Main Article Content

Abstract

In this day and age, information technology has developed rapidly, one of which is wireless computer network technology called Wireless Local Area Network (WLAN). Agencies and individuals have widely used the use of wireless computer networks. Because with a wireless computer network, it is easy to connect the devices so that your work becomes quickly completed. Along with the development of wireless computer networks, problems will undoubtedly arise, one of which is about network security in wireless technology; therefore, to maintain network stability, it is necessary to conduct periodic evaluations. To analyze network security with the Penetration Testing method simulated attacks on the network, the operating system with the correct specifications is Kali Linux. Kali Linux is designed for network security testing, equipped with tools that support hacking activities, and as a tool to test network security. The results of this research can later be used to improve the security of wireless computer networks at Pradita University. This study concludes that during the design of WLAN Network Security Analysis using attacks (Cracking The Encryption, Denial of Service, and MITM) using Kali Linux at Pradita University, it can be concluded that the security owned by the Pradita University WLAN network still has many loopholes to exploit.

Keywords

Wireless Network, Network Security, Wireless LAN

Article Details

How to Cite
Bagaskara, B. ., & Santoso , H. . (2023). Wireless Computer Network (WLAN) Security Test at Pradita University. TEPIAN, 4(4), 152–159. https://doi.org/10.51967/tepian.v4i4.2910

References

  1. Agustio, D. P., and Nainggolan, E. R. (2023). Penerapan Virtual Local Area Network Pada Jaringan MAN dengan Metode Filtering Berbasis Access Control List di Dinas Komunikasi dan Informatika Kota Serang. Jurnal Komputer Antartika, 1(1), 32–38.
  2. Boodai, J., Alqahtani, A., and Frikha, M. (2023). Review of Physical Layer Security in 5G Wireless Networks. Applied Sciences, 13(12), 72–77.
  3. Catalano, C., Pagano, A., Piccinno, A., and Stamerra, A. (2023). Cartoons to Improve Cyber Security Education: Snow White in Browser in the Middle.
  4. Demertzi, V., Demertzis, S., and Demertzis, K. (2023). An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities. Applied Sciences, 13(2), 790.
  5. Haq, I. U., Ramzan, S., Ahmad, N., Ahmad, Y., and Nadeem, A. (2023). Towards Robust and Low Latency Security Framework for IEEE 802.11 Wireless Networks. International Journal of Computing and Digital Systems, 14(1).
  6. Lutfiani, N., Wijono, S., Rahardja, U., Iriani, A., Aini, Q., and Septian, R. A. D. (2023). A bibliometric study: Recommendation based on artificial intelligence for ilearning education. Aptisi Transactions on Technopreneurship (ATT), 5(2), 109–117.
  7. Masyhur, Z and Hartono, N. (2023). Security and Data Integrity Analysis in E-Voting Systems. Jurnal INSYPRO (Information System and Processing), 8(1).
  8. Murumba, J. M. and Muhambe Titus, M. (2023). A Review of Smartphone as an Office: Security Risks and Mitigation Measures. setjournal.com.
  9. Ojha, N. K., and Baray, E. (2023). An Overview of Protocols-Based Security Threats and Countermeasures in WLAN. In 2023 4th International Conference for Emerging Technology (INCET) (pp. 1–6).
  10. Samsumar, L. D., and Gunawan, K. (2017). Analisis dan Evaluasi Tingkat Keamanan Jaringan Komputer Nirkabel (Wireless LAN); Studi Kasus di Kampus STMIK Mataram. Jurnal Ilmiah Teknologi Infomasi Terapan, 4(1).
  11. Samsumar, L. D., Gunawan, K. (2017). Analisis Dan Evaluasi Tingkat Keamanan Jaringan Komputer Nirkabel (Wireless Lan); Studi. Ilmiah Teknologi Informasi Terapan, IV(1), 73–82.
  12. Saskara, G. A. J., Indrawan, I. P. O. and Putra, P. M. (2019). Keamanan Jaringan Komputer Nirkabel Dengan Captive Portal Dan Wpa/Wpa2 Di Politeknik Ganesha Guru. Jurnal Pendidikan Teknologi Dan Kejuruan, 16(2), 236–247.
  13. Setiadi, I. H. and Afrianto, Y. (2019). Analisis Infrastruktur Jaringan Wireless Local Area Network (WLAN) PT PLN (Persero) ULP Leuwiliang. Jurnal Inovatif: Inovasi Teknologi Informasi Dan Informatika, 2(2), 174–182.
  14. Staddon, E., Loscri, V and Mitton, N. (2023). A consensus-based approach to reputational routing in multi-hop networks. ITU Journal on Future and Evolving Technologies.
  15. Syaputera, A., Riska and Mardiana, Y. (2023). Hotspot Network Security System From Brute Force Attack Using Pfsense External Firewall (Case Study of Wifi-Ku. Net Hotspot). Jurnal Komputer, Informasi Dan Teknologi (JKOMITEK), 3(1), 205–218.
  16. Trungadi, P. (2023). Exploiting virtual networks for CPS security analysis--The Smart Home Environment.
  17. Turban, E., King, D., Lee, J. K., Liang, T. Turban, D. C., Turban, E., King, D., Lee, J. K. Liang, T., and Turban, D. C. (2015). Overview of electronic commerce. In Electronic Commerce: A Managerial and Social Networks Perspective (pp. 3–49). Springer.
  18. Widerberg, P. A., and Mattsson, W. (2023). Testing IoT Security: A comparison of existing penetration testing frameworks and proposing a generic framework.
  19. Xing, Y. (2023). Cyber security digital twin simulations for wireless networks. University of British Columbia.
  20. Zen, B. P., and Saputra, S. G. (2023). Analisis Keamanan Jaringan Wireless menggunakan Metode Penetration Testing Execution Standard (PTES). Jurnal Sistem Informasi Galuh, 1(2).