Manajemen Pencegahan Serangan Jaringan Wireless Dari Serangan Man In The Middle Attack

Tengku Mohd Diansyah(1*), Ilham Faisal(2), Dodi Siregar(3),

(1) Universitas Harapan Medan, Indonesia
(2) Universitas Harapan Medan, Indonesia
(3) Universitas Harapan Medan, Indonesia
(*) Corresponding Author

Abstract


Currently, wireless networks are very widely used to communicate because wireless networks are very fast and communicate without using cables, by using this wireless it turns out that there are weaknesses or security gaps due to irresponsible people illegally such as looking for backdoor gaps to infiltrate and attack aspects of authenticity. If a crime occurs, how to prevent the crime or attack. In this article, the possibility of an attack with the type of attack carried out is a man in the middle attack from this attack experiment will be carried out 5 times the attack experiment in this experiment the calculation of QoS (Quality of Service) is carried out, namely calculating how much packet loss and the results obtained in this attack experiment with the calculation of packet loss as much as 0.291% loss, attack 1 model 2 with packet loss 0.173%, attack 2 model 2 with packet loss which means this attack successfully attacks wireless communication. To prevent this attack activity, first know the technique of how the attack runs on a wireless network, using ettercap on linux times.


Full Text:

PDF

References


T. Pangestu and R. Liza, “Analisis Keamanan Jaringan pada Jaringan Wireless dari Serangan Man In The Middle Attack DNS Spoofing,” Jitekh, vol. 10, no. 2, pp. 60–67, 2022.

M. F. Ardiansyah, T. M. Diansyah, and R. Liza, “Penggunaan Set top box Bekas untuk Dimanfaatkan sebagai Cloud Server,” 2022.

T. M. Diansyah, I. Faisal, A. Perdana, B. O. Sembiring, and T. H. Sinaga, “Analysis of Using Firewall and Single Honeypot in Training Attack on Wireless Network,” J. Phys. Conf. Ser., vol. 930, no. 1, 2017, doi: 10.1088/1742-6596/930/1/012038.

“Analisa Pencegahan Aktivitas Ilegal Didalam Jaringan Menggunakan Wireshark,” Jun. 2015, [Online]. Available: http://ejournal.stmik-time.ac.id/index.php/jurnalTIMES/article/view/229

S. Syaifuddin, D. Regata Akbi, and A. Gholib Tammami, “Analisis Address Resolution Protocol Poisoning Attack Pada Router Wlan Menggunakan Metode Live Forensics,” J. Komput. Terap., vol. 7, no. Vol. 7 No. 1 (2021), pp. 62–73, 2021, doi: 10.35143/jkt.v7i1.4575.

A. Rizal Fauzi and I. Made Suartana, “Monitoring Jaringan Wireless Terhadap Serangan Packet Sniffing Dengan Menggunakan Ids,” J. Manaj. Inform., vol. 8, no. 2, p. 7, 2018.

W. Zaenal Mutaqin Subekti, Hendra Setiawan, Satria, Widia Murni Wijaya,Aliy Hafiz, “Perancangan Infrastruktur Domain Name Server Lokal Menggunakan Ubuntu Server 16.04 Pada PT. Xyz,” no. 2, p. 6, 2021.




DOI: https://doi.org/10.30645/kesatria.v4i1.134

DOI (PDF): https://doi.org/10.30645/kesatria.v4i1.134.g133

Refbacks

  • There are currently no refbacks.


Published Papers Indexed/Abstracted By: