Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Implementation of Hardening for Optimization of Wireless Local Area Network Security

View through CrossRef
Computer networks use two main methods for data transmission, namely wired and wireless networks or what is known as a Wireless Local Area Network (WLAN). In WLAN networks, the security standard usually used is the WiFi Protected Access 2 Pre-Shared Key or WPA2-PSK protocol, which utilizes SSID and password. Despite using security mechanisms such as WPA2-PSK, criminal activities such as intrusion into the network still occur. Therefore, it is necessary to improve the network security system to ensure that the WLAN network is more secure and can minimize potential risks to users.  This study aims to improve and optimize the WLAN network security system through vulnerability scanning using the Nessus tool to test the level of security on the WLAN network and the application of hardening methods to strengthen and disguise vulnerabilities on the WLAN network, which includes various security techniques such as applying raw firewalls and firewall filters, limiting ports and services used and disabling services that are not needed to minimize vulnerabilities, disabling the Mikrotik neighbor discovery protocol service on the router, and implementing port knocking as an additional layer of security. The results of the study show that applying vulnerability scanning techniques and hardening methods can help minimize the level of risk of vulnerabilities found and make the resilience of the WLAN network more optimal so as to avoid potential intrusions and threats of attacks.
Title: Implementation of Hardening for Optimization of Wireless Local Area Network Security
Description:
Computer networks use two main methods for data transmission, namely wired and wireless networks or what is known as a Wireless Local Area Network (WLAN).
In WLAN networks, the security standard usually used is the WiFi Protected Access 2 Pre-Shared Key or WPA2-PSK protocol, which utilizes SSID and password.
Despite using security mechanisms such as WPA2-PSK, criminal activities such as intrusion into the network still occur.
Therefore, it is necessary to improve the network security system to ensure that the WLAN network is more secure and can minimize potential risks to users.
  This study aims to improve and optimize the WLAN network security system through vulnerability scanning using the Nessus tool to test the level of security on the WLAN network and the application of hardening methods to strengthen and disguise vulnerabilities on the WLAN network, which includes various security techniques such as applying raw firewalls and firewall filters, limiting ports and services used and disabling services that are not needed to minimize vulnerabilities, disabling the Mikrotik neighbor discovery protocol service on the router, and implementing port knocking as an additional layer of security.
The results of the study show that applying vulnerability scanning techniques and hardening methods can help minimize the level of risk of vulnerabilities found and make the resilience of the WLAN network more optimal so as to avoid potential intrusions and threats of attacks.

Related Results

ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...
Frequency of Common Chromosomal Abnormalities in Patients with Idiopathic Acquired Aplastic Anemia
Frequency of Common Chromosomal Abnormalities in Patients with Idiopathic Acquired Aplastic Anemia
Objective: To determine the frequency of common chromosomal aberrations in local population idiopathic determine the frequency of common chromosomal aberrations in local population...
Cross-layer security solution for secure communication of sensorsin Wireless Sensor Networks
Cross-layer security solution for secure communication of sensorsin Wireless Sensor Networks
Safe path-finding is extremely necessary for multihop wireless systems such as Wireless Sensor  Networks. Multihop wireless systems are more  unprotected to safety outbreaks as ass...
Reconfigurable antennas for wireless network security
Reconfigurable antennas for wireless network security
Large scale proliferation of wireless technology coupled with the increasingly hostile information security landscape is of serious concern as organizations continue to widely adop...
Development Tasks of AI-based Security Industry
Development Tasks of AI-based Security Industry
Recently, the government's interest in industries utilizing AI has been amplified, with initiatives such as announcing a roadmap aiming to achieve the goal of becoming the world's ...
Human Security
Human Security
The term “human security” was first employed in the United Nations Development Programme (UNDP) Human Development Report (HDR) of 1994, which argued for a “people-centric” concept ...
Building Wireless Grids
Building Wireless Grids
The accelerating implementation and remarkable popularity of sophisticated mobile devices, including notebook computers, cellular phones, sensors, cameras, portable GPS (Global Pos...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...

Back to Top