Network Vulnerability Evaluation using Penetration Testing using MikroTik Router
Authors/Creators
Description
In theory, the advancement of data and communications innovation is progressing exceptionally quickly with the development of computer systems that utilize organizational devices such as the MikroTik router. Network security is necessary to prevent threats or attacks such as DDoS (Distributed Denial of Services). To make progress on the security of the MikroTik switch, a study was conducted that conducted security testing using multiple input testing strategies, including abuse, brute-drive, and DDoS. Initial testing is a process in which someone attempts to recreate attacks carried out on multiple corporate networks/agencies in order to uncover vulnerabilities contained within the network. The person performing this movement is called the penetration tester. DDoS can be a type of attack that increases web activity on a server or network. This DDoS attack usually takes place on MikroTik switch servers and has quite far-reaching effects. The purpose of this request is to gain access to the MikroTik switch and test the performance of the MikroTik CPU stack against DDoS attacks while providing suggestions for changes to the vulnerabilities found in these objects. This research aims to improve the security of MikroTik switch devices and prevent risks and attacks.
Files
ISRGJAHSS5722024.pdf
Files
(939.9 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:59a2f4d7fd2aa787a0890758469a9709
|
939.9 kB | Preview Download |