Javascript must be enabled to continue!
Wireshark Implementation to Monitor Security on Wifi Indihome
View through CrossRef
The increasing use of wireless networks, such as Indihome WiFi, raises significant concerns regarding network security. Cyber threats like data theft, unauthorized access, and malware attacks can compromise user privacy and data integrity. Therefore, monitoring network traffic is essential to detect and mitigate potential security risks. This study explores the implementation of Wireshark, a widely used network protocol analyzer, to monitor security on Indihome WiFi networks. Wireshark enables real-time packet capture and analysis, allowing for the inspection of data traffic, detection of suspicious activities, and identification of vulnerabilities. This research focuses on analyzing network protocols, identifying anomalies such as unauthorized access attempts, and evaluating encryption effectiveness. The methodology involves capturing WiFi packets, filtering data based on protocols (e.g., TCP, UDP, HTTP), and analyzing potential security threats like ARP spoofing or DNS hijacking. The results indicate that Wireshark effectively detects irregular traffic patterns, unencrypted data transmissions, and potential intrusion attempts. However, its effectiveness depends on proper configuration and user expertise in interpreting packet data. The study concludes that Wireshark is a valuable tool for enhancing Indihome WiFi security but should be complemented with other security measures such as firewalls, strong encryption (e.g., WPA3), and regular network audits. Future research could explore automated threat detection integration with Wireshark to improve real-time response capabilities.
Title: Wireshark Implementation to Monitor Security on Wifi Indihome
Description:
The increasing use of wireless networks, such as Indihome WiFi, raises significant concerns regarding network security.
Cyber threats like data theft, unauthorized access, and malware attacks can compromise user privacy and data integrity.
Therefore, monitoring network traffic is essential to detect and mitigate potential security risks.
This study explores the implementation of Wireshark, a widely used network protocol analyzer, to monitor security on Indihome WiFi networks.
Wireshark enables real-time packet capture and analysis, allowing for the inspection of data traffic, detection of suspicious activities, and identification of vulnerabilities.
This research focuses on analyzing network protocols, identifying anomalies such as unauthorized access attempts, and evaluating encryption effectiveness.
The methodology involves capturing WiFi packets, filtering data based on protocols (e.
g.
, TCP, UDP, HTTP), and analyzing potential security threats like ARP spoofing or DNS hijacking.
The results indicate that Wireshark effectively detects irregular traffic patterns, unencrypted data transmissions, and potential intrusion attempts.
However, its effectiveness depends on proper configuration and user expertise in interpreting packet data.
The study concludes that Wireshark is a valuable tool for enhancing Indihome WiFi security but should be complemented with other security measures such as firewalls, strong encryption (e.
g.
, WPA3), and regular network audits.
Future research could explore automated threat detection integration with Wireshark to improve real-time response capabilities.
Related Results
Network Management of Multicluster RT-WiFi Networks
Network Management of Multicluster RT-WiFi Networks
Applying wireless technologies in cyber-physical systems (CPSs) has received significant attention in recent years. In our previous work, a high-speed and flexible real-time wirele...
Analisis Sentimen Berdasarkan pada Twitter (X) terhadap Layanan Indihome Menggunakan Algoritma Support Vector Machine (SVM)
Analisis Sentimen Berdasarkan pada Twitter (X) terhadap Layanan Indihome Menggunakan Algoritma Support Vector Machine (SVM)
One of the social media with 24.85 million active users is Twitter. Information published on Twitter can be in the form of user opinions on an object, such as a product or service....
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
Predicted Decoupling for Coexistence Between WiFi and LTE in Unlicensed Band
Predicted Decoupling for Coexistence Between WiFi and LTE in Unlicensed Band
<div>Wireless fidelity (WiFi) and long term evolution (LTE) coexistence system has attracted significant attention recently.</div><div>However, most studies on co...
Predicted Decoupling for Coexistence Between WiFi and LTE in Unlicensed Band
Predicted Decoupling for Coexistence Between WiFi and LTE in Unlicensed Band
<div>Wireless fidelity (WiFi) and long term evolution (LTE) coexistence system has attracted significant attention recently.</div><div>However, most studies on co...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Kelola Bandwidth Dengan Menerapkan Algoritma Per Connection Queue Pada Jaringan Komputer Rajawali Kupie
Kelola Bandwidth Dengan Menerapkan Algoritma Per Connection Queue Pada Jaringan Komputer Rajawali Kupie
In this day and age generally in places of business using the internet wifi as a tourist attraction for endings, such as coffee shop business. However, it is not uncommon to find w...
Analysis of Interactive Marketing Communication Development Based on Social Media in an Indonesian Telecommunications Company
Analysis of Interactive Marketing Communication Development Based on Social Media in an Indonesian Telecommunications Company
TELKOM Tamalanrea Automated Telephone Center (ATC) is one of the automated telephone centers that supports telecommunication activities in Makassar city. ATC TELKOM has a strategy ...

