Analisis Keamanan Jaringan Pada Jaringan Wireless Dari Serangan Man In The Middle Attack DNS Spoofing

  • Teguh Pangestu Universitas Harapan Medan
  • Risko Liza Universitas Harapan Medan
Keywords: Kali linux, ubuntu, man in the middle attack DNS spoofing, wireshark, firewall

Abstract

Currently the use of wireless technology (wireless) is widely used in institutions, companies, schools and so on. Wireless is very useful because it can facilitate human interaction activities in sending data and so on. However, the existence of wireless is not completely safe in carrying out human interaction activities in sending data and so on, one of which is the illegal man in the middle attack DNS spoofing activity. With these illegal activities, a security system is needed which is expected to prevent illegal man in the middle attack DNS spoofing activities. The results of the attack are obtained based on 7 tests by calculating the quality of service (QOS), namely packet loss with the results of attack 1 model 1 with packet loss 0.154%, attack 2 model 1 with packet loss 0.234%, attack 3 model 1 with packet loss 0.291%, attack 1 model 2 with packet loss 0.173%, attack 2 model 2 with packet loss 0.128%, attack 3 model 2 with packet loss 0.028%, attack 4 model 2 with packet loss 0.231%, which means this attack can run well. And the results by utilizing a firewall security system can only prevent it by cutting off communication interactions between the attacker and the victim and the victim and the attacker.

Downloads

Download data is not yet available.

Author Biography

Risko Liza, Universitas Harapan Medan

Fakultas Teknik dan Komputer, Program Studi Teknik Informatika

References

[1] N. Andiyani et al., “IMPLEMENTASI MAN IN THE MIDDLE ATTACK PADA ALGORITME BLAKE2S BERBASIS LoRa,” vol. 6, no. 2, pp. 1–6, 2022.
[2] randi candra kirana Yudi mulyanto, Herfandi, “ANALISIS KEAMANAN WIRELESS LOCAL AREA NETWORK (WLAN) TERHADAP SERANGAN BRUTE FORCE DENGAN METODE PENETRATION TESTING,” vol. 4, no. 1, pp. 26–35, 2022.
[3] D. Qadri, T. Y. Arif, and A. Azmi, “Analisis Tingkat Kinerja Jaringan Wireless Ieee 802.11N Menggunakan Mikrotik,” J. Komputer, Inf. Teknol. dan Elektro, vol. 6, no. 2, pp. 21–26, 2021, doi: 10.24815/kitektro.v6i2.21848.
[4] G. H. A. Kusuma, “… Skema Sistem Keamanan Jaringan Web Server menggunakan Web Application Firewall dan Fortigate untuk Mencegah Kebocoran Data di Masa Pandemi Covid-19,” J. Informatics Adv. …, vol. 2, no. 2, pp. 1–4, 2021, [Online]. Available: http://journal.univpancasila.ac.id/index.php/jiac/article/view/3259
[5] M. A. Adiguna and B. W. Widagdo, “Analisis Keamanan Jaringan WPA2-PSK Menggunakan Metode Penetration Testing (Studi Kasus : Router Tp-Link Mercusys Mw302r),” J. SISKOM-KB (Sistem Komput. dan Kecerdasan Buatan), vol. 5, no. 2, pp. 1–8, 2022, doi: 10.47970/siskom-kb.v5i2.268.
[6] Z. M. Subekti, H. Setiawan, Satria, W. M. Wijaya, A. Hafiz, and Warsudi, “PERANCANGAN INFRASTRUKTUR DOMAIN NAME SERVER LOKAL MENGGUNAKAN UBUNTU SERVER 16.04 PADA PT. XYZ,” no. 2, p. 6, 2020.
[7] A. Rizal Fauzi and I. Made Suartana, “Monitoring Jaringan Wireless Terhadap Serangan Packet Sniffing Dengan Menggunakan Ids,” J. Manaj. Inform., vol. 8, no. 2, p. 7, 2018.
[8] T. M. Diansyah, “Analisa Pencegahan Aktivitas Ilegal Didalam Jaringan Menggunakan Wireshark,” J. TIMES, vol. IV, no. 2, pp. 20–23, 2015, [Online]. Available: http://ejournal.stmik-time.ac.id/index.php/jurnalTIMES/article/view/229
Published
2022-09-30