Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity
DOI:
https://doi.org/10.15575/join.v9i1.1254Keywords:
Availability, Confidentiality, Integrity, Network Security, Random Port KnockingAbstract
Preventing unidentified individuals from misusing their access to information is a major concern when it comes to data security. Network administrators are charged with working harder to be able to secure the computer network they manage. The utilization of right method is a challenge for network administrators to protect computer network from intruders. The RPK method is one of solution to overcome this problem. This research aims to implement RPK method on the principles of availability, confidentiality, and integrity which have not been explored by previous studies. The network system configuration stage involved installing Debian 9, NMAP, Hydra, RPK, cloud server, remote admin, and attacker. The network security system's performance was tested, revealing a 99.97% availability rate and 100% confidentiality. The system's integrity was assessed, with an average response time of 0.22 seconds and 100% blocking accuracy. The test results indicate that the system's network security performance, using the RPK method, capable of protecting server attacks and effectively upholding security stability.
References
H. Chen, X. Han and Y. Zhang, “Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet”, Tsinghua Science and Technology, IEEE Access , vol. 29, no. 2, pp. 492-505, 2023, doi: 10.26599/TST.2023.9010034.
APJII, ”Survei APJII pengguna internet di Indonesia tembus 215 juta orang”, Available https://apjii.or.id/ berita/ d/survei-apjii-pengguna-internet-di-indonesia-tembus-215-juta-orang, 2023
J.Sun, “Computer Network Security Technology and Prevention Strategy Analysis”, Proceedings of The 7th International Conference on Intelligent, Interactive Systems and Applications, Elsevier: ScienceDirect, vol. 208, pp 570-576, 2022, https://doi.org/10.1016/j.procs.2022.10.079
Y. Kai, H. Qiang and M. Yixuan, “Construction of Network Security Perception System Using Elman Neural Network”, 2021 2nd International Conference on Computer Communication and Network Security (CCNS), Xining, China, IEEE Access , pp. 187-190, 2021, doi: 10.1109/CCNS53852.2021.00042
I.K.Sokolowska, and W. Caputa, “Awareness of Network Security and Customer Value-The Company and Customer Perspective”, Elsevier: ScienceDirect, vol.190, pp 1-15, 2023, https://doi.org/10.1016/ j.techfore. 2023. 122430
R.Kalakuntla, A.B.Vanamala, and R.R.Kolipyaka, “Cyber Security”, Holistica, vol. 10, Issue 2, pp.115-128, 2019, doi:10.2478/hjbpa-2019-0020
Direktorat Operasi Keamanan Siber BSSN (Badan Siber dan Sandi Negara), “Laporan Bulanan Publik Agustus 2023”, 2023
D. Jung, J. Shin, C. Lee, K. Kwon and J. T. Seo, “Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology”, IEEE Access, vol. 11, pp. 15229-15241, 2023, doi: 10.1109/ACCESS.2023.3244991.
J. Y. Yu, E. Lee, S. -R. Oh, Y. -D. Seo and Y. -G. Kim, “A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security”, IEEE Access, vol. 8, pp. 45304-45324, 2020, doi: 10.1109/ACCESS. 2020.2977778.
R.Mustolih, U.T.Lenggana, and J. Mulyana, “Utilization of E-KTP as Home Safety Using Arduino Nano Based on Android”, Jurnal Online Informatika (JOIN), vol.4 no 1 pp.9-15, 2019, doi: https://doi.org/10.15575/ join.v4i1.238
X.Wang, and L.Shi, “ Desing of Computer Network Security Storage System Based on Cloud Computing Technology”, IOP J. Phys.: Conf. Ser., vol.2083, 2021, doi:10.1088/1742-6596/2083/4/042084
Y. He, M. Zhang, X. Yang, J. Luo and Y. Chen, “A Survey of Privacy Protection and Network Security in User On-Demand Anonymous Communication”, IEEE Access, vol. 8, pp. 54856-54871, 2020, doi: 10.1109/ ACCESS.2020.2981517.
I.R.P. Jeinever, A.Rasyid and N.Suharto, “Penerapan Sistem Keamanan Jaringan Menggunakan Random Port Knocking Berbasis Raspberry Pi Yang Dikirm Melewati Telegram”, Jurnal JARTEL, vol.7, no.2, p.61-67, 2018, doi: https://doi.org/10.33795/jartel.v7i2.213
M.Z.A.Mahmud, Saifuddin and D. Risqiwati, “Implementasi Asymmetric Encryption RSA Pada Port Knocking Ubuntu Server Menggunakan Knockd Dan Python”, Jurnal Repositor, vol.2 no.6, pp.787-794, 2020, doi:10.22219/REPOSITOR.V2I6.270
A. H. Bukhory, Y. Inoue, S.Kato, K. Yoshioka, and T. Matsumoto, “Empirical Analysis of Security and Power-Saving Features of Port Knocking Technique Applied to an IoT Device”, Journal of Information Processing, vol.29, p. 572-580, 2021, doi: 10.2197/ipsjjip.29.572
S. A. Rauf, M. Faiqurahman, and D. R. Akbi, “Secure Random Port List Generator pada Mekanisme Autentikasi Dengan Menggunakan Port Knocking dan Secure Socket Layer”,Register: Jurnal Ilmiah Teknologi Sistem Informasi, vol. 4, no. 2, pp. 103-113, 2018, https://doi.org/10.26594/register.v4i2.1162
F. H. Mohd Ali, R. Yunos and M. A. Mohamad Alias, "Simple port knocking method: Against TCP replay attack and port scanning," Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, Malaysia, IEEE Access, pp. 247-252, 2012, doi: 10.1109/CyberSec. 2012.6246118.
M. A. Verdiana, , I. M. A. D. Suarjaya, and A. A. K. A. C. Wiranatha, “Implementasi Algoritma PRNG pada Aplikasi Port Knocking Sebagai Perlindungan Server”, Jurnal Ilmiah Merpati, vol. 8, no. 3, pp. 232-243, 2020, doi: https://doi.org/10.24843/JIM.2020.v08.i03.p08
M.Ciampa, “Comp TIA Security+ Guide to Network Security Fundamentals (7th edition)”, Boston: Cengage Learning, Inc., 2020
S. O. Oruma and S. Petrovic, “Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey”, IEEE Access, vol. 11, pp. 63205-63237, 2023, doi: 10.1109/ACCESS.2023.3288338.
R.R.Singh and D.S. Tomar, “Scanning Attack Analysis with Dempster-Shafer Evidence Theory”, International Journal of Applied Engineering Research, vol.12, no.16, p.5900-5904, 2017, ISSN 0973-4562
Niswar, M., Sabri, A. A., Warni, E., and Musa, M. N, “Memory Sharing Management On Virtual Private Server”, Proceedings of the International Conference on ICT for Smart Society, IEEE Access, 2013, doi:10.1109/ictss.2013.6588079 .
J.E. Goldman and P.T. Rawles, Applied Data Communications: A Business-oriented Approach (4th edition), 2004, New York: John Wiley & Sons, Inc.
R.Ernawati, I.Ruslianto, and S.Bahri, “Implementasi Metode Port Knocking Pada Sistem Keamanan Server Ubuntu Virtual Berbasis Web Monitoring”, Jurnal Komputer dan Aplikasi, vol.10, no.01, p. 158-169, 2022, doi: http://dx.doi.org/10.26418/coding.v10i01.54226
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2024 Tati Ernawati, Idham Kholid, Dahlan, Dini Rohmayani

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License