Analysis of Brute Force Attacks Using National Institute Of Standards And Technology (NIST) Methods on Routers Case study: Faculty of Engineering UNIMMA

Main Article Content

Catur Pamungkas
Purwono Hendradi
Dimas Sasongko
Afwan Ghifari



The rapid development of technology, including the internet, can trigger data security issues that harm individuals, organizations, or government agencies. One type of attack often used is a Brute Force attack, which falls under the category of cybercrime. The National Institute of Standards and Technology (NIST) often analyzes digital evidence in these cases. This study analyzes Brute Force attacks using NIST methods on a router that is an additional router to the main router. On the network at the Faculty of Engineering, Universitas Muhammadiyah Magelang (UNIMMA), information about the attack and patterns used by the attacker were successfully obtained, including the IP address and time of the attack. It is concluded that the additional router is vulnerable to Brute Force attacks, and firewall settings are necessary to secure it.

Article Details

How to Cite
Pamungkas, C., Hendradi, P., Sasongko, D., & Ghifari, A. (2023). Analysis of Brute Force Attacks Using National Institute Of Standards And Technology (NIST) Methods on Routers. Journal of Informatics Information System Software Engineering and Applications (INISTA), 5(2), 115-125.


[1] H. Alfidzar and B. P. Zen, “Implementasi HoneyPy Dengan Malicious Traffic Detection System (Maltrail) Menggunakan Analisis Deskriptif Guna Untuk Mendeteksi Serangan DDOS Pada Server,” J. Informatics, Inf. Syst. Softw. Eng. Appl., vol. 4, no. 2, pp. 32–45, May 2022, doi: 10.20895/inista.v4i2.534.
[2] S. Alam and Y. N. Kunang, “Analisis Serangan Brute Force Pada Ip Address Cctv (Closed Circuit Television) Menggunakan Metode Komputer Forensic,” no. Vol 3 No 3 (2021): Bina Darma Conference on Computer Science (BDCCS), pp. 544–553, 2021.
[3] Y. Mulyanto, H. Herfandi, and R. Candra Kirana, “Analisis Keamanan Wireless Local Area Network (WLAN) Terhadap Serangan Brute Force Dengan Metode Penetration Testing (Studi kasus:RS H.Lmanambai Abdulkadir),” J. Inform. Teknol. dan Sains, vol. 4, no. 1, pp. 26–35, Feb. 2022, doi: 10.51401/jinteks.v4i1.1528.
[4] M. H. Hawarizmi, M. T. Kurniawan, and M. Fathinuddin, “Sistem Deteksi Serangan Ddos pada Software Defined Network Menggunakan Metode Entropy,” pp. 615–628, doi:
[5] T. Chen, W. Yu, R. Chen, and L. Lin, “Knowledge-embedded routing network for scene graph generation,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 2019-June, pp. 6156–6164, 2019, doi: 10.1109/CVPR.2019.00632.
[6] W. Syahputra, T. . Diansyah, and R. Liza, “Pemanfaatan Mikrotik Router Board Sebagai Pengaman Serangan DDOS Menggunakan Metode IDS,” Snastikom, vol. 1, no. 1, pp. 492–499, 2020.
[7] N. Nasirudin, S. Sunardi, and I. Riadi, “Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 89, Mar. 2020, doi: 10.32493/informatika.v5i1.4578.
[8] I. Riadi, Sunardi, and Sahiruddin, “Perbandingan Tool Forensik Data Recovery Berbasis Android Menggunakan Metode Nist,” J. Teknol. Inf. dan Ilmu Komput., vol. 7, no. 1, pp. 197–204, 2020, doi: 10.25126/jtiik.202071921.
[9] R. Umar, I. Riadi, and G. M. Zamroni, “Mobile Forensic Tools Evaluation for Digital Crime Investigation,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 3, p. 949, Jun. 2018, doi: 10.18517/ijaseit.8.3.3591.
[10] P. Hendradi, “Analisis Keamanan E-learning Menggunakan Open Web Application Security Project (OWASP) studi kasus MOCA UNIMMA,” J. Inform., vol. 22, no. 02, pp. 132–138, 2022, doi:
[11] Khairunnisak Nur Isnaini, “Analisis Forensik Untuk Mendeteksi Keaslian Citra Digital Menggunakan Metode NIST,” 100 unter 1 Milliarde, vol. 3, no. 2, pp. 175–179, 2020, doi: 10.1007/978-3-322-91586-3_37.
[12] M. Mushlihudin and A. Nofiyan, “Analisis Forensik pada Web Phishing Menggunakan Metode National Institute of Standards and Technology,” Cybernetics, vol. 4, no. 02, pp. 11–23, 2021, doi: 10.29406/cbn.v4i02.2287.
[13] Y. Mulyanto and A. Algi Fari, “Analisis Keamanan Login Router Mikrotik Dari Serangan Bruteforce Menggunakan Metode Penetration Testing (Studi Kasus: SMK Negeri 2 Sumbawa),” J. Inform. Teknol. dan Sains, vol. 4, no. 3, pp. 145–155, Aug. 2022, doi: 10.51401/jinteks.v4i3.1897.
[14] S. Dwiyatno, “Analisis Monitoring Sistem Jaringan Komputer Menggunakan Software NMAP,” PROSISKO J. Pengemb. Ris. dan Obs. Sist. Komput., vol. 7, no. 2, pp. 108–115, Sep. 2020, doi: 10.30656/prosisko.v7i2.2522.