Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity

Preventing unidentified individuals from misusing their access to information is a major concern when it comes to data security. Network administrators are charged with working harder to be able to secure the computer network they manage. The utilization of right method is a challenge for network ad...

Full description

Saved in:
Bibliographic Details
Main Authors: Tati Ernawati, Idham Kholid, Dahlan, Dini Rohmayani
Format: Article
Language:English
Published: Department of Informatics, UIN Sunan Gunung Djati Bandung 2024-04-01
Series:JOIN: Jurnal Online Informatika
Subjects:
Online Access:https://join.if.uinsgd.ac.id/index.php/join/article/view/1254
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849335771327102976
author Tati Ernawati
Idham Kholid
Dahlan
Dini Rohmayani
author_facet Tati Ernawati
Idham Kholid
Dahlan
Dini Rohmayani
author_sort Tati Ernawati
collection DOAJ
description Preventing unidentified individuals from misusing their access to information is a major concern when it comes to data security. Network administrators are charged with working harder to be able to secure the computer network they manage. The utilization of right method is a challenge for network administrators to protect computer network from intruders. The RPK method is one of solution to overcome this problem. This research aims to implement RPK method on the principles of availability, confidentiality, and integrity which have not been explored by previous studies. The network system configuration stage involved installing Debian 9, NMAP, Hydra, RPK, cloud server, remote admin, and attacker. The network security system's performance was tested, revealing a 99.97% availability rate and 100% confidentiality. The system's integrity was assessed, with an average response time of 0.22 seconds and 100% blocking accuracy. The test results indicate that the system's network security performance, using the RPK method, capable of protecting server attacks and effectively upholding security stability.
format Article
id doaj-art-972d1fbca4004531b6cb4ee3288c39d6
institution Kabale University
issn 2528-1682
2527-9165
language English
publishDate 2024-04-01
publisher Department of Informatics, UIN Sunan Gunung Djati Bandung
record_format Article
series JOIN: Jurnal Online Informatika
spelling doaj-art-972d1fbca4004531b6cb4ee3288c39d62025-08-20T03:45:10ZengDepartment of Informatics, UIN Sunan Gunung Djati BandungJOIN: Jurnal Online Informatika2528-16822527-91652024-04-0191415110.15575/join.v9i1.12541255Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and IntegrityTati Ernawati0https://orcid.org/0000-0002-0108-1098Idham Kholid1Dahlan2Dini Rohmayani3Informatics Engineering Study Program, TEDC Bandung PolytechnicInformatics Engineering Study Program, TEDC Bandung PolytechnicInformatics Engineering Study Program, TEDC Bandung PolytechnicInformatics Engineering Study Program, TEDC Bandung PolytechnicPreventing unidentified individuals from misusing their access to information is a major concern when it comes to data security. Network administrators are charged with working harder to be able to secure the computer network they manage. The utilization of right method is a challenge for network administrators to protect computer network from intruders. The RPK method is one of solution to overcome this problem. This research aims to implement RPK method on the principles of availability, confidentiality, and integrity which have not been explored by previous studies. The network system configuration stage involved installing Debian 9, NMAP, Hydra, RPK, cloud server, remote admin, and attacker. The network security system's performance was tested, revealing a 99.97% availability rate and 100% confidentiality. The system's integrity was assessed, with an average response time of 0.22 seconds and 100% blocking accuracy. The test results indicate that the system's network security performance, using the RPK method, capable of protecting server attacks and effectively upholding security stability.https://join.if.uinsgd.ac.id/index.php/join/article/view/1254availabilityconfidentialityintegritynetwork securityrandom port knocking
spellingShingle Tati Ernawati
Idham Kholid
Dahlan
Dini Rohmayani
Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity
JOIN: Jurnal Online Informatika
availability
confidentiality
integrity
network security
random port knocking
title Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity
title_full Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity
title_fullStr Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity
title_full_unstemmed Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity
title_short Case Study in Network Security System Using Random Port Knocking Method on The Principles of Availability, Confidentiality and Integrity
title_sort case study in network security system using random port knocking method on the principles of availability confidentiality and integrity
topic availability
confidentiality
integrity
network security
random port knocking
url https://join.if.uinsgd.ac.id/index.php/join/article/view/1254
work_keys_str_mv AT tatiernawati casestudyinnetworksecuritysystemusingrandomportknockingmethodontheprinciplesofavailabilityconfidentialityandintegrity
AT idhamkholid casestudyinnetworksecuritysystemusingrandomportknockingmethodontheprinciplesofavailabilityconfidentialityandintegrity
AT dahlan casestudyinnetworksecuritysystemusingrandomportknockingmethodontheprinciplesofavailabilityconfidentialityandintegrity
AT dinirohmayani casestudyinnetworksecuritysystemusingrandomportknockingmethodontheprinciplesofavailabilityconfidentialityandintegrity