Network Security Analysis on The Internet Facility (Wifi) UIN Syarif Hidayatullah Jakarta Against Packet Sniffing Attacks

Authors

  • A. Nurul Anwar Universitas Pamulang

DOI:

https://doi.org/10.57152/malcom.v4i3.1307

Keywords:

Packet, Risk, Sniffing, Survey, Wifi

Abstract

In an increasingly digital era, network security has become very important to protect sensitive data from cyber attacks. One common attack is a packet sniffing attack, where hackers can capture and snoop on data packets sent over a WiFi network. This research aims to analyze the level of network security in internet facilities (WiFi) at UIN Syarif Hidayatullah Jakarta against packet sniffing attacks. The methods used include surveys, observations and technical analysis of existing network infrastructure. The research results show that although UIN Syarif Hidayatullah Jakarta has implemented several network security measures, there are still gaps that can be exploited by packet sniffing attacks. Factors such as the use of vulnerable network protocols and lack of use of data encryption are the main causes of network vulnerability to these attacks. Recommendations include the implementation of additional security measures such as the use of more secure protocols, implementation of strong data encryption, as well as user training and awareness to minimize the risk of packet sniffing attacks. In this way, it is hoped that internet facilities (WiFi) at UIN Syarif Hidayatullah Jakarta can be safer and protected from potentially detrimental cyber attacks.

References

I. G. Ary, S. Sanjaya, G. Made, A. Sasmita, D. Made, and S. Arsa, “Evaluasi Keamanan Website Lembaga X Melalui Penetration Testing Menggunakan Framework ISSAF,” vol. 8, no. 2, pp. 113–124, 2020.

S. Keamanan, “Jurnal KomtekInfo Perancangan Implementasi VPN Server Menggunakan Protokol L2TP,” vol. 8, no. 3, pp. 6–8, 2021, doi: 10.35134/komtekinfo.v8i3.128.

E. S. Negara and M. Ulfa, “Perbandingan Kinerja Topologi Canonical Dan Folded Clos Tree Pada Jaringan Data Center,” vol. 01, no. 01, pp. 25–38, 2020.

L. F. Nainggolan, N. F. Saragih, and F. G. N. Larosa, “Monitoring Keamanan Jaringan Pada Server Ubuntu Dari Serangan DDoS Menggunakan Snort IDS,” vol. 2, no. 2, pp. 1–10, 2022.

J. K. Informatika, “PEMANFAATAN WEB PROXY SEBAGAI PENGOPTIMAL KEAMANAN,” vol. VIII, no. 1, pp. 34–39, 2020.

P. Blocking and K. Pada, “Implementasi Keamanan Jaringan Menggunakan Metode,” vol. 19, no. 1, pp. 1–8, 2020, doi: 10.36054/jict-ikmi.v19i1.119.

A. Muftiadi, T. Putri, M. Agustina, and M. Evi, “Studi kasus keamanan jaringan komputer?: analisis ancaman phising terhadap layanan online banking,” vol. 1, no. 2, pp. 60–65, 2022.

T. Jaringan and K. Al Fikri, “InfoTekJar?: Jurnal Nasional Informatika dan Keamanan Jaringan Menggunakan Switch Port Security,” vol. 2, 2021.

J. Pendidikan, I. Unistek, and A. Bustami, “Ancaman , Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi?: Systematic Review,” 2020.

M. Informatika and P. L. P. I. Bandung, “KEAMANAN JARINGAN KOMPUTER PADA ERA BIG DATA,” vol. 02, pp. 14–20, 2020.

S. Ra, A. Pranata, R. Zulanggara, and N. Halimah, “Sniffing and Spoofing in Computer Security,” vol. 2, no. 6, pp. 869–874, 2023.

R. Tuli, “Packet Sniffing and Sniffing Detection,” vol. 16, no. 1, pp. 22–32, 2020.

A. Wirjawan, H. Iskandar, R. Hidayat, and I. Y. Wulandari, “Analisis firewall sebagai bandwidth limiter dan network security menggunakan pfsense,” vol. 16, no. 1, pp. 19–32, 2023.

B. P. Zen, A. Zafia, I. Nofi, and Y. Putro, “JURNAL RESTI Network Security Analysis Simulation at the GCS in the UCAV to support the Indonesian Defense Area,” vol. 5, no. 158, pp. 824–831, 2022.

A. H. Yosi Nofita Sari, Dedy Irfan, “Network Security Analysis Using Virtual Private Network in Vocational School,” vol. 9, no. 3, pp. 582–590, 2022.

Y. Hae and W. Sulistyo, “Analisis Keamanan Jaringan Pada Web Dari Serangan Sniffing Dengan Metode Eksperimen,” vol. 8, no. 4, pp. 2095–2105, 2021.

X. Liu, “Design of Wireless Communication Base Station Monitoring system Based on Artificial Intelligence and Network Security System,” Procedia Comput. Sci., vol. 228, pp. 1254–1261, 2023, doi: 10.1016/j.procs.2023.11.097.

A. Bimantara, “The Normative Enactment of International Cybersecurity Capacity Building Assistance?: A Comparative Analysis on Japanese and South Korean Practices,” vol. 24, no. 1, 2022, doi: 10.7454/global.v24i1.684.

L. Sui, Z. Yan, K. Li, C. Wang, Y. Shi, and Y. Du, “Prediction of ecological security network in Northeast China based on landscape ecological risk,” Ecol. Indic., vol. 160, no. January, p. 111783, 2024, doi: 10.1016/j.ecolind.2024.111783.

L. Xia and X. Xia, “^ Network Security Intrusion Detection Methods Combining Optimization Algorithms and Neural Networks,” Procedia Comput. Sci., vol. 228, pp. 582–592, 2023, doi: 10.1016/j.procs.2023.11.067.

Downloads

Published

2024-05-01