Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity

Authors

  • Tati Ernawati Informatics Engineering Study Program, TEDC Bandung Polytechnic, Indonesia https://orcid.org/0000-0002-0108-1098
  • Idham Kholid Informatics Engineering Study Program, TEDC Bandung Polytechnic, Indonesia
  • Dahlan Informatics Engineering Study Program, TEDC Bandung Polytechnic, Indonesia
  • Dini Rohmayani Informatics Engineering Study Program, TEDC Bandung Polytechnic, Indonesia

DOI:

https://doi.org/10.15575/join.v9i1.1254

Keywords:

Availability, Confidentiality, Integrity, Network Security, Random Port Knocking

Abstract

Preventing unidentified individuals from misusing their access to information is a major concern when it comes to data security. Network administrators are charged with working harder to be able to secure the computer network they manage. The utilization of right method is a challenge for network administrators to protect computer network from intruders. The RPK method is one of solution to overcome this problem. This research aims to implement RPK method on the principles of availability, confidentiality, and integrity which have not been explored by previous studies. The network system configuration stage involved installing Debian 9, NMAP, Hydra, RPK, cloud server, remote admin, and attacker. The network security system's performance was tested, revealing a 99.97% availability rate and 100% confidentiality. The system's integrity was assessed, with an average response time of 0.22 seconds and 100% blocking accuracy. The test results indicate that the system's network security performance, using the RPK method, capable of protecting server attacks and effectively upholding security stability.

References

H. Chen, X. Han and Y. Zhang, “Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet”, Tsinghua Science and Technology, IEEE Access , vol. 29, no. 2, pp. 492-505, 2023, doi: 10.26599/TST.2023.9010034.

APJII, ”Survei APJII pengguna internet di Indonesia tembus 215 juta orang”, Available https://apjii.or.id/ berita/ d/survei-apjii-pengguna-internet-di-indonesia-tembus-215-juta-orang, 2023

J.Sun, “Computer Network Security Technology and Prevention Strategy Analysis”, Proceedings of The 7th International Conference on Intelligent, Interactive Systems and Applications, Elsevier: ScienceDirect, vol. 208, pp 570-576, 2022, https://doi.org/10.1016/j.procs.2022.10.079

Y. Kai, H. Qiang and M. Yixuan, “Construction of Network Security Perception System Using Elman Neural Network”, 2021 2nd International Conference on Computer Communication and Network Security (CCNS), Xining, China, IEEE Access , pp. 187-190, 2021, doi: 10.1109/CCNS53852.2021.00042

I.K.Sokolowska, and W. Caputa, “Awareness of Network Security and Customer Value-The Company and Customer Perspective”, Elsevier: ScienceDirect, vol.190, pp 1-15, 2023, https://doi.org/10.1016/ j.techfore. 2023. 122430

R.Kalakuntla, A.B.Vanamala, and R.R.Kolipyaka, “Cyber Security”, Holistica, vol. 10, Issue 2, pp.115-128, 2019, doi:10.2478/hjbpa-2019-0020

Direktorat Operasi Keamanan Siber BSSN (Badan Siber dan Sandi Negara), “Laporan Bulanan Publik Agustus 2023”, 2023

D. Jung, J. Shin, C. Lee, K. Kwon and J. T. Seo, “Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology”, IEEE Access, vol. 11, pp. 15229-15241, 2023, doi: 10.1109/ACCESS.2023.3244991.

J. Y. Yu, E. Lee, S. -R. Oh, Y. -D. Seo and Y. -G. Kim, “A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security”, IEEE Access, vol. 8, pp. 45304-45324, 2020, doi: 10.1109/ACCESS. 2020.2977778.

R.Mustolih, U.T.Lenggana, and J. Mulyana, “Utilization of E-KTP as Home Safety Using Arduino Nano Based on Android”, Jurnal Online Informatika (JOIN), vol.4 no 1 pp.9-15, 2019, doi: https://doi.org/10.15575/ join.v4i1.238

X.Wang, and L.Shi, “ Desing of Computer Network Security Storage System Based on Cloud Computing Technology”, IOP J. Phys.: Conf. Ser., vol.2083, 2021, doi:10.1088/1742-6596/2083/4/042084

Y. He, M. Zhang, X. Yang, J. Luo and Y. Chen, “A Survey of Privacy Protection and Network Security in User On-Demand Anonymous Communication”, IEEE Access, vol. 8, pp. 54856-54871, 2020, doi: 10.1109/ ACCESS.2020.2981517.

I.R.P. Jeinever, A.Rasyid and N.Suharto, “Penerapan Sistem Keamanan Jaringan Menggunakan Random Port Knocking Berbasis Raspberry Pi Yang Dikirm Melewati Telegram”, Jurnal JARTEL, vol.7, no.2, p.61-67, 2018, doi: https://doi.org/10.33795/jartel.v7i2.213

M.Z.A.Mahmud, Saifuddin and D. Risqiwati, “Implementasi Asymmetric Encryption RSA Pada Port Knocking Ubuntu Server Menggunakan Knockd Dan Python”, Jurnal Repositor, vol.2 no.6, pp.787-794, 2020, doi:10.22219/REPOSITOR.V2I6.270

A. H. Bukhory, Y. Inoue, S.Kato, K. Yoshioka, and T. Matsumoto, “Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device”, Journal of Information Processing, vol.29, p. 572-580, 2021, doi: 10.2197/ipsjjip.29.572

S. A. Rauf, M. Faiqurahman, and D. R. Akbi, “Secure Random Port List Generator pada Mekanisme Autentikasi Dengan Menggunakan Port Knocking dan Secure Socket Layer”,Register: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 4, no. 2, pp. 103-113, 2018, https://doi.org/10.26594/register.v4i2.1162

F. H. Mohd Ali, R. Yunos and M. A. Mohamad Alias, "Simple port knocking method: Against TCP replay attack and port scanning," Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, Malaysia, IEEE Access, pp. 247-252, 2012, doi: 10.1109/CyberSec. 2012.6246118.

M. A. Verdiana, , I. M. A. D. Suarjaya, and A. A. K. A. C. Wiranatha, “Implementasi Algoritma PRNG pada Aplikasi Port Knocking Sebagai Perlindungan Server”, Jurnal Ilmiah Merpati, vol. 8, no. 3, pp. 232-243, 2020, doi: https://doi.org/10.24843/JIM.2020.v08.i03.p08

M.Ciampa, “Comp TIA Security+ Guide to Network Security Fundamentals (7th edition)”, Boston: Cengage Learning, Inc., 2020

S. O. Oruma and S. Petrovic, “Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey”, IEEE Access, vol. 11, pp. 63205-63237, 2023, doi: 10.1109/ACCESS.2023.3288338.

R.R.Singh and D.S. Tomar, “Scanning Attack Analysis with Dempster-Shafer Evidence Theory”, International Journal of Applied Engineering Research, vol.12, no.16, p.5900-5904, 2017, ISSN 0973-4562

Niswar, M., Sabri, A. A., Warni, E., and Musa, M. N, “Memory Sharing Management On Virtual Private Server”, Proceedings of the International Conference on ICT for Smart Society, IEEE Access, 2013, doi:10.1109/ictss.2013.6588079 .

J.E. Goldman and P.T. Rawles, Applied Data Communications: A Business-oriented Approach (4th edition), 2004, New York: John Wiley & Sons, Inc.

R.Ernawati, I.Ruslianto, and S.Bahri, “Implementasi Metode Port Knocking Pada Sistem Keamanan Server Ubuntu Virtual Berbasis Web Monitoring”, Jurnal Komputer dan Aplikasi, vol.10, no.01, p. 158-169, 2022, doi: http://dx.doi.org/10.26418/coding.v10i01.54226

Downloads

Published

2024-04-23

Issue

Section

Article

Citation Check

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.