ANALISIS KEAMANAN JARINGAN WIRELESS LAN (WLAN) PADA PT. PLN (PERSERO) WILAYAH P2B AREA SORONG

Main Article Content

Sonny Rumalutur

Abstract

Penelitian ini membahas tentang analisis keamanan Wireless Local Area Network (Wireless LAN) di PT. PLN (Persero) Wilayah P2B Area Sorong terhadap serangan luar pada protokol Wireless Protected Access (WPA), Web Proxy, dan Virtual Private Network (VPN), digunakan untuk menyerang LAN.Tiga jenis perangkat lunak yang digunakan sebagai penyerang yaitu, penyerang Network Stumbler, Aircrack dan Wireshark. Perangkat lunak tersebut digunakan di laptop pada jarak 5m sampai 25m dari titik akses LAN Nirkabel.Dari hasil experimen terlihat waktu tercepat direspon oleh Protokol WPA diberikan oleh penyerang Network Stumbler, diikuti oleh Aircrack dan Wireshark.

Downloads

Download data is not yet available.

Article Details

How to Cite
Rumalutur, S. (2015). ANALISIS KEAMANAN JARINGAN WIRELESS LAN (WLAN) PADA PT. PLN (PERSERO) WILAYAH P2B AREA SORONG. Electro Luceat, 1(1), 62-74. https://doi.org/10.32531/jelekn.v1i1.15
Section
Articles
Author Biography

Sonny Rumalutur, Jurusan Teknik Elektro Politeknik Katolik Saint Paul Sorong

Dosen Teknik Elektro Politeknik Katolik Saint Paul Sorong, dari Tahun 2002 - sekarang

References

[1] Stallings, William. 2003. Cryptography and Network Security.
New Jersey: Prentice Hall.

[2] Edney, Jon and William A. Arbaugh E.2004. Real8002.11 Security:
WiFi Protrcted Access and 802.11i. Boston: Addison Wesley

[3] Arbough, William A, Narendar Shankar and Y.C Justine Wan,
2001. Your 802.11 Wireless Network Has No Clothes.
Departemen of Computer Science University of Maryland. 22
September 2004

[4] McNair, Bruce,2002. Information System Security. Stevens
Institute of Technology. 18 Desember 2004.
http://www.ece.stevens-tech.edu/-
bmcnair/information_system_security-F02/class_1.pdf

[5] Borisov, Nikita, Ian Golberg and David Wagner. 2001.
Intercepting Mobile Communication: The Insecurity of
802.11. 5 Oktober 2004.
[6] Schneier, Bruce.1999. Attack Trees: Modeling Security threats.
Dr. Dobb’s Journal December 1999. 18 Desember 2004
http://www.schneier.com/paper-attacktrees-ddj-ft.html
[7] Pervaiz Mohammad O, et all. Security In Wireless Local Area
Networks, Department of Computer Science &Engineering,
Florida Atlantic University 777 Glades Road, Boca Raton,
Florida 33431,USA
[8] Glendinning, Ducan. 2003. 802.11 Security. Intel Corporation. 5
Oktober 2004
http://www.intel.com/idf/us/fall2003/presentations/
FO3USMOB169_OS.Pdf
[9] Borisov, Nikita, Ian Golberg and David Wagner, 2001. Analisis of
802.11 Security orWired Equivalent Privacy Isn’t. 22
September 2004 http://www.isaac.cs.berkeley.edu/isaac/wep-
slides.pdf
[10] He Changhua, John C Mitchell. Security Analysis and Improvements
for IEEE 802.11i, Electrical Engineering and Computer Science
Departments Stanford University, Stanford CA 94305
[11] Al Naamany Ahmed M., Ali Al Shidhani, Hadj Bourdoucen. May
2003. IEEE 802.11 Wireless LAN Security Overview . IJCSNS
International Journal of Computer Science and Network
Security, VOL.6 No.5B, Department of Electrical and Computer
Engineering – Sultan Qaboos University, Oman.
[12] WIR01 Wiryana, I Made, (2000b). Jangan anggap enteng virus.
http://www.pandu.dhs.org/Security/artikel-02
Abstract viewed = 990 times
PDF downloaded = 581 times