ANALISIS KEAMANAN JARINGAN WIFI MAHASISWA UBD DARI SERANGAN PACKET SNIFFING

Authors

  • TAMSIR ARIYADI Universitas Bina Darma
  • Irwansyah Irwansyah Universitas Bina Darma
  • M. Syaiful Huda Mubarok Universitas Bina Darma

DOI:

https://doi.org/10.33884/jif.v12i01.8739

Keywords:

Keamanan Jaringan Wifi, Packet Sniffing, Ettercap, Wireshark

Abstract

The wifi network of Bina Darma University is open to potential attacks by hackers, as they are unavoidably carried out. Network security is the act of recognizing and blocking unwanted users, or intruders, from computer networks. It serves as a safeguard for a network system against unauthorized and careless network users. In this study, the "Experiment Method" is employed. One approach that seeks to both test and explain an event is the experiment technique. Using the tools ettercap and wireshark, tests on network security were run and the findings analyzed for this study. The study's findings show that the network security encryption utilized at Bina and the security mechanism on the ubd student wifi network are both in good working order.

References

M. Hasbi, A. Reza Aristiadi Nurwa, D. Febriyan Priambodo, W. Riski Aulia Putra, S. Sinar Nusantara, and P. Siber dan Sandi Negara, “Infrastructure as Code for Security Automation and Network Infrastructure Monitoring,” Tek. Inform. dan Rekayasa Komput., vol. 22, no. 1, pp. 203–217, 2022, doi: 10.30812/matrik.v22i1.2471.

A. Zappone, M. Di Renzo, and M. Debbah, “Wireless Networks Design in the Era of Deep Learning: Model-Based, AI-Based, or Both?,” IEEE Trans. Commun., vol. 67, no. 10, pp. 7331–7376, 2019, doi: 10.1109/TCOMM.2019.2924010.

T. Ariyadi and A. T. Maulana, “Penerapan Web Proxy Dan Management Bandwidth Menggunakan Mikrotik Routerboard Pada Kantor Pos Palembang 30000,” J. Ilm. Inform., vol. 9, no. 02, pp. 116–122, 2021, doi: 10.33884/jif.v9i02.4444.

T. Ariyadi and M. A. Prabowo, “Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security,” INOVTEK Polbeng - Seri Inform., vol. 6, no. 1, p. 80, 2021, doi: 10.35314/isi.v6i1.1698.

T. Ariyadi et al., “Implementasi Desain Jaringan Hotspot Berbasis Mikrotik Dengan Metode NDLC ( Network Development Life Cycle ) Pada PT Kirana Permata,” no. 3, 2023.

N. Fahmi, E. Prayitno, and S. Fitriani, “Web of Thing Application for Monitoring Precision Agriculture Using Wireless Sensor Network,” J. INFOTEL (Informatika - Telekomun. - Elektron., vol. 11, no. 1, pp. 22–28, 2019.

T. Ariyadi, “Mitigasi Distributed Denial of Service ( DDoS ) Attack Pada Arsitektur Software Defined Network ( SDN ),” Techno.Com, vol. 21, no. 4, pp. 878–886, 2022, doi: 10.33633/tc.v21i4.6879.

T. Ariyadi, “ANALISIS PAKET ICMP WEBSITE UNIVERSITAS BINADARMA,” vol. 2, no. 2, pp. 55–60, 2023.

M. Bogdanoski, A. Risteski, and T. Shuminovski, “TCP SYN Flooding Attack in Wireless Networks,” Innov. Commun. Theory, no. May 2014, pp. 2010–2013, 2012, doi: 10.13140/2.1.3487.3282.

P. A. Dharmesta, “Efektivitas Sniffer Menggunakan Natural Language dalam Pembelajaran,” vol. 1, no. 10, pp. 392–403, 2021.

I. P. Agus, E. Pratama, P. A. Dharmesta, and T. Informasi, “IMPLEMENTASI WIRESHARK DALAM MELAKUKAN PEMANTAUAN PROTOCOL JARINGAN ( Studi Kasus : Intranet Jurusan Teknologi Informasi Universitas Udayana ),” vol. 3, no. 1, pp. 94–99, 2019.

W. N. A. Dwi Bayu Rendro; Ngatono, “ANALISIS MONITORING SISTEM KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN SOFTWARE NMAP,” PROSISKO, vol. 7, no. 2, 2020.

F. Arif, A. Tama, M. Kom, F. Panjaitan, and M. Kom, “Analisis Keamanan Jaringan Pada FasilitasInternet ( wifi ) Terhadap Serangan PacketSniffing”.

Downloads

Published

2024-03-12

How to Cite

ARIYADI, T., Irwansyah, I., & Huda Mubarok, M. S. (2024). ANALISIS KEAMANAN JARINGAN WIFI MAHASISWA UBD DARI SERANGAN PACKET SNIFFING. JURNAL ILMIAH INFORMATIKA, 12(01), 53–58. https://doi.org/10.33884/jif.v12i01.8739