Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS
Abstract
The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.
Keywords
Full Text:
PDFReferences
C. Scholten, “Hacking the router : characterizing attacks targeting low-cost routers using a honeypot router,†2019.
J. M. Ceron, C. Scholten, A. Pras, and J. Santanna, “MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification,†Proc. IEEE/IFIP Netw. Oper. Manag. Symp. 2020 Manag. Age Softwarization Artif. Intell. NOMS 2020, 2020, doi: 10.1109/NOMS47738.2020.9110336.
H. L. J. Bijmans, T. M. Booij, and C. Doerr, “Just the tip of the iceberg: Internet-scale exploitation of routers for cryptojacking,†Proc. ACM Conf. Comput. Commun. Secur., pp. 449–464, 2019, doi: 10.1145/3319535.3354230.
Y. Fadlallah, M. Sbeiti, M. Hammoud, M. Nehme, and A. Fadlallah, “On the Cyber Security of Lebanon: A Large Scale Empirical Study of Critical Vulnerabilities,†8th Int. Symp. Digit. Forensics Secur. ISDFS 2020, 2020, doi: 10.1109/ISDFS49300.2020.9116446.
C. Marrison, “DNS as an attack vector - And how businesses can keep it secure,†Netw. Secur., vol. 2014, no. 6, pp. 17–20, Jun. 2014, doi: 10.1016/S1353-4858(14)70061-3.
D. Aprilianto, T. Fadila, and M. A. Muslim, “Sistem Pencegahan UDP DNS Flood Dengan Filter Firewall Pada Router Mikrotik,†Techno.Com, vol. 16, no. 2, pp. 114–119, 2017, doi: 10.33633/tc.v16i2.1291.
X. Liang and T. Znati, “On the performance of intelligent techniques for intensive and stealthy DDos detection,†Comput. Networks, vol. 164, p. 106906, Dec. 2019, doi: 10.1016/j.comnet.2019.106906.
B. Jaya, Y. Yunus, and S. Sumijan, “Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS),†J. Sistim Inf. dan Teknol., vol. 2, pp. 5–9, 2020, doi: 10.37034/jsisfotek.v2i4.81.
A. Amarudin, “Desain Keamanan Jaringan Pada Mikrotik Router OS Menggunakan Metode Port Knocking,†J. Teknoinfo, vol. 12, no. 2, p. 72, 2018, doi: 10.33365/jti.v12i2.121.
R. Liza, “PEMANFAATAN MIKROTIK ROUTER BOARD SEBAGAI PENGAMAN,†pp. 492–499, 2020.
A. Bustami and S. Bahri, “Ancaman, Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi: Systematic Review,†Unistek, vol. 7, no. 2, 2020.
Y. Arta, A. Syukur, and R. Kharisma, “Simulasi Implementasi Intrusion Prevention System (IPS) Pada Router Mikrotik,†It J. Res. Dev., vol. 3, no. 1, pp. 104–114, 2018, doi: 10.25299/itjrd.2018.vol3(1).1346.
Haeruddin, “Security Design And Testing of Lan and Wlan Network in Mikrotik Router Using Penetration Testing Method FROM Mitm Attack,†J. Informatics Telecommun. Eng., vol. 4, no. 1, pp. 119–127, 2020, doi: 10.31289/jite.v4i1.3832.
M. C. Ghanem and T. M. Chen, “Reinforcement learning for efficient network penetration testing,†Inf., vol. 11, no. 1, pp. 1–23, 2020, doi: 10.3390/info11010006.
B. V. Tarigan, A. Kusyanti, and W. Yahya, “Analisis Perbandingan Penetration Testing Tool Untuk Aplikasi Web,†J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 1, no. 3, pp. 206–214, 2017.
S. Syed et al., “Case Study : Intranet Penetration Testing of MUET,†vol. 2020, no. December, pp. 17–19, 2019.
S. A. Pamuji, C. Iswahyudi, and T. Informatika, “Analisis Dan Optimasi Dari Simulasi Keamanan Jaringan Menggunakan Firewall Mikrotik Studi Kasus Di Taman Pintar Yogyakarta,†J. JARKOM, vol. 7, no. 1, pp. 65–75, 2020.
I. Kamilah and A. Hendri Hendrawan, “Analisis Keamanan Vulnerability pada Server Absensi Kehadiran Laboratorium di Program Studi Teknik Informatika,†Pros. Semnastek, vol. 16, no. 0, pp. 1–9, 2019, [Online]. Available: https://jurnal.umj.ac.id/index.php/semnastek/article/view/5233.
DOI: https://doi.org/10.30865/mib.v5i3.2979
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 JURNAL MEDIA INFORMATIKA BUDIDARMA

This work is licensed under a Creative Commons Attribution 4.0 International License.
JURNAL MEDIA INFORMATIKA BUDIDARMA
Universitas Budi Darma
Secretariat: Sisingamangaraja No. 338 Telp 061-7875998
Email: mib.stmikbd@gmail.com

This work is licensed under a Creative Commons Attribution 4.0 International License.