ANALISIS KEAMANAN JARINGAN WIFI MAHASISWA UBD DARI SERANGAN PACKET SNIFFING
DOI:
https://doi.org/10.33884/jif.v12i01.8739Keywords:
Keamanan Jaringan Wifi, Packet Sniffing, Ettercap, WiresharkAbstract
The wifi network of Bina Darma University is open to potential attacks by hackers, as they are unavoidably carried out. Network security is the act of recognizing and blocking unwanted users, or intruders, from computer networks. It serves as a safeguard for a network system against unauthorized and careless network users. In this study, the "Experiment Method" is employed. One approach that seeks to both test and explain an event is the experiment technique. Using the tools ettercap and wireshark, tests on network security were run and the findings analyzed for this study. The study's findings show that the network security encryption utilized at Bina and the security mechanism on the ubd student wifi network are both in good working order.
References
M. Hasbi, A. Reza Aristiadi Nurwa, D. Febriyan Priambodo, W. Riski Aulia Putra, S. Sinar Nusantara, and P. Siber dan Sandi Negara, “Infrastructure as Code for Security Automation and Network Infrastructure Monitoring,” Tek. Inform. dan Rekayasa Komput., vol. 22, no. 1, pp. 203–217, 2022, doi: 10.30812/matrik.v22i1.2471.
A. Zappone, M. Di Renzo, and M. Debbah, “Wireless Networks Design in the Era of Deep Learning: Model-Based, AI-Based, or Both?,” IEEE Trans. Commun., vol. 67, no. 10, pp. 7331–7376, 2019, doi: 10.1109/TCOMM.2019.2924010.
T. Ariyadi and A. T. Maulana, “Penerapan Web Proxy Dan Management Bandwidth Menggunakan Mikrotik Routerboard Pada Kantor Pos Palembang 30000,” J. Ilm. Inform., vol. 9, no. 02, pp. 116–122, 2021, doi: 10.33884/jif.v9i02.4444.
T. Ariyadi and M. A. Prabowo, “Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security,” INOVTEK Polbeng - Seri Inform., vol. 6, no. 1, p. 80, 2021, doi: 10.35314/isi.v6i1.1698.
T. Ariyadi et al., “Implementasi Desain Jaringan Hotspot Berbasis Mikrotik Dengan Metode NDLC ( Network Development Life Cycle ) Pada PT Kirana Permata,” no. 3, 2023.
N. Fahmi, E. Prayitno, and S. Fitriani, “Web of Thing Application for Monitoring Precision Agriculture Using Wireless Sensor Network,” J. INFOTEL (Informatika - Telekomun. - Elektron., vol. 11, no. 1, pp. 22–28, 2019.
T. Ariyadi, “Mitigasi Distributed Denial of Service ( DDoS ) Attack Pada Arsitektur Software Defined Network ( SDN ),” Techno.Com, vol. 21, no. 4, pp. 878–886, 2022, doi: 10.33633/tc.v21i4.6879.
T. Ariyadi, “ANALISIS PAKET ICMP WEBSITE UNIVERSITAS BINADARMA,” vol. 2, no. 2, pp. 55–60, 2023.
M. Bogdanoski, A. Risteski, and T. Shuminovski, “TCP SYN Flooding Attack in Wireless Networks,” Innov. Commun. Theory, no. May 2014, pp. 2010–2013, 2012, doi: 10.13140/2.1.3487.3282.
P. A. Dharmesta, “Efektivitas Sniffer Menggunakan Natural Language dalam Pembelajaran,” vol. 1, no. 10, pp. 392–403, 2021.
I. P. Agus, E. Pratama, P. A. Dharmesta, and T. Informasi, “IMPLEMENTASI WIRESHARK DALAM MELAKUKAN PEMANTAUAN PROTOCOL JARINGAN ( Studi Kasus : Intranet Jurusan Teknologi Informasi Universitas Udayana ),” vol. 3, no. 1, pp. 94–99, 2019.
W. N. A. Dwi Bayu Rendro; Ngatono, “ANALISIS MONITORING SISTEM KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN SOFTWARE NMAP,” PROSISKO, vol. 7, no. 2, 2020.
F. Arif, A. Tama, M. Kom, F. Panjaitan, and M. Kom, “Analisis Keamanan Jaringan Pada FasilitasInternet ( wifi ) Terhadap Serangan PacketSniffing”.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 JURNAL ILMIAH INFORMATIKA
This work is licensed under a Creative Commons Attribution 4.0 International License.