ANALISIS TRANSFER DATA PADA JARINGAN TERDAMPAK ARP SPOOFING MENGGUNAKAN METODE ARP POISONING DAN STATISTIK DESKRIPTIF

  • sudaryanto Institut Teknologi Dirgantara Adisutjipto
  • Dwi Nugraheny Institut Teknologi Dirgantara Adisutjipto
Keywords: Penetration Testing, Web Application Security, Descriptive Statistics, ARP Poisoning, Ettercap

Abstract

This  Computer network security issues are very important and need to be considered in the development of computer networks. Networks connected to network devices are usually vulnerable to hacking. Hacking is an activity that allows a person or group to change or take data for personal gain. The aim of this research is to carry out testing and analysis to determine the condition and measure the level of security of the ITDA Yogyakarta intra-campus information system and computer network. Describe security gaps and measure the level of security that needs to be immediately repaired so that it can help correct failures in maintaining the security of ITDA Yogayakarta intra-campus information systems and networks. This research uses descriptive statistics with 20 PC units as samples. There were four tests in this study with a total success of 16 out of 20 samples. From the results of Arp spoofing on the local network, it can be concluded that after the local network is infiltrated by an attacker using the ARP spoofing method, the target traffic will be redirected to the attacker's device. This can allow attackers to monitor and understand the contents of data traffic on the local network. Changing the attacker's MAC address is very necessary because if the MAC is not replaced then network traffic will not be redirected to the attacker's device.

References

[1] YUDIANTO, M. Jafar Noor; NOOR, Jafar. Jaringan komputer dan Pengertiannya. Ilmukomputer. com, 2014, 1: 1-10.
[2] ENGEBRETSON, Patrick. The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. Elsevier, 2013.
[3] Fachri, F., Fadlil, A., & Riadi, I. (2021). Analisis Keamanan Webserver Menggunakan Penetration Test. Jurnal Informatika. Yogyakarta: Universitas Ahmad Dahlan.
[4] Fauzan, F. Y., & Syukhri. (2021). Analisis Metode Web SecurityPTES (Penetration Testing Execution And Standart) Pada Aplikasi E-LearningUniversitas Negeri Padang. Jurnal Vocational Teknik Elektronika dan Informatika: Universitas Negeri Padang.
[5] Fauzan, R. H. (2019). Pengujian Keamanan Sistem Informasi Akademik Menggunakan Metode Penetration Testing. Studi Kasus: Institut Pertanian Stiper Yogyakarta.
[6] Fauzan, R. H. (2019). Pengujian Keamanan Sistem Informasi Akademik Menggunakan Metode Penetration Testing. Studi Kasus: Institut Pertanian Stiper Yogyakarta.
[7] Hidayatulloh, S., & Saptadiaji, D. (2021). Penetration Testing pada Website Universitas ARS Menggunakan Open Web Application Security Project (OWASP). Jurnal Algoritma. Garut: Sekolah Tinggi Teknologi Garut.
[8] Ghanem, M. C., & Chen, T. M. (2020). Reinforcement learning for efficient network penetration testing. Information (Switzerland), 11(1), 1–23. https://doi.org/10.3390/info11010006
[9] Ismail, R. W., & Pramudita, R. (2020). Metode Penetration Testing pada Keamanan Jaringan Wireless Wardriving PT. Puma Makmur Aneka Engineering Bekasi. Jurnal Mahasiswa Bina Insani, 5(1), 53–62.
[10] Ismail, R. W., & Pramudita, R. (2020). Metode Penetration Testing pada Keamanan Jaringan Wireless Wardriving PT. Puma Makmur Aneka Engineering Bekasi. Jurnal Mahasiswa Bina Insani, 5(1), 53–62.
[11] Kelrey, A. R., & Muzaki, A. (2019). Pengaruh Ethical Hacking Bagi Keamanan Data Perusahaan. CyberSeccurity Dan Forensik Digital, 2(2), 77–81.
Published
2024-07-09