MEMBANGUN SISTEM KEAMANAN ARP SPOOFING MEMANFAATKAN ARPWATCH DAN ADDONS FIREFOX

Kristopedus Zonggonau, Haruno Sajati

Submitted : 2017-02-09, Published : .

Abstract

The Development of information Technology, especially computer networks and the service in a rejuvenate the human side. The development of the internet is very widespread. The security level digital data becomes vulnerable to attack by the attacker. Arp spoofing is one of the attacks in a network that can be used to view digital data traffic such as emails, passwords and etc, when is running in the network. The process of prevention againtst arp spoofing attacks, made an application to detect and block the attacker in the network by Firefox Addons. Attacker will be directly blocking (drop) into to Mikrotik OS. Users avoid the attack arp spoofing. The results of testing one, two and three can be detect and block the presentation of the results of 83%, so That’s the terms of security in the network can be safe from attack to the attacker.

Keywords

Arp Spoofing, Mikrotik OS, Attacker, Addons firefox, Arpwatch

References

Tamsil, 2012, Kajian Wireless Intrusion Detection System (WIDS) Terhadap Keamanan Jaringan Nirkabel IEEE 802.11, Balai Besar Pengkaji dan Pengembangan Komunikasi dan Informatika Makasar, Volume 15, No. 1

Howard, J., D, 1997, An Analysis Of Security Incidents On The Internet 1989 – 1995, Carnegie mellon University.

Haryogi, Hendrarini N., dan Jul, I., S., 2011, Implementasi Pencegahan ARP Spoofing menggunakan VLAN dan Bandwidth, Program Studi Teknik Komputer Politeknik Telkom Bandung.

A.S. Rosa dan Shalahuddin M, 2011, Rekayasa Perangkat Lunak, Bandung, Modula

Cartealy, Imam, 2013, Linux Networking (Ubuntu, Kubuntu, Debian, dll). Jasakom.

Riyanto, 2010, Sistem Informasi Penjualan dengan PHP dan MySQL, Yogyakarta, Gava Media.

Sulistiyani, Sri, 2011, Administrasi jaringan dengan Linux Ubuntu, Yogyakarta, Andi.

S’to, 2013, Backtrack 5 R3 100% Attack, Jasakom.

Tuxkeren, Athailah, 2013, Ubuntu Server Panduan Singkat & Cepat, Jasakom.

Towidjojo, Rendra, 2012, Mikrotik Kungfu, Jasakom.

Wahana Komputer, 2012, Network Hacking dengan Linux Backtrack, Yogyakarta, Andi

Zam, Efvy, 2012, Wireless Hacking, Jakarta, PT Elex Media Komputindo.

Article Metrics

Abstract view: 876 times
Download     : 817   times

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Refbacks

  • There are currently no refbacks.