Vulnerability Analysis of Wireless LAN Networks using ISSAF WLAN Security Assessment Methodology: A Case Study of Restaurant in East Jakarta

被引:0
作者
Pratama, Jose Armando [1 ]
Almaarif, Ahmad [1 ]
Budiono, Avon [1 ]
机构
[1] Telkom Univ, Sch Ind Engn, Bandung, Indonesia
来源
2021 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2021) | 2021年
关键词
WLAN; penetration testing; security; vulnerability assessment; evil twin attack;
D O I
10.1109/IC2IE53219.2021.9649360
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays the use of Wi-Fi has been widely used in public places, such as in restaurants. The use of Wi-Fi in public places has a very large security vulnerability because it is used by a wide variety of visitors. Therefore, this study was conducted to evaluate the security of the WLAN network in restaurants. The methods used are Vulnerability Assessment and Penetration Testing. Penetration Testing is done by conducting several attack tests such as Deauthentication Attack, Evil Twin Attack with Captive Portal, Evil Twin Attack with Sniffing and SSL stripping, and Unauthorized Access.
引用
收藏
页码:435 / 440
页数:6
相关论文
共 14 条
[1]  
Almaarif A., 2020, INT J ADV SCI ENG IN, V10, P1874
[2]  
Amewuda A. B., 2018, J COMPUT NETWORKS CO
[3]  
Chughtai, 2017, INT J SCI TECHNOLOGY, V6, P275
[4]  
Jordan R, 2002, IEEE ANTENN PROPAG M, V44, P185, DOI [10.1109/74.997963, 10.1109/74.997962]
[5]   A Literature Review of Security Threats to Wireless Networks [J].
Kumar, Umesh ;
Gambhir, Sapna .
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (04) :25-34
[6]  
Li Wang, 2011, Journal of Networks, V6, P470, DOI 10.4304/jnw.6.3.470-481
[7]  
Noman S. A., 2017, INT J COMPUTER SCI I, V14, P60
[8]  
Priandoyo A., 2006, JURNAL TEKNIK INFORM, V1, P73
[9]  
Rathore B., 2006, Information Systems Security Assessment Framework (ISSAF) Draft 0.2.1
[10]  
Rinaldi R., 2019, THESIS U MERCU BUANA