PENERAPAN EVIL TWIN DETEKTOR DALAM PENDETEKSIAN PENGGANGGU JARINGAN NIRKABEL PADA USER

Peniarsih Peniarsih

Sari


Nowadays, wireless networking facilities are provided in public places such as fast food restaurant, airports, hotels, campuses and are an attraction for users to use them. The wireless network provided uses an open authentication system and web-based authentication as the second layer used by customers to identify themselves according to the service they have before they can connect to the internet or WiFi Hotspot is a frequently used name. However, unnoticed by the user, it can be utilized by parties who are not entitled to attack and disturb. One of the attacks on wireless networks is the evil twin attack, given the ease in creating it by only duplicating the existing wireless network configuration and forcing users to move to the evil twin network because the installation tends to be closer to the victim's location. Administrator-based detection is one solution that is implemented but has a dependency on the availability of network administrators and supporting devices. To assist users in detecting disturbances, this research proposed client-based evil twin detection that utilizes Medium Access Control (MAC) address data and automatic configuration information provided by a Dynamic Host Configuration Protocol (DHCP) server on a wireless network. Shell programming on the Linux operating system is used to implement the solution.

Keywords: Evil Twin Attack, Hotspot WiFi, WiFi Security


Teks Lengkap:

PDF

Referensi


APJII. (2016). Konklusi survey ekosistem dna (device, network & apps). Diambil dari https://www.apjii.or.id/survei2017 Asosiasi Penyelenggara Jasa Internet Indonesia. (2016). Infografis Penetrasi & Perilaku Pengguna Internet Indonesia Survey 2016. Diambil dari www.APJII.or.id Beyah, R., & Venkataraman, A. (2011). Rogue-access-point detection: Challenges, solutions, and future directions. IEEE Security and Privacy, 9(5), 56–61. https://doi.org/10.1109/MSP.2011.75 Chabinsky, S. (2014). Wireless is Not Worry-Less. BNP Media, 51(10), 28. Diambil dari https://eresources.perpusnas.go.id:2171/docvie w/1611001295?accountid=25704 Gast, M. (2005). 802.11 Wireless Networks: The Definitive Guide. (M. Loukides, Ed.) (2nd ed.). O’Reilly. Diambil dari

http://books.google.com/books?id=9r HnRzzMHLIC&pgis=1 Hamid, R. A. (2003). Wireless LAN : Security Issues and Solutions. Diambil dari https://www.sans.org/readingroom/whitepapers/wireless/wirelesslan-security-issues-solutions-1009 Hsu, F.-H., Wang, C.-S., Hsu, Y.-L., Cheng, Y.-P., & Hsneh, Y.-H. (2015). A client-side detection mechanism for evil twins. Computers & Electrical Engineering, 000, 1–10. https://doi.org/10.1016/j.compeleceng. 2015.10.010 Mustafa, H., & Xu, W. (2014). CETAD: Detecting evil twin access point attacks in wireless hotspots. In 2014 IEEE Conference on Communications and Network Security, CNS 2014. https://doi.org/10.1109/CNS.2014.699 7491 Nakhila, O., Amjad, M. F., Dondyk, E., & Zou, C. (2018). Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients. Computers and Security, 74, 41–54. https://doi.org/10.1016/j.cose.2017.12. 009 Nakhila, O., & Zou, C. (2016). User-side Wi-Fi evil twin attack detection using random wireless channel monitoring. Proceedings - IEEE Military Communications Conference MILCOM, 1243–1248. https://doi.org/10.1109/MILCOM.201 6.7795501 Nikbakhsh, S., Manaf, A. B. A., Zamani, M., & Janbeglou, M. (2012). A novel approach for rogue access point detection on the client-side. In Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012 (hal. 684– 687). IEEE. https://doi.org/10.1109/WAINA.2012.108 Panch, A., & Singh, S. K. (2010). A novel approach for evil twin or rogue AP mitigation in wireless environment. International Journal of Security and its Applications, 4(4), 33–38. Song, Y., Yang, C., & Gu, G. (2010). Who is peeping at your passwords at starbucks? - To catch an evil twin access point. In Proceedings of the International Conference on Dependable Systems and Networks

(hal. 323–332). IEEE. https://doi.org/10.1109/DSN.2010.554 4302 Tang, Z., Zhao, Y., Yang, L., Qi, S., Fang, D., Chen, X., … Wang, Z. (2017). Exploiting Wireless Received Signal Strength Indicators to Detect EvilTwin Attacks in Smart Homes. Mobile Information Systems, 2017. https://doi.org/10.1155/2017/1248578




DOI: https://doi.org/10.35968/jsi.v4i2.250

Refbacks

  • Saat ini tidak ada refbacks.


Indexed by: