scholarly journals Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS

2021 ◽  
Vol 5 (3) ◽  
pp. 848
Author(s):  
Haeruddin Haeruddin

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.

2014 ◽  
Vol 1079-1080 ◽  
pp. 598-600
Author(s):  
Ying Zhao

With the rapid development of computer networks and the Internet, while promoting the development of all aspects, the Internet also brings some trouble. The text starts from the Local Area Network information security status, analyzes problems in LAN information security management, puts forward maintenance and virus prevention strategies for LAN security.


JURTEKSI ◽  
2019 ◽  
Vol 5 (2) ◽  
pp. 113-118
Author(s):  
Mohd. Siddik

Abstract: The use of computer networks at this time has proven to be a very reliable means of communication and source of information. Government agencies, offices are now using the network as a medium for disseminating information. At present, in the implementation of computer networks, it is very necessary for management to optimize the network itself. Therefore it is necessary to do QoS (Quality of Service) Analysis, in order to get optimal network. QoS (Quality of Service) is a technology that can be applied in computer networks to provide optimal services for network users. With the existence of QoS (Quality of Service) allows network administrators to be able to perform bandwidth management to handle various effects due to congestion (congestion) in packet flow traffic in the network. In performing QoS (Quality of Service), a device that can do bandwidth management to the network is built. Mikrotik Routerboard750 is a network device using Linux-based MicroticOS that can be used in the application of QoS (Quality of Service). Keywords: Computer Network, QoS (Quality of Service), Mikrotik Routerboard750  Abstrak: Penggunaan Jaringan komputer pada saat ini telah terbukti sebagai sarana komunikasi dan sumber informasi yang sangat diandalkan. Seluruh instansi pemerintahan, perkantoran saat ini sudah memanfaatkan jaringan sebagai media sarana penyebaran informasi. Saat ini dalam implementasinya jaringan komputer sangat butuh dilakukan manajemen guna optimalimalisasi jaringan itu sendiri. Maka dari itu perlu dilakukan Analasis QoS (Quality of Service), guna mendapatkan jaringan yang optimal. QoS (Quality of Service) merupakan teknologi yang dapat diterapkan dalam jaringan komputer guna memberikan layanan yang optimal bagi para pengguna jaringan. Dengan adanya QoS (Quality of Service) memungkinkan administrator jaringan untuk dapat melakukan manajemen bandwidth guna menangani berbagai efek akibat terjadinya kemacetan (congestion) pada lalu lintas aliran paket di dalam jaringan. Dalam melakukan QoS (Quality of Service) dibutauhan sebuah perangkat yang dapat melakukan manajemen bandwidth terhadap jaringan. Mikrotik Routerboard750 adalah perangkat jaringan menggunakana  MikrotikOS berbasis Linux yang dapat digunakan dalam penerapan QoS (Quality of Service) ini. Kata Kunci: Jaringan Komputer, QoS (Quality of Service), Mikrotik Routerboard750


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


2000 ◽  
Vol 37 (2) ◽  
pp. 157-166 ◽  
Author(s):  
T. Tuma ◽  
I. Fajfar ◽  
M. Perko ◽  
F. Bratkovič ◽  
J. Puhan

A new local area network (LAN) concept designed for educational purposes is proposed based upon the standard RS232 protocol. The concept enables students to gain hands-on experience of all seven open system interconnection (OSI) layers. The proposed approach to teaching computer networks has proved very popular with students. At the same time students' comprehension of basic OSI concepts has improved considerably.


2012 ◽  
Vol 241-244 ◽  
pp. 2299-2302
Author(s):  
Lian Feng Zhao

VLAN technology refers to the virtual local area network technology, which is classifyd into several network segments in logic through the internal devices of existing LAN, rather than physical location, so as to realize a computer network technology of virtual working group. This paper analyzes and studies on the generation, characteristics, and communication method of VLAN technology, as well as its actual application and setting.


2021 ◽  
Vol 6 (2) ◽  
pp. 29-40
Author(s):  
Mohd Nizam Osman ◽  
Khairul Anwar Sedek ◽  
Nor Arzami Othman ◽  
Muhammad Afiqhakimi Rosli ◽  
Mushahadah Maghribi

Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.  This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN).  This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. To determine the effectiveness of the proposed work, there were two experiments involved in this study. Firstly, the confidentiality test which to verify its privacy in keeping the information securely. Secondly, the performance test of the Internet connectivity in terms of ping, download and upload speed. The encourage results was expected as the confidentiality tested on the TorVPN access point network has shown the positive outcome by securing client’s Internet data packet. While, the Internet connectivity is not stable enough, when the client’s IP address changed in the network. Hence, the combination VPN and Tor service using Raspberry Pi as an access point inside the LAN is suitable and secure the information in the network, but do not suggest for user who wants a good Internet connectivity. 


Author(s):  
Osman Goni

A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.


Sign in / Sign up

Export Citation Format

Share Document