Network Security Applications Using the Port Knocking Method

3Citations
Citations of this article
63Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The most important point in network services is security of access in the port. However, the problem that occurs is an open port or access that cannot be accessed with authentication that can facilitate unauthorized users to be accessed by the server. This is the basis for increasing access rights to the server that is built without having to close the port used by the user. Therefore a port knocking method is needed. Port knocking is a security system that can perform a function that is blocking unwanted access. In principle, port knocking successfully closes all ports on the server. If the user needs access to the server, the user does a "knock" to use the service, then if the user has finished accessing the port is closed again. The system built in this study uses three ports, namely port 22 (SSH), port 23 (Telnet), and port 80 (Web). Port Access time is 10 seconds each. Based on the results of the analysis and testing of the system implementation carried out, the results of the system can be run properly and can improve the security of network systems that are built compared to networks that do not use Port Knocking security. In research assessing on public and local networks. According to the results analysis, carrying out a remote server via local time requires faster time from a remote server through the public. In the SSH protocol there is a difference in time of 2.42 seconds, Telnet 2.14 seconds, and Web 2.19 seconds.

Cite

CITATION STYLE

APA

Idhom, M., Wahanani, H. E., & Fauzi, A. (2020). Network Security Applications Using the Port Knocking Method. In Journal of Physics: Conference Series (Vol. 1569). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1569/2/022046

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free