DESIGN WIRELESS INTRUSION DETECTION SYSTEM ON PUBLIC WI-FI NETWORK BASED ON THREATS AND VULNERABILITIES ASSESSMENT

Peoples who are in Wi-Fi network range can join a network without having to connect with physical connection like on a wired network. This increases people's interest in using Wi-Fi networks ranging from daily needs to the fields of work and business to access internet. Wi-Fi network security i...

Full description

Saved in:
Bibliographic Details
Main Author: Marphy Junan Lawalata, Sergio
Format: Theses
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/46817
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:Peoples who are in Wi-Fi network range can join a network without having to connect with physical connection like on a wired network. This increases people's interest in using Wi-Fi networks ranging from daily needs to the fields of work and business to access internet. Wi-Fi network security is important factor that needs to be considered. Wi-Fi network itself comes with security protection developed start from WEP to the most widely used method now, namely WPA2. Even so, the Wi-Fi network is still vulnerable to various types of attacks that appear from time to time. 4-way handshake mechanism that used to authenticate client can be captured from the air and processed with dictionary attack to find Wi-Fi network password. After Wi-Fi password have found, attacker can decrypt the data flow on the air or create rogue AP to steal user information. Based on threats and vulnerabilities found on Wi-Fi networks, the Common Vulnerability Scoring System (CVSS) assigns value to each vulnerability according to the impact of the attack. By considering the value of each vulnerability, the security system is created based on the value of the vulnerability to determine the priority of Wi-Fi network security. The implementation of the Wireless Intrusion Detection System (WIDS) is an effective solution by analyzing frames on Wi-Fi networks and identifying types of attacks. WIDS created can be used to analyze attacks such as rogue access points, beacon floods, de-authentication floods, and ARP poisoning.