EVALUATION OF NETWORK ACCESS RESTRICTIONS USING MAC ADDRESS FILTERING ON MICROTIK TO IMPROVE NETWORK SECURITY

Suhadin

Sekolah Tinggi Manajemen Informatika dan Komputer IKMI Cirebon, Jawa Barat, Indonesia

[email protected]

 

ARTICLE INFO

ABSTRACT

Received:

12-01-2022

Freedom in the use of the internet network needs to be implemented in a security system in order to keep the hotspot / wifi facilities used by responsible users. Ibnu khaldun Vocational School 1 is a state school that has many study programs, one of which is Computer and Network Engineering. The problem that occurs in the Vocational High School Ibnu Khaldun is the absence of restrictions on internet network access in the use of internet networks at schools so that students, teachers, and school staff are free to use hotspot / wifi facilities, in terms of WLAN (Wireless Local Area Network) network security. still using WPA2-PSK which is easily penetrated by other parties who do not have access rights so that network security is not optimal. To overcome these problems the solution provided using MAC Address Filtering is an internet access limitation to restrict users who will access the internet network by registering the MAC Address to determine the access rights of the user's device, so that the user can be connected if the device has already registered its MAC Address. The purpose of this study is to evaluate internet network security using Mac Address Filtering which is implemented at SMK Ibnu Khaldun by registering Mac Address clients on the Access List menu to obtain access permissions in an effort to improve network security. The result of this research is that after the Wilcoxcon test, the value of Asymp.Sig is obtained. (2-tailed) of 0.000 which indicates that the value of Asymp.Sig. (2-tailed) < 0.05 then Ha is accepted and Ho is rejected. So the results of the evaluation of internet network access restrictions using MAC Address Filtering to improve network security are accepted.

Accepted:

15-01-2022

Published:

20-02-2022

Keywords :

: Computer Networks, MikroTik, Mac Address Filtering, Security network.

Corresponding Author: Suhadin

E-mail: [email protected]

https://jurnal.syntax-idea.co.id/public/site/images/idea/88x31.png

INTRODUCTION

The advancement of information technology is increasing, making the internet something that is needed in various fields, one of which is educational institutions.(Samsumar & Hadi, 2018). Networking is one of the supporting factors to be able to obtain information and as a means of communication to access various needs. The increasing need for networks to access information quickly sometimes works not as expected.(Hariadi, Bagye, & Zaen, 2019).

The more internet users in a place, there must be restrictions on use, where only certain devices can use internet facilities.(Purnama-UBSI, 2019). According to research conducted by Kurani Mega Asteroid and Yayan Hendrian in the journal Computer Engineering AMIK BSI with the title "Analysis of Wireless Local Area Network (WLAN) and Design of Mac Address Filtering using Microtik (Case Study at PT. Graha Prima Swara Jakarta)" where in the journal raised the issue of easy in the translucent of security that uses WPA2 / PSK therefore it is necessary to apply the method of security system using mac address filtering. Where the results are obtained after the implementation of restrictions can make internet access more stable because each user already has their own usage rations. (Asteroid & Hendrian, 2016).

The research conducted by Noviar Armanda Nurdin and Septian Ardiansyah in the journal Computer Science and Tenology with the title "Implementation of Mac Address Filtering using hotspot features with Mikrotik in PT. Pertamina Drilling Service Indonesia Jakarta" in the study there are several main problems faced by clients and problems on computer networks including PT. PDSI Jakarta uses Captive Portal on the WLAN network, so users can still login through several different devices in the area. Therefore, it can be applied the mac address filtering method so that by doing this restriction apart from the connection becomes stable security becomes more awake.In addition, with this mac address restriction, administrators can easily track when something happens that causes the network to be disrupted (Nurdin & Ardiansyah, 2018).

Research on network restrictions has also been conducted by Syaiful and Cahyuni Novia in the journal CYBER-TECHN with the title "Network design with Microtik hotspot and Mac Address Filtering" the report in this study is the absence of internet usage filters for wireless network users, so it is necessary to apply the mac address filtering method that makes the security of internet users more secure,so that users can enjoy access comfortably and safely with restrictions that are done. In addition to producing internet users become more controlled and orderly. From this research produce if applied in the school area so that it can control internet use be it students or teachers.(Novia, 2018).

Figure 1. User

 

Based on Figure 1 of network usage in SmK Ibn Khaldun can be seen that the use of user access rights in the Computer LAB is 20 PCs. The hotspot security network system in each lab room has no authentication of usernames and passwords to access the network, and the type of network used using a LAN. But for Teacher Admin and Students based on each number of users, in the authentication process use one username for all users of access rights, and the network used using wireless networks.

In smk Ibn Khaldun has wireless internet access, problems or constraints that occur in the wireless network of Ibn Khaldun Vocational High School including the absence of restrictions on network access, in the use of networks in ibn Khaldun vocational school so that students, teachers, and staff in schools are free to use the network, in the application of the network using Internet Service Provider in terms of network security WLAN (Wireless Local Area Network) still usesWPA2-PSK so that users who do not have the authority can not access to the internet.

To overcome the problem, the solution provided is to use MAC Address Filtering on microtics, namely to limit users who have the right to access the network, by registering a MAC Address to determine the access rights of the user's device, so that the device can be connected if the computer device has registered mac address, and able to provide WLAN network security in schools can work optimally.

Based on the background that has been listed above, this study is proposed with the title "Evaluation of Network Access Restrictions Using MAC Address Filtering on Microtics to Improve Network Security". The reason for the creation of the thesis with the title above is to manage the device that will access the network by registering the MAC Address of the user device concerned, to be able to connect to the network in an effort to improve network security so that the WLAN network at Ibn Khaldun Vocational High School can work optimally.

The purpose in the study with the title of evaluation of network access restrictions using Mac address filtering to improve network security to design network systems in schools using Mac Address Filtering. Furthermore, to implement Mac Address Filtering to improve network security using rb951Ui-2nd microtics, evaluate network security using Mac Address Filtering applied in SmK Ibnu Khaldun.

 

METHODS

The research approach used in this research is the quantitative approach (Riyanto & Hatmawan, 2020). The population in this study is the number of wireless internet users smk Ibn Khaldun as many as 86 users.Based on the existing population, the scale of the pengukuran to be used is a saturated sample. In this study, researchers used saturated samples which means that the entire population is used as a sample of 86 people.

 

RESULTS AND DISCUSSION

The population used by the Study evaluation of Network Access Restrictions Using Mac Address Filtering on Microtik to Improve Network Security amounted to 86 users consisting of staff, teachers and students of Ibn Khaldun Vocational School.

The sampling technique used in this study used saturated sampling. Saturated sampling is a sample determination technique when all members of the population are used as samples. The number of samples used as many as 30 users.

In the study Evaluation of Network Access Restrictions Using Mac Address Filtering On Microtics To Improve Network Security has research variables and interrelated indicators. The variables used are variable X = Network Security and Variable Y = Network Services. The indicators used in variable X = Avaibility, Privacy, Integrity, and Authentication. While variable indicator Y = Throughput, Packet Loss, Delay (Yuisar & Yulianti, 2015).

The population in this study is the number of wireless internet users smk Ibn Khaldun as many as 86 users. Based on the existing population, the measurement scale to be used is a saturated sample. In this study, researchers used saturated samples which means the entire population is used as a sample of 86 people.Questionnaires or Questionnaires in the evaluation study evaluated restrictions on network access on microtics to improve network security. The source object is the students and teachers of Ibn Khaldun Vocational School. The process of measuring variables uses a likert scale that contains statements that have been provided answers. The answer consists of five answer options, and each of those answers has a value.

Testing for validity in this study used a statistical formula of the person product moment correlation coefficient with a 5% signification rate. Because testing applies to so many research questionnaire items, technical calculation of statistical correlation coefficients uses the SPSS program, where each item will be tested in relation to the total score of the variable in question. With the following conditions

1.    If the value r of the table < r calculates, then the questionnaire item is declared valid

2.    If the table r value > r calculates, then the questionnaire item is declared invalid.

The value of the table r is obtained from the table r statistics with the formula df = N-2, in this study the value N = 86 then obtained df = 84 with the value of the table r = 0.212. From the calculation using SPSS obtained the following results(Ghozali, 2018) :

Table 1

Table tests the validity of instruments before implementation

Pernyataan

R Hitung

R Tabel

Keterangan

1

0,298221

0,212

Valid

2

0,205475

0,212

Tidak Valid

3

0,11689

0,212

Tidak Valid

4

0,511462

0,212

Valid

5

0,013654

0,212

Tidak Valid

6

0,57163

0,212

Valid

7

0,224145

0,212

Valid

8

0,517924

0,212

Valid

9

0,089661

0,212

Tidak Valid

10

0,46265

0,212

Valid

11

-0,03954

0,212

Tidak Valid

12

0,559183

0,212

Valid

13

0,115336

0,212

Tidak Valid

14

0,114158

0,212

Tidak Valid

15

0,392261

0,212

Valid

16

0,43506

0,212

Valid

17

0,479316

0,212

Valid

18

0,259539

0,212

Valid

19

0,286548

0,212

Valid

20

0,332753

0,212

Valid

Based on table 1, it can be known from 20 statements stated that there are 7 statements namely P2, P3, P5, P9, P11, P13 and P14 in which it is not valid, because rcalculates < r table (0.3610), then will betested reliability for questionnaire after the implementationof Mac Address Filtering for better results as in the following table

Table 2

Table of Instrument Validity Tests After Implementation

STATEMENT

R COUNT

R TABEL

INFORMATION

1

0,537133

0,212

VALID

2

0,573399

0,212

VALID

3

0,664403

0,212

VALID

4

0,444963

0,212

VALID

5

0,407301

0,212

VALID

6

0,688619

0,212

VALID

7

0,606582

0,212

VALID

8

0,74583

0,212

VALID

9

0,468828

0,212

VALID

10

0,617793

0,212

VALID

11

0,728276

0,212

VALID

12

0,765186

0,212

VALID

13

0,618218

0,212

VALID

14

0,850082

0,212

VALID

15

0,786586

0,212

VALID

16

0,786586

0,212

VALID

17

0,416402

0,212

VALID

18

0,850082

0,212

VALID

19

0,579034

0,212

VALID

20

0,850082

0,212

VALID

 

Reliability tests aim to determine the reliability of a series of statement items in their reliability measuring a variable. In this study the reliability test was conducted with Cronbach's Alpha test with the provision that if the alpha value > 0.60 then the questionnaire was declared consistent/ reliable. Based on the results of spss calculations obtained the following results

 

 

 

Table 3 Reliability Test Table Before

Reliability Statistics

Cronbach's Alpha

N of Items

.656

13

Based on table 3 of the results of the questionnaire disseminated with calculations using SPSS obtained by Cronbach's Alpha 0.656, it can be done that the questionnaire is declared reliable / consistent because the value is more than 0.6 and is not worth continuing to the normality test.

 

Table 3 Reliability Test Table After

Reliability Statistics

Cronbach's Alpha

N of Items

.913

20

 

 

 

 

Based on table 3 questionnaire results disseminated with calculations using SPSS obtained cronbach's Alpha 0.913, it can be done that the questionnaire is declared reliable / consistent because the value is more than 0.6 and worthy of continuing to the normality test.

The normality test is used to determine whether the data population is normal or abnormally distributed, by comparing sig values. The normality test usesthe Shapiro-wilk method, because the amount of data in this study is 86 respondents, the method is acceptable in this study. Under the following conditions:

if the sig value > 0.05 then the data is declared normal distributed.

if the sig value < 0.05 then the data is declared normal distributed. The following are the results of the normality test using SPSS calculations:

Table 4 Normality Test Table

Tests of Normality

 

Kolmogorov-Smirnova

Shapiro-Wilk

Statistic

Df

Sig.

Statistic

Df

Sig.

Sebelum

.092

86

.070

.958

86

.007

Sesudah

.221

86

.000

.752

86

.000

a. Lilliefors Significance Correction

 

 

 

 

 

 

 

In table 4 it can be explained that the sig value in the shapiro-wilk column of the questionnaire before implementation with a value of 0.007 and the questionnaire after implementation with a value of 0.000. Based on the sig values of both questionnaires, it can be concluded that 0.007 < 0.05 and 0.000 < 0.05 which means that the data in this study can be said to be abnormally distributed, because the sig value is less than 0.05.

After the normality test, the data showed abnormal results therefore continued by doing the wilcoxcon test. The wilcoxcon test is part of the non-parametric statistical method. This wilcoxcon test is used to test data with abnormal distributions. Wilcoxcon is also used to find out whether or not there is an average difference between two samples that pair up with each other.

The parameters of the wilcoxcon test are:

1.                  If the value of Asymp.Sig. (2-tailed) < 0.05 then Ha accepted

a.       If the value of Asymp.Sig. (2-tailed) > 0.05 then Ha was rejected

 

Tabel 5 Tabel uji Wilcoxcon

Test Statisticsa

 

Sesudah - Sebelum

Z

-8.058b

Asymp. Sig. (2-tailed)

.000

a. Wilcoxon Signed Ranks Test

b. Based on positive ranks.

In table 5 it can be explained that the value of Asymp.Sig. (2-tailed before and after implementation with a value of 0.000. Based on asymp.sig. (2-tailed) Of the two parameters, it can be concluded 0.000 < 0.05 and it can be concluded that Ha was received and Ho was rejected.

Based on the hypothesis test on the Evaluation of Network Access Restrictions using Mac Address Filtering on Microtics to Improve Network Security there is an increase. This result is known from the calculation of the hypothesis, namely the value of Asymp.Sig. (2-tailed)0.000 < 0.05 thus Ha is accepted. Therefore, the evaluation of network access restrictions on microtics using Mac Address Filtering to improve network security has a positive impact with increased network security. Here are the average calculations using SPSS.

 

Report

 

Sebelum

Setelah

Mean

67,67

73,57

N

30

30

Std.

Deviation

6,418

7,628

Table 6 Mean Table

 

 

 

Furthermore, it can be known the amount of increase that occurs from the average results, among others, as follows: :

��� 𝑀𝑒𝑎𝑛 𝑆𝑒𝑠𝑢𝑑𝑎 𝑀𝑒𝑎𝑛 𝑆𝑒𝑏𝑒𝑙𝑢𝑚 𝑥 100 %

����������������� 𝑀𝑒𝑎𝑛 𝑆𝑒𝑏𝑒𝑙𝑢𝑚

 

����� 73,57 − 67,67 𝑥 100 % = 8,71%

67,6

Based on these calculations it can be known that the increase after the implementation of network access restrictions using Mac Address Filtering to increase network security increased by 8.71%.

 

CONCLUSION

Based on the writing of this thesis research, which has discussed evaluating network access restrictions using Mac Address Filtering on Mikrotik to improve network security, it can be concluded that implementing MAC Address Filtering hotspots on school network systems can improve network security, only users registered with mac addresses can use hotspot networks, so that network security is more guaranteed.Based on the results of the hypothesis showed that it can be concluded the value of Asymp.Sig. (2-tailed) < 0.05 then Ha is accepted and Ho is rejected. Then the evaluation results of network access restrictions using MAC Address Filtering to improve network security are accepted..

 

REFERENCES

Asteroid, Kurani Mega, & Hendrian, Yayan. (2016). Analisis Wireless Local Area Network (WLAN) dan Perancangan MAC Address Filtering Menggunakan Mikrotik (Studi Kasus Pada PT. Graha Prima Swara Jakarta). Jurnal Teknik Komputer, 2(2), 77�82.

Ghozali, Imam. (2018). Aplikasi analisis multivariate dengan program IBM SPSS 25.

Hariadi, Muhamad, Bagye, Wire, & Zaen, Mohammad Taufan Asri. (2019). Membangun Server Hotspot Berbasis Mikrotik Di Sman 1 Praya Tengah. Jurnal Informatika Dan Rekayasa Elektronik, 2(1), 70�77.

Novia, Cahyuni. (2018). 13-24 PERANCANGAN JARINGAN INTERNET DENGAN HOTSPOT MIKROTIK DAN MAC ADDRESS FILTERING. CYBER-TECHN, 12(02), 12-Halaman.

Nurdin, Noviar Armanda, & Ardiansyah, Septian. (2018). IMPLEMENTASI FILTERING MAC ADDRESS MENGGUNAKAN FITUR HOTSPOT DENGAN MIKROTIK PADA PT PERTAMINA DRILLING SERVICE INDONESIA JAKARTA. JITK (Jurnal Ilmu Pengetahuan Dan Teknologi Komputer), 4(1), 99�104.

Purnama-UBSI, Rachmat Adi. (2019). Optimalisasi Keamanan Jaringan Wireless Menggunakan Firewall Filtering MAC Address. IJNS-Indonesian Journal on Networking and Security, 8(4).

Riyanto, Slamet, & Hatmawan, Aglis Andhita. (2020). Metode Riset Penelitian Kuantitatif Penelitian Di Bidang Manajemen, Teknik, Pendidikan Dan Eksperimen. Deepublish.

Samsumar, Lalu Delsi, & Hadi, Sofian. (2018). Pengembangan Jaringan Komputer Nirkabel (Wifi) Menggunakan Mikrotik Router (Studi Kasus Pada Sma Pgri Aikmel). METHODIKA: Jurnal Teknik Informatika Dan Sistem Informasi, 4(1), 1�9.

Yuisar, Yuisar, & Yulianti, Liza. (2015). Analisa pemanfaatan proxy server sebagai media filtering dan caching pada jaringan komputer. Jurnal Media Infotama, 11(1).

 

https://jurnal.syntax-idea.co.id/public/site/images/idea/88x31.png

� 2022 by the authors. Submitted for possible open access publication under the terms and conditions of the Creative Commons Attribution (CC BY SA) license (https://creativecommons.org/licenses/by-sa/4.0/).