Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Keamanan Jaringan Hotspot Mikrotik Menggunakan Metode Otentikasi Pengguna dengan Captcha dan IP-Binding Untuk Filtering User

View through CrossRef
One of the most common services provided for internet users is a hotspot network. This hotspot functions as a public area equipped with wireless network access. Numerous hotspot locations are available, with some even offering free access, allowing everyone to enjoy this service without any charges. However, security concerns are a significant focus in utilizing hotspot facilities in public zones due to the open nature of these places. Additionally, the use of hotspot networks also has a drawback - the existence of security vulnerabilities due to a lack of administrative attention. Based on findings from existing literature, an effective approach to enhancing wireless security involves user authentication through CAPTCHA and IP-binding methods for user filtration. It is anticipated that this user authentication method can optimize hotspot network security, ensuring that only authorized and registered individuals can access the service.
Title: Keamanan Jaringan Hotspot Mikrotik Menggunakan Metode Otentikasi Pengguna dengan Captcha dan IP-Binding Untuk Filtering User
Description:
One of the most common services provided for internet users is a hotspot network.
This hotspot functions as a public area equipped with wireless network access.
Numerous hotspot locations are available, with some even offering free access, allowing everyone to enjoy this service without any charges.
However, security concerns are a significant focus in utilizing hotspot facilities in public zones due to the open nature of these places.
Additionally, the use of hotspot networks also has a drawback - the existence of security vulnerabilities due to a lack of administrative attention.
Based on findings from existing literature, an effective approach to enhancing wireless security involves user authentication through CAPTCHA and IP-binding methods for user filtration.
It is anticipated that this user authentication method can optimize hotspot network security, ensuring that only authorized and registered individuals can access the service.

Related Results

Devanagari CAPTCHA: For the Security in Web
Devanagari CAPTCHA: For the Security in Web
Completely Automated Public Turing Test to Tell Computers and Humans Apart or CAPTCHA is a solution for cyber-attack. CAPTCHA is a small challenge that an internet user has to pass...
IMPLEMENTASI JARINGAN HOTSPOT MENGGUNAKAN MIKROTIK DI SMK AL AMIN KILANG
IMPLEMENTASI JARINGAN HOTSPOT MENGGUNAKAN MIKROTIK DI SMK AL AMIN KILANG
Abstrak-Era teknologi informasi dan komunikasi mengubah cara fikir dan cara pandang terhadap suatu masalah. Setiap kegiatan dapat diubah menjadi lebih mudah dan cepat. Komunikasi d...
AUTHENTICATION INDICATORS USING BIO-DETECTION FUNCTION WITH TEXT-BASED CAPTCHA
AUTHENTICATION INDICATORS USING BIO-DETECTION FUNCTION WITH TEXT-BASED CAPTCHA
Currently, CAPTCHA (Completely Automated Public Turing test to tell Computer and Human Apart) is used in the daily life before the Internet accessing for preventing automatic progr...
Development of authentication-based CAPTCHA mechanism on touch screen environment
Development of authentication-based CAPTCHA mechanism on touch screen environment
CAPTCHA is a simple security test that was introduced to distinguish among humans and bots for decades. CAPTCHAs have been widely used on commercial sites, such as email service, a...
MINI TINJAUAN JARINGAN NIRKABEL
MINI TINJAUAN JARINGAN NIRKABEL
Saat ini perkembangan jaringan komputer sudah semakin pesat. Dilihat dari media penghubung diantara komputer satu dengan komputer yang lain sebelumnya masih menggunakan kabel, seka...
Web Authentication Biometric 3D Animated CAPTCHA System Using Artificial Intelligence and Machine Learning Approach
Web Authentication Biometric 3D Animated CAPTCHA System Using Artificial Intelligence and Machine Learning Approach
The internet and web security are integral aspects of our daily lives. Many commercial firms provide clients with internet services. For web access, it is assumed that only the gen...
EVALUASI KUALITAS JARINGAN KOMPUTER DENGAN METODE QUALITY OF SERVICE PADA LABORATORIUM UNIVERSITAS AMIKOM YOGYAKARTA
EVALUASI KUALITAS JARINGAN KOMPUTER DENGAN METODE QUALITY OF SERVICE PADA LABORATORIUM UNIVERSITAS AMIKOM YOGYAKARTA
Di era digital saat ini, jaringan komputer merupakan infrastruktur penting yang mendukung banyak aktivitas manusia, termasuk di lingkungan pendidikan seperti perguruan tinggi yang ...

Back to Top