Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Sistem Monitoring Login Failure dengan Via Telegram dari Serangan Brutus pada Router Mikrotik

View through CrossRef
A monitoring system is needed to monitor a network topology from attacks that might occur at that time. A realtime monitoring system is needed to find out the attack. Therefore, in this study, an attack scenario on a proxy router was carried out using a brute force technique. The brute force technique is an efficient method that tries every possible login password character that the network administrator might use. This brute force technique already exists in the application used, namely Brutus. Brutus is executed by focusing the attack on port 23 telnet on the proxy router. The system log listed as a login failure caused by a brute attack on the proxy router will be forwarded by a script that is running to a notification with a network administrator telegram bot. From the results of research that has been carried out on the monitoring system on the proxy running in real time to notify the login failure message via telegram. The telegram notification will stop if the password has been found by Brutus or the Brutus dictionary does not find the password on the designed Mikrotik router network. Prevention is done by disabling open ports and activating the drop firewall menu if it finds a possible attacker's ip address on the mikrotik router to reduce attacks from the attacker.
Universitas Putra Indonesia YPTK Padang
Title: Sistem Monitoring Login Failure dengan Via Telegram dari Serangan Brutus pada Router Mikrotik
Description:
A monitoring system is needed to monitor a network topology from attacks that might occur at that time.
A realtime monitoring system is needed to find out the attack.
Therefore, in this study, an attack scenario on a proxy router was carried out using a brute force technique.
The brute force technique is an efficient method that tries every possible login password character that the network administrator might use.
This brute force technique already exists in the application used, namely Brutus.
Brutus is executed by focusing the attack on port 23 telnet on the proxy router.
The system log listed as a login failure caused by a brute attack on the proxy router will be forwarded by a script that is running to a notification with a network administrator telegram bot.
From the results of research that has been carried out on the monitoring system on the proxy running in real time to notify the login failure message via telegram.
The telegram notification will stop if the password has been found by Brutus or the Brutus dictionary does not find the password on the designed Mikrotik router network.
Prevention is done by disabling open ports and activating the drop firewall menu if it finds a possible attacker's ip address on the mikrotik router to reduce attacks from the attacker.

Related Results

PEMANFAATAN API CLIENT BERBASIS PYTHON UNTUK KONFIGURASI IPS PADA ROUTER MIKROTIK
PEMANFAATAN API CLIENT BERBASIS PYTHON UNTUK KONFIGURASI IPS PADA ROUTER MIKROTIK
Penelitian ini bertujuan untuk bagaimana mengendalikan RouterOS MikroTik sebagai sebuah konfigurasiIPS menggunakanAPI Client berbasis Python. Apakah perintah-perintah jaringan untu...
IMPLEMENTASI BOT TELEGRAM UNTUK MONITORING MIKROTIK PADA PLANETS NETWORK SOLUTION
IMPLEMENTASI BOT TELEGRAM UNTUK MONITORING MIKROTIK PADA PLANETS NETWORK SOLUTION
Berkembangnya teknologi komunikasi begitu pesat, dan tercipta smartphone yang dapat membantu manusia untuk berkomunikasi melalui instant messenger. Terdapat aplikasi instant messen...
PENGEMBANGAN APLIKASI REMOTE BERBASIS ANDROID UNTUK KONFIGURASI INTRUSION PREVENTION SYSTEM MEMANFATKAN INTERNET OF THINGS
PENGEMBANGAN APLIKASI REMOTE BERBASIS ANDROID UNTUK KONFIGURASI INTRUSION PREVENTION SYSTEM MEMANFATKAN INTERNET OF THINGS
Router MikroTik mampu untuk dikonfigurasi sebagai Intrusion Prevention System (IPS) sehingga dapat menolak paket data yang memiliki perilaku sebagai serangan Port Scanning, Brute F...
Konfigurasi Jaringan Mikrotik Dedi Satria 175100009
Konfigurasi Jaringan Mikrotik Dedi Satria 175100009
Kebutuhan akan akses internet dewasa ini sangat tinggi sekali. Baik untuk mencari informasi , artikel, pengetahuan terbaru atau bahkan hanya untuk chating.Pembagian nomor untuk int...
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Penguatan Kapasitas Masyarakat Desa Serangan Menuju Pariwisata Berkelanjutan
Potensi wisata Kelurahan Serangan dinilai cukup tinggi. Berdasarkan hasil wawancara singkat dengan salah satu Kepala Lingkungan Kelurahan Serangan, ditemukan bahwa Serangan mengede...
A Full-Duplex 5×5 Optical Router Based on a Hybrid Photonic-Plasmonic Switch
A Full-Duplex 5×5 Optical Router Based on a Hybrid Photonic-Plasmonic Switch
An optical router is an essential component of a photonic network-on-chip (PNoC). Normally, an optical router consists of traditional optical elements such as the micro-ring resona...
SISTEM INFORMASI SEBAGAI KEILMUAN YANG MULTIDISIPLINER
SISTEM INFORMASI SEBAGAI KEILMUAN YANG MULTIDISIPLINER
Saat ini, dibandingkan dengan negara sekitar, di manakah posisi Indonesia? Tepat sesaat sebelum pandemi, World bank mengkategorikan Indonesia pada posisi upper middle income dan PB...
E-LEARNING BERBASIS TELEGRAM BOT
E-LEARNING BERBASIS TELEGRAM BOT
Pemanfaatan teknologi pada kegiatan belajar dalam kelas bertujuan untuk memudahkan pengajar dalam memberikan materi pelajaran dan peserta didik dalam mengaksesnya. Adanya beberapa ...

Back to Top