Security Design And Testing of Lan and Wlan Network in Mikrotik Router Using Penetration Testing Method FROM Mitm Attack


Haeruddin .(1*),


(1) Universitas Internasional Batam
(*) Corresponding Author

Abstract


The growth of device user is always increasing and the costs are not expensive. Users already have several sophisticated end user networking tools for daily use, including laptops, smartphones and tablets. For internet access users use LAN and WLAN network services in several public areas such as restaurants, schools / campuses, hotels and offices. Activities done by the users are data and banking transactions. These activities relate to crucial data such as user data including usernames, passwords, accounts, emails and other sensitive data. Mikrotik Router is a router with an affordable price and complete features for both LAN and WLAN networks so that many administrators use this device. The most common attack used on the network is Man in the Middle Attack, which is actively tapping on the user's network connection, where traffic from the user before reaching the destination or when going through a Mikrotik router will be diverted through the attacker's network without the user's knowledge so that user communication can be read. Therefore a network security system on a Mikrotik router is needed to avoid such attacks. In testing the security system that has been made, it needs the right method, one of which is penetration testing. From the results of testing using the penetration testing method, results and solutions will be obtained to maintain network security.
Keywords: Penetration Testing, Man in The Middle Attack, Wireless Security, Router dan Wireless Mikrotik.


Keywords


Penetration Testing; Man In The Middle Attack; Keamanan Wireless; Router dan Wireless Mikrotik

Full Text:

PDF

References


Ari, I. M., Suta, D., Gede, I. N., Astawa, A., & Sukarata, P. G. (2019). Pengembangan Jaringan Internet Wireless Dengan Wifi Overview Pada Obyek Wisata Blangsinga Waterfall. 11(1), 28–32.

Baihaqi, Yanti, Y., & Zulfan. (2018). Implementasi Sistem Keamanan WPA2-PSK pada Jaringan WiFi. Jurnal Serambi Engineering, 3(1), 248–254. https://doi.org/10.32672/jse.v3i1.353

Celiktas, B., Serkan Tok, M., & Unlu, N. (2018). Man in the Middle (MITM) Attack Detection Tool Design. International Journal of Engineering Sciences & Research Technology, 7(8), 90–99. https://doi.org/10.5281/zenodo.1336698

Herdiana, Y. (2014). Keamanan Pada Jaringan Wireless. Isu Teknologi STT Mandala, 7(2), 25–36.

Ikhwan, S., & Elfitri, I. (2014). Analisa Delay Yang Terjadi Pada Penerapan Demilitarized Zone (DMZ) Terhadap Server Universitas Andalas. Jurnal Nasional Teknik Elektro, 3(2), 118. https://doi.org/10.25077/jnte.v3n2.75.2014

Pathak, M., & Raza, Ni. (2014). Comprehensive Analysis of Man in the Middle Attack and Propose Statistical Detection Approach. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), 3(5), 269–272. http://ijarcsee.org/index.php/IJARCSEE/article/view/480

Rachel, S., & Subhashkar, S. (2017). An Overview of the Man-In-The-Middle Attack. 1–6. http://www.ijetjournal.org

Zulfikar, M. I., Rizal, M. F., & Rosmiati, M. (2017). Implementasi Badusb Mitm Attacks. 3(3), 1909–1916.




DOI: https://doi.org/10.31289/jite.v4i1.3832

Article Metrics

Abstract view : 0 times
PDF - 0 times

Refbacks



Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.