DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY
Keywords:demilitarized zone, port knocking, network security, mikrotik, networking
AbstractCurrently, the way of network communication has changed a lot. All aspects become very dependent on online services. Employees can work from home, and students of all ages take online classes. The more the public depends on staying connected to the network, the greater potential network attacks to occur. In a computer network, if it is not protected, it will data or file loss, damage to the server system, not being optimal in serving users or even losing valuable institutional assets. The attacks most often used in networks are Port Scanning and DDoS (Distributed Denial Of Service). In this study, the DeMilitarized Zone and Port Knocking methods are combined to secure computer networks. DeMilitarized Zone technique implementation is used to access local servers, so that they can be accessed from outside with Port Knocking technique. To open the access port that is filtered in the router configuration on the server network security system. DeMilitarized Zone and Port Knocking can be implemented on local and long distance networks where if an attacker wants to exploit or attack the main server, the first to be attacked is the firewall server (router). Port Knocking can also be implemented on local and long distance networks with a combined ping request time limit which makes it safer, so that if an attacker wants to access the router, and doesn't know the rules from the remote, what happens is a rejection of port access.
Behal, S., & Kumar, K. (2016). Trends in Validation of DDoS Research. Procedia Computer Science, 85(Cms), 7–15. https://doi.org/10.1016/j.procs.2016.05.170
Deshmukh, R. V., & Devadkar, K. K. (2015). Understanding DDoS attack & its effect in cloud environment. Procedia Computer Science, 49(1), 202–210. https://doi.org/10.1016/j.procs.2015.04.245
Donahue, G. A. (2011). Network Warrior (2nd ed.; O. Media, Ed.). United State: O’Reilly Media.
Hendro Wijayanto, I. A. P. (2020). Policy Brief : Kesiapan Perguruan Tinggi Wilayah Jawa Tengah Dalam Menghadapi Serangan Siber. Indonesia: LPPM Universitas Dian Nuswantoro.
Link11. (2020). DDoS Statistics (infographic) for the 1st Quarter of 2020. Retrieved from https://www.link11.com/en/downloads/ddos-statistics-infographic-for-the-1st-quarter-of-2020/
Mikrotik. (n.d.). Simple Port Knocking. Retrieved October 19, 2020, from Mikrotik website: http://www.mikrotik.co.id/artikel_lihat.php?id=105
Vivek Ganti, O. Y. (2020). Network-layer DDoS attack trends for Q2 2020. Retrieved October 19, 2020, from Cloudflare website: https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q2-2020/
How to Cite
Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Under the following terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.