IMPLEMENTASI KEAMANAN JARINGAN BERBASIS FIREWALL RAW TERHADAP BRUTE FORCE LOGIN CYBER ATTACK

IRFAN, ZUMARDI and Heryanto, Ahmad (2020) IMPLEMENTASI KEAMANAN JARINGAN BERBASIS FIREWALL RAW TERHADAP BRUTE FORCE LOGIN CYBER ATTACK. Diploma thesis, Sriwijaya University.

[thumbnail of RAMA_56401_09040581721014.pdf] Text
RAMA_56401_09040581721014.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (5MB) | Request a copy
[thumbnail of RAMA_56401_09040581721014_TURNITIN.pdf] Text
RAMA_56401_09040581721014_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (22MB) | Request a copy
[thumbnail of RAMA_56401_09040581721014_0022018703_01_front_ref.pdf]
Preview
Text
RAMA_56401_09040581721014_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Preview
[thumbnail of RAMA_56401_09040581721014_0022018703_02.pdf] Text
RAMA_56401_09040581721014_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56401_09040581721014_0022018703_03.pdf] Text
RAMA_56401_09040581721014_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (866kB) | Request a copy
[thumbnail of RAMA_56401_09040581721014_0022018703_04.pdf] Text
RAMA_56401_09040581721014_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56401_09040581721014_0022018703_05.pdf] Text
RAMA_56401_09040581721014_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (183kB) | Request a copy
[thumbnail of RAMA_56401_09040581721014_0022018703_06_ref.pdf] Text
RAMA_56401_09040581721014_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (396kB) | Request a copy
[thumbnail of RAMA_56401_09040581721014_0022018703_07_lamp.pdf] Text
RAMA_56401_09040581721014_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy

Abstract

The focus of this research is to protect the network from brute force login cyber attacks, by implementing a raw firewall on one of the network devices, namely mikrotik. The network built in this study has four LANs where the first LAN, second LAN and third LAN are attackers while the fourth LAN is administrator or attacked using WiFi communication and UTP cable. Brute force attack is a type of attack carried out to gain access as a user with an authentication attempt. This attack is carried out by trying all the passwords until the correct one is found. In this study two test scenarios were conducted: (i) the first test carried out a brute force attack before the implementation of the raw firewall, and (ii) the second test carried out a brute force attack again after the implementation of the raw firewall. Raw firewall rules are applied as many as seven rules. The results obtained from the study in the form of logs and address lists that are applied successfully get the source of the attack and limit the attack, Filtered port services applied successfully protect the remote access login port, the use of cpu resources before the raw firewall implementation on average is 28.24% and the cpu resource after implementation raw firewall on average by 2.28% when an attack occurs, the implementation of raw firewall against cyber attack brute force login successfully protects the network.

Item Type: Thesis (Diploma)
Uncontrolled Keywords: Keamanan jaringan, firewall raw, brute force, cyber attack
Subjects: Q Science > QA Mathematics > QA75-76.95 Calculating machines > QA76.9.A25 Computer security. Systems and Data Security.
T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 56401-Computer Engineering (D3)
Depositing User: Users 7802 not found.
Date Deposited: 03 Sep 2020 07:21
Last Modified: 03 Sep 2020 07:21
URI: http://repository.unsri.ac.id/id/eprint/34438

Actions (login required)

View Item View Item