The opening of the service port on the Mikrotik router provides an opening for hackers to enter the Mikrotik service to access the router illegally. This research aimed to close certain ports that are gaps for hackers and uses port knocking and telegram bots. The Telegram bot was used as a message notification to managers in real-time to provide information that occurs when the vulnerability scanning process is carried out to find and map weaknesses in the network system. Searching for weaknesses also includes looking for open router service ports such as ports 22, 23, 80, and 8291. This research used the Network Development Life Cycle method, which started from analysis design and prototype simulation to implementation. The research result...
In 2018, several malware campaigns targeted and succeed to infect millions of low-cost routers (malw...
IDS (Intrusion Detection System) merupakan suatu sistem yang dapat mendeteksi aktifitas mencurigakan...
This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol ...
Network security is a very important aspect in maintaining information security. In network manageme...
Network security is important for a company or institution in maintaining data and information secur...
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in bus...
Computer networks are basically not safe to access freely. Security gaps in the network can be seen ...
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in busi...
Cyber attacks are a serious threat to network security, especially in routers that result in termina...
Technological advancements continue to progress rapidly, allowing experts to enhance their knowledge...
In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechani...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
The constantly evolving of information technology landscape has made information security something ...
Perkembangan teknologi sampai saat ini terus berkembang. Perkembangan tersebut berdampak pada keaman...
The use of server computer machines in companies is primarily a web hosting server that is very easy...
In 2018, several malware campaigns targeted and succeed to infect millions of low-cost routers (malw...
IDS (Intrusion Detection System) merupakan suatu sistem yang dapat mendeteksi aktifitas mencurigakan...
This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol ...
Network security is a very important aspect in maintaining information security. In network manageme...
Network security is important for a company or institution in maintaining data and information secur...
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in bus...
Computer networks are basically not safe to access freely. Security gaps in the network can be seen ...
In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in busi...
Cyber attacks are a serious threat to network security, especially in routers that result in termina...
Technological advancements continue to progress rapidly, allowing experts to enhance their knowledge...
In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechani...
Attacks targeting network infrastructure devices pose a threat to the security of the internet. An a...
The constantly evolving of information technology landscape has made information security something ...
Perkembangan teknologi sampai saat ini terus berkembang. Perkembangan tersebut berdampak pada keaman...
The use of server computer machines in companies is primarily a web hosting server that is very easy...
In 2018, several malware campaigns targeted and succeed to infect millions of low-cost routers (malw...
IDS (Intrusion Detection System) merupakan suatu sistem yang dapat mendeteksi aktifitas mencurigakan...
This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol ...