International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 183 - Number 47 |
Year of Publication: 2022 |
Authors: Rosihan, Yasir Muin |
10.5120/ijca2022921878 |
Rosihan, Yasir Muin . MikroTik Router Vulnerability Testing for Network Vulnerability Evaluation using Penetration Testing Method. International Journal of Computer Applications. 183, 47 ( Jan 2022), 33-37. DOI=10.5120/ijca2022921878
the improvement of information and communication technology is very rapid with the progress of computer networks using network devices such as the MikroTik Router.Network security is needed to prevent threats or attacks such as DDoS (Distributed Denial of Services). To improve network security on the MikroTik Router, a study was conducted that conducted vulnerability testing with several penetration testing methods including Exploit, Brute Force, and DDoS. Penetration Testing is an activity where someone tries to simulate attacks that can be carried out on several organizational networks/agencies to find vulnerabilities contained in the network system. The person who performs this activity is known as penetration testing. DDoS is a type of attack that floods internet traffic on a server or network. This DDoS attack usually occurs on MikroTik router servers which has a fairly large impact. The purpose of this research is to gain access to the MikroTik Router and to test the performance of the MikroTik CPU Load from DDoS attacks while providing recommendations for improvements to the vulnerabilities found in these objects. This research is expected to produce network security on MikroTik Router devices that can prevent threats and attacks.