DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY

Authors

  • Andik Saputro STMIK Sinar Nusantara
  • Nanang Saputro STMIK Sinar Nusantara
  • Hendro Wijayanto STMIK Sinar Nusantara Surakarta

DOI:

https://doi.org/10.14421/csecurity.2020.3.2.2150

Keywords:

demilitarized zone, port knocking, network security, mikrotik, networking

Abstract

Currently, the way of network communication has changed a lot. All aspects become very dependent on online services. Employees can work from home, and students of all ages take online classes. The more the public depends on staying connected to the network, the greater potential network attacks to occur. In a computer network, if it is not protected, it will data or file loss, damage to the server system, not being optimal in serving users or even losing valuable institutional assets. The attacks most often used in networks are Port Scanning and DDoS (Distributed Denial Of Service). In this study, the DeMilitarized Zone and Port Knocking methods are combined to secure computer networks. DeMilitarized Zone technique implementation is used to access local servers, so that they can be accessed from outside with Port Knocking technique. To open the access port that is filtered in the router configuration on the server network security system. DeMilitarized Zone and Port Knocking can be implemented on local and long distance networks where if an attacker wants to exploit or attack the main server, the first to be attacked is the firewall server (router). Port Knocking can also be implemented on local and long distance networks with a combined ping request time limit which makes it safer, so that if an attacker wants to access the router, and doesn't know the rules from the remote, what happens is a rejection of port access.

References

Behal, S., & Kumar, K. (2016). Trends in Validation of DDoS Research. Procedia Computer Science, 85(Cms), 7–15. https://doi.org/10.1016/j.procs.2016.05.170

Deshmukh, R. V., & Devadkar, K. K. (2015). Understanding DDoS attack & its effect in cloud environment. Procedia Computer Science, 49(1), 202–210. https://doi.org/10.1016/j.procs.2015.04.245

Donahue, G. A. (2011). Network Warrior (2nd ed.; O. Media, Ed.). United State: O’Reilly Media.

Hendro Wijayanto, I. A. P. (2020). Policy Brief : Kesiapan Perguruan Tinggi Wilayah Jawa Tengah Dalam Menghadapi Serangan Siber. Indonesia: LPPM Universitas Dian Nuswantoro.

Link11. (2020). DDoS Statistics (infographic) for the 1st Quarter of 2020. Retrieved from https://www.link11.com/en/downloads/ddos-statistics-infographic-for-the-1st-quarter-of-2020/

Mikrotik. (n.d.). Simple Port Knocking. Retrieved October 19, 2020, from Mikrotik website: http://www.mikrotik.co.id/artikel_lihat.php?id=105

Vivek Ganti, O. Y. (2020). Network-layer DDoS attack trends for Q2 2020. Retrieved October 19, 2020, from Cloudflare website: https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q2-2020/

Downloads

Published

11-12-2020

How to Cite

[1]
A. Saputro, N. Saputro, and H. Wijayanto, “DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY”, csecurity, vol. 3, no. 2, pp. 22–27, Dec. 2020.