF): https://doi.org/10.30645/kesatria.v5i2.364.g361

Refbacks

  • There are currently no refbacks.


Published Papers Indexed/Abstracted By: