Analysis of Brute Force Attacks Using National Institute Of Standards And Technology (NIST) Methods on Routers Case study: Faculty of Engineering UNIMMA
Main Article Content
Abstract
Abstract
The rapid development of technology, including the internet, can trigger data security issues that harm individuals, organizations, or government agencies. One type of attack often used is a Brute Force attack, which falls under the category of cybercrime. The National Institute of Standards and Technology (NIST) often analyzes digital evidence in these cases. This study analyzes Brute Force attacks using NIST methods on a router that is an additional router to the main router. On the network at the Faculty of Engineering, Universitas Muhammadiyah Magelang (UNIMMA), information about the attack and patterns used by the attacker were successfully obtained, including the IP address and time of the attack. It is concluded that the additional router is vulnerable to Brute Force attacks, and firewall settings are necessary to secure it.
Article Details
Copyright Notice
Authors who publish with Journal of Informatics, Information System, Software Engineering and Applications (INISTA) agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
References
[2] S. Alam and Y. N. Kunang, “Analisis Serangan Brute Force Pada Ip Address Cctv (Closed Circuit Television) Menggunakan Metode Komputer Forensic,” no. Vol 3 No 3 (2021): Bina Darma Conference on Computer Science (BDCCS), pp. 544–553, 2021.
[3] Y. Mulyanto, H. Herfandi, and R. Candra Kirana, “Analisis Keamanan Wireless Local Area Network (WLAN) Terhadap Serangan Brute Force Dengan Metode Penetration Testing (Studi kasus:RS H.Lmanambai Abdulkadir),” J. Inform. Teknol. dan Sains, vol. 4, no. 1, pp. 26–35, Feb. 2022, doi: 10.51401/jinteks.v4i1.1528.
[4] M. H. Hawarizmi, M. T. Kurniawan, and M. Fathinuddin, “Sistem Deteksi Serangan Ddos pada Software Defined Network Menggunakan Metode Entropy,” pp. 615–628, doi: http://dx.doi.org/10.30591/smartcomp.v11i4.4246.
[5] T. Chen, W. Yu, R. Chen, and L. Lin, “Knowledge-embedded routing network for scene graph generation,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 2019-June, pp. 6156–6164, 2019, doi: 10.1109/CVPR.2019.00632.
[6] W. Syahputra, T. . Diansyah, and R. Liza, “Pemanfaatan Mikrotik Router Board Sebagai Pengaman Serangan DDOS Menggunakan Metode IDS,” Snastikom, vol. 1, no. 1, pp. 492–499, 2020.
[7] N. Nasirudin, S. Sunardi, and I. Riadi, “Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 89, Mar. 2020, doi: 10.32493/informatika.v5i1.4578.
[8] I. Riadi, Sunardi, and Sahiruddin, “Perbandingan Tool Forensik Data Recovery Berbasis Android Menggunakan Metode Nist,” J. Teknol. Inf. dan Ilmu Komput., vol. 7, no. 1, pp. 197–204, 2020, doi: 10.25126/jtiik.202071921.
[9] R. Umar, I. Riadi, and G. M. Zamroni, “Mobile Forensic Tools Evaluation for Digital Crime Investigation,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 3, p. 949, Jun. 2018, doi: 10.18517/ijaseit.8.3.3591.
[10] P. Hendradi, “Analisis Keamanan E-learning Menggunakan Open Web Application Security Project (OWASP) studi kasus MOCA UNIMMA,” J. Inform., vol. 22, no. 02, pp. 132–138, 2022, doi: https://doi.org/10.30873/ji.v22i2.3327.
[11] Khairunnisak Nur Isnaini, “Analisis Forensik Untuk Mendeteksi Keaslian Citra Digital Menggunakan Metode NIST,” 100 unter 1 Milliarde, vol. 3, no. 2, pp. 175–179, 2020, doi: 10.1007/978-3-322-91586-3_37.
[12] M. Mushlihudin and A. Nofiyan, “Analisis Forensik pada Web Phishing Menggunakan Metode National Institute of Standards and Technology,” Cybernetics, vol. 4, no. 02, pp. 11–23, 2021, doi: 10.29406/cbn.v4i02.2287.
[13] Y. Mulyanto and A. Algi Fari, “Analisis Keamanan Login Router Mikrotik Dari Serangan Bruteforce Menggunakan Metode Penetration Testing (Studi Kasus: SMK Negeri 2 Sumbawa),” J. Inform. Teknol. dan Sains, vol. 4, no. 3, pp. 145–155, Aug. 2022, doi: 10.51401/jinteks.v4i3.1897.
[14] S. Dwiyatno, “Analisis Monitoring Sistem Jaringan Komputer Menggunakan Software NMAP,” PROSISKO J. Pengemb. Ris. dan Obs. Sist. Komput., vol. 7, no. 2, pp. 108–115, Sep. 2020, doi: 10.30656/prosisko.v7i2.2522.