OPTIMALISASI KEAMANAN WIRELESS MENGGUNAKAN FILTERING MAC ADDRESS

Lihat/Buka

Tanggal

2021-01-11

Penerbit

Jurnal Teknologi Informasi : Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika

Abstraksi

The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login

Kata Kunci: Filtering MAC Address, Hotspot Login, Wireless Security

URI
https://e-journal.upr.ac.id/index.php/JTI/article/view/1910

Bidang ilmu
Jaringan Komputer

References

[1] F. Wamser, R. Pries, D. Staehle, K. Heck, And P. Tran-Gia, “Traffic Characterization Of A Residential Wireless Internet Access,” Telecommun Syst, Vol. 48, No. 1, Pp. 5–17, 2011. [2] D. Yuniarto, “Keamanan Jaringan Wireless Lan Menggunakan Mac Address Di Smk Informatika Sumedang,” J. Infoman’s, Vol. 3, No. 1, Pp. 47–52, 2019. [3] E. A. Darmadi, “Perancangan Sistem Otentikasi Radius Pada Pengguna Jaringan Wireless Untuk Meningkatkan Keamanan Jaringan Komputer,” Ikra-Ith Inform., Vol. 2, No. 3, Pp. 9–16, 2018. [4] N. Ag And G. Shankar, “A Survey On Wireless Security Standards And Future Scope,” Int. J. Latest Res. Eng. Technol., Vol. 02, No. 08, Pp. 94–99, 2016. [5] A. Tedyyana, “Rancang Bangun Jaringan Wirelless Di Politeknik Negeri Bengkalis Menggunakan Mac Filtering,” In Seminar Nasional Inovasi Dan Aplikasi Teknologi Di Industri (Seniati), 2016, Pp. 31–36. [6] I. Wiratama, P. Sugiartawan, F. I. Komputer, And T. Informatika, “Peningkatan Keamanan Wireless Pada Jaringan Komputer Di Universitas Amikom Menggunakan Protokol Ieee802.1x,” J. Sist. Inf. Dan Komput. Terap. Indones., Vol. 2, No. 1, Pp. 21–30, 2019. [7] M. I. Rusdi And D. Prasti, “Penetration Testing Pada Jaringan Wifi Menggunakan Kali Linux,” In Seminar Nasionalteknologi Informasi Dan Komputer, 2019, Pp. 260–269. [8] Jamaludin, “Teknik Keamanan Jaringan Wireless Lan Pada Warnet Salsabila Computer Net,” Jamaludin, Vol. 1, No. 1, Pp. 67–74, 2016. [9] M. Waliullah, A. B. M. Moniruzzaman, And M. S. Rahman, “An Experimental Study Analysis Of Security Attacks At Ieee 802.11 Wireless Local Area Network,” Int. J. Futur. Gener. Commun. Netw., Vol. 8, No. 1, Pp. 9–18, 2015. [10] H. D. Sabdho And M. Ulfa, “Analisis Keamanan Jaringan Wireless Menggunakan Metode Penetration Testing Pada Kantor Pt . Mora Telematika Indonesia Regional Palembang,” In Seminar Hasil Penelitian Vokasi (Semhavok) Universitas Bina Palembang, 2018, Pp. 15–24. [11] F. Zuli And A. Priambodo, “Analisis Keamanan Jaringan Nirkabel Publik Dengan Radius (Studi Kasus Univeristas Satya Negara Indonesia – Fakultas Teknik,” J. Ilm. Fak. Tek. Limit’s, Vol. 13, No. 1, Pp. 8– 18, 2017. [12] R. D. Sari, Supiyandi, A. P. U. Siahaan, And M. Muttaqin, “A Review Of Ip And Mac Address Filtering In Wireless Network Security,” Ijsrst, Vol. 3, No. 6, Pp. 470–473, 2017. [13] D. M. Sari, M. Yamin, And L. M. B. Aksara, “Analisis Sistem Keamanan Jaringan Wireless (Wep, Wpapsk/Wpa2psk) Mac Address, Menggunakan Metode Penetration Testing,” Semantik, Vol. 3, No. 2, Pp. 203–208, 2017. [14] A. Supriyanto, “Analisis Kelemahan Keamanan Pada Jaringan Wireless,” J. Teknol. Inf. Din. Vol., Vol. Xi, No. 1, Pp. 38–46, 2006. [15] R. A. Purnama, “Optimalisasi Keamanan Jaringan Wireless Menggunakan Firewall Filtering Mac Address,” Ijns.Org Indones. J. Netw. Secur., Vol. 8, No. 4, Pp. 43–47, 2019. [16] Syaiful And C. Novia, “Perancangan Jaringan Internet Dengan Hotspot Mikrotik Dan Mac Address Filtering,” Cyber-Techn, Vol. 12, No. 02, Pp. 13–24, 2018.