Published August 18, 2024 | Version v1
Journal article Open

Network Vulnerability Evaluation using Penetration Testing using MikroTik Router

Description

In theory, the advancement of data and communications innovation is progressing exceptionally quickly with the development of computer systems that utilize organizational devices such as the MikroTik router. Network security is necessary to prevent threats or attacks such as DDoS (Distributed Denial of Services). To make progress on the security of the MikroTik switch, a study was conducted that conducted security testing using multiple input testing strategies, including abuse, brute-drive, and DDoS. Initial testing is a process in which someone attempts to recreate attacks carried out on multiple corporate networks/agencies in order to uncover vulnerabilities contained within the network. The person performing this movement is called the penetration tester. DDoS can be a type of attack that increases web activity on a server or network. This DDoS attack usually takes place on MikroTik switch servers and has quite far-reaching effects. The purpose of this request is to gain access to the MikroTik switch and test the performance of the MikroTik CPU stack against DDoS attacks while providing suggestions for changes to the vulnerabilities found in these objects. This research aims to improve the security of MikroTik switch devices and prevent risks and attacks.

Files

ISRGJAHSS5722024.pdf

Files (939.9 kB)

Name Size Download all
md5:59a2f4d7fd2aa787a0890758469a9709
939.9 kB Preview Download