PENGAMANAN JARINGAN WIRELESS LAN DENGAN MENGGUNAKAN AUTHENTICATION, AUTHORIZATION, ACCOUNTING (AAA) DALAM MENCEGAH SERANGAN RANDOM MAC ADDRESSS

Ariansyah Arifin, . (2023) PENGAMANAN JARINGAN WIRELESS LAN DENGAN MENGGUNAKAN AUTHENTICATION, AUTHORIZATION, ACCOUNTING (AAA) DALAM MENCEGAH SERANGAN RANDOM MAC ADDRESSS. Skripsi thesis, Universitas Pembangunan Nasional Veteran Jakarta.

[img] Text
ABSTRAK.pdf

Download (991kB)
[img] Text
AWAL.pdf

Download (4MB)
[img] Text
BAB I.pdf

Download (2MB)
[img] Text
BAB II.pdf
Restricted to Repository UPNVJ Only

Download (13MB)
[img] Text
BAB III.pdf
Restricted to Repository UPNVJ Only

Download (4MB)
[img] Text
BAB IV.pdf
Restricted to Repository UPNVJ Only

Download (17MB)
[img] Text
BAB V.pdf

Download (897kB)
[img] Text
DAFTAR PUSTAKA.pdf

Download (1MB)
[img] Text
RIWAYAT HIDUP.pdf
Restricted to Repository UPNVJ Only

Download (116kB)
[img] Text
LAMPIRAN.pdf
Restricted to Repository UPNVJ Only

Download (3MB)
[img] Text
HASIL PLAGIARISME.pdf
Restricted to Repository staff only

Download (2MB)
[img] Text
ARTIKEL KI.pdf
Restricted to Repository staff only

Download (13kB)

Abstract

Wireless LAN is one of the most widely used network types because of its convenience. But in the use of this network, problems often arise. one of them is a feature on the end device, namely the Random MAC Address. On some new end devices, such as Android 10, 12, iOS 16, Windows 10. The default or non-default configuration in the network settings is that there is a Random MAC Address. Sometimes this feature makes it difficult for network administrators to manage users, causing the IP address pool to run out quickly because the MAC address used by the user changes. Especially if implementing several network management features such as bandwidth management, firewalls and others will be difficult. The purpose of this research is to make enhanced Wireless LAN security and network management to be able to prevent Random MAC Address attacks. By implementing the Authentication, Authorization, Accounting (AAA) security protocol method, and combined with the PEAP-MSCHAPv2 EAP authentication protocol method. With this method, the results of this study indicate that the new security system (EAP-PEAP MSCHAPv2 (AAA)) has a higher connection difficulty level, with an average value of 2.70 compared to the previous security system (WPA2-PSK) which has the average value of 2.21. A higher average value indicates increased resistance to attacks, indicating the ability of the new security system to prevent Random MAC Address attacks. In terms of website access speed, the new security system achieves higher average scores compared to the previous system on various websites such as YouTube, Leads UPN Veteran Jakarta, Google email, and Speedtest by Ookla. The research findings reveal significant differences in capabilities between WPA2- PSK and EAP-PEAP MSCHAPv2 (AAA) in preventing the impact of Random MAC Address attacks and maintaining network performance. WPA2-PSK encountered a serious problem when users "Forget WiFi" and reconnected, resulting in exhausted IP addresses and bandwidth throttling. On the other hand, EAP-PEAP MSCHAPv2 (AAA) shows better resistance to "Forget WiFi" attacks. This system maintains IP address availability, maintains good quality of network service, and restricts unauthorized access.

Item Type: Thesis (Skripsi)
Additional Information: [No.Panggil: 1910511020] [Pembimbing: Henki Bayu Seta] [Penguji 1: Jayanta] [Penguji 2: Theresia Wati]
Uncontrolled Keywords: Wireless LAN, End device, Random MAC Address, IP Address Pool, AAA, EAP-PEAP MSCHAPv2, WPA2-PSK
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Divisions: Fakultas Ilmu Komputer > Program Studi Informatika (S1)
Depositing User: Ariansyah Arifin
Date Deposited: 01 Aug 2023 07:59
Last Modified: 01 Aug 2023 07:59
URI: http://repository.upnvj.ac.id/id/eprint/25363

Actions (login required)

View Item View Item