Implementation and Security Testing of Mikrotik Router Againts Cyber Attacks Using Firewall and Penetration Testing
DOI:
https://doi.org/10.59934/jaiea.v4i3.962Keywords:
Network Security, Winbox Exploitation, Brute Force, Dos, Firewall, Penetration TestingAbstract
Network security is a crucial aspect that must be considered, because without adequate security, the network becomes vulnerable to cyber attacks that can cause losses. Routers are one of the most vulnerable and easily attacked targets because of their very important role in computer network systems. One of the most common types of routers used in developing countries is Mikrotik. Mikrotik routers have several security holes, such as CVE-2018-14847 (Winbox Exploitation), Brute-Force Attacks, and Denial of Service (DoS), which can be exploited by attackers to cause disruption or loss. Therefore, efforts to prevent cyber attacks are very important. Preventive steps that can be taken are by implementing a strong security system on Mikrotik routers through firewall configuration and conducting penetration testing to ensure that the configuration applied is optimal. This study uses the SDLC (Security Development Life Cycle) model, using the waterfall model stages.
Downloads
References
D. H. Gutama, A. K. A. Estetikha, and R. A. Setiawan, “Penanganan Serangan Brute Force dan Port Scanning Pada Router Mikrotik,” J. Sist. Informasi, dan Teknol. Inf., vol. 1, no. 2, pp. 1–13, 2022, [Online]. Available: https://journal-siti.org/index.php/siti/PublishedByHPTAI
Haeruddin, “Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS,” J. Media Inform. Budidarma, vol. 5, no. 3, pp. 848–855, 2021, doi: 10.30865/mib.v5i3.2979.
C. P. B. Scholten, “Hacking the router: characterizing attacks targeting low-cost routers using a honeypot router,” (Bachelor’s thesis, University of Twente)., 2019.
J. M. Ceron, C. Scholten, A. Pras, and J. Santanna, “MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification,” in Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020: Management in the Age of Softwarization and Artificial Intelligence, NOMS 2020, 2020. doi: 10.1109/NOMS47738.2020.9110336.
Rosihan and Y. Muin, “MikroTik Router Vulnerability Testing for Network Vulnerability Evaluation using Penetration Testing Method,” Int. J. Comput. Appl., vol. 183, no. 47, pp. 975–8887, 2022, doi: 10.5120/ijca2022921878.
B. Jaya, Y. Yuhandri, and S. Sumijan, “Peningkatan Keamanan Router Mikrotik Terhadap Serangan Denial of Service (DoS),” J. Sistim Inf. dan Teknol., vol. 2, no. 4, pp. 115–123, 2020, doi: 10.37034/jsisfotek.v2i4.32.
B. Jagad, G. Putra, T. Musri, M. Kom, and L. M. Gultom, “Pemanfaatan Mikrotik Routerboard Sebagai Keamanan Jaringan Dari Udp Flood Dengan Menggunakan Firewall Di Dinas Pendidikan Bengkalis,” SNIT Semin. Nas. Ind. dan Teknol., vol. 2, no. 1, pp. 260–292, 2020, [Online]. Available: https://snit-polbeng.org/eprosiding/index.php/snit/article/view/136/138
S. Bahri, “Perancangan Keamanan Jaringan Untuk Mencegah Terjadinya Serangan Bruteforce Pada Router,” Indones. J. Educ. Comput. Sci., vol. 1, no. 3, pp. 136–147, 2023, doi: 10.60076/indotech.v1i3.239.
R. A. Febrian, Y. Muhyidin, and D. Singasatia, “Analisis Penyerangan Bruteforce Terhadap Secure Shell (Ssh) Menggunakan Metode Penetration Testing,” Sci. J. Ilm. Sain dan Teknol. Anal., vol. 2, no. 11, pp. 151–162, 2024.
B. Cahya, F. Rizki, A. Sutiyo, Y. El Saputra, and M. Elfarizi, “Implementasi Firewall Pada Mikrotik Untuk Keamanan Jaringan,” JOCOTIS-Journal Sci. Inform. Robot., vol. 1, no. 2, pp. 63–80, 2023, [Online]. Available: https://jurnal.ittc.web.id/index.php/jct/
Rafay Baloch, Ethical hacking and penetration testing guide. Auerbach Publications, 2017.
B. S. Anggoro and W. Sulistyo, “Implementasi Intrusion Prevention System Suricata dengan Anomaly-Based untuk Keamanan Jaringan PT. Grahamedia Informasi,” Semin. Nas. APTIKOM, pp. 1–9, 2019.
D. Syafriani, R. T. Amanda, S. M. Rambe, and U. K. Siregar, “Pelatihan Perancangan Jaringan LAN Pada Ruangan SMK Telkom-2 Menggunakan Cisco Packet Tracer,” J. Has. Pengabdi. Masy., vol. 1, no. 1, pp. 8–15, 2022, doi: 10.62712/juribmas.v1i1.4.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Journal of Artificial Intelligence and Engineering Applications (JAIEA)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.