Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Article . 2024
License: CC BY
Data sources: Datacite
ZENODO
Article . 2024
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Network Vulnerability Evaluation using Penetration Testing using MikroTik Router

Authors: Umaru, Modibbo1*, Mijinyawa, Mohammed2, Umaru Umaru3;

Network Vulnerability Evaluation using Penetration Testing using MikroTik Router

Abstract

In theory, the advancement of data and communications innovation is progressing exceptionally quickly with the development of computer systems that utilize organizational devices such as the MikroTik router. Network security is necessary to prevent threats or attacks such as DDoS (Distributed Denial of Services). To make progress on the security of the MikroTik switch, a study was conducted that conducted security testing using multiple input testing strategies, including abuse, brute-drive, and DDoS. Initial testing is a process in which someone attempts to recreate attacks carried out on multiple corporate networks/agencies in order to uncover vulnerabilities contained within the network. The person performing this movement is called the penetration tester. DDoS can be a type of attack that increases web activity on a server or network. This DDoS attack usually takes place on MikroTik switch servers and has quite far-reaching effects. The purpose of this request is to gain access to the MikroTik switch and test the performance of the MikroTik CPU stack against DDoS attacks while providing suggestions for changes to the vulnerabilities found in these objects. This research aims to improve the security of MikroTik switch devices and prevent risks and attacks.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!