Implementasi authentication Captive Portal pada Wireless Local Area Network PT. Rikku Mitra Sriwijaya
DOI:
https://doi.org/10.26594/register.v4i2.1245Keywords:
Captive Portal, cyber crime, NDLC, WLAN, WPA2-PSKAbstract
PT. Rikku Mitra Sriwijaya merupakan salah satu perusahaan yang menyalurkan tenaga cleaning service. Perusahaan ini telah memiliki Wireless Local Area Network (WLAN) yang digunakan sebagai media pertukaran data serta informasi dengan memanfaatkan media transmisi wireless, WLAN PT. Rikku Mitra Sriwijaya saat ini menggunakan WPA2-PSK sebagai sistem keamanan untuk otentikasi pengguna agar dapat mengakses internet. Akan tetapi, penggunaan WPA2-PSK sebagai keamanan WLAN masih memiliki kelemahan dikarenakan penggunaan 1 password yang sama untuk banyak user agar dapat terhubung dengan hotspot WLAN PT. Rikku Mitra Sriwijaya akan menjadi peluang terjadinya cyber crime. Hal ini terjadi karena akan sangat mudah user yang tidak bertanggung jawab untuk masuk ke dalam WLAN PT. Rikku Mitra Sriwijaya. Dari informasi yang diperoleh, pada tahun 2017 PT. Rikku Mitra Sriwijaya mengalami kehilangan serta perusakan data dan informasi yang dimilikinya. Oleh karena itu, pada penelitian ini akan diterapkan authentication Captive Portal sebagai usaha peningkatan keamanan WLAN PT. Rikku Mitra Sriwijaya menggantikan WPA2-PSK. Proses penelitian ini menggunakan metode Network Development Life Cycle (NDLC), metode ini berorientasi pada network yang memiliki 6 tahapan dengan siklus yang tidak memiliki awal dan akhir. Keseluruhan konfigurasi yang dibutuhkan dalam membangun authentication Captive Portal memanfaatkan program Winbox. Penelitian yang telah dilakukan ini menghasilkan suatu pembatasan otentikasi user khusus bagi user yang telah terdaftar pada WLAN PT. Rikku Mitra Sriwijaya yang diizinkan mengakses internet perusahaan ini. Selain itu, program Winbox juga dapat digunakan untuk monitoring seluruh user yang terhubung ke WLAN PT. Rikku Mitra Sriwijaya, baik user yang sedang aktif maupun yang tidak aktif.
PT. Rikku Mitra Sriwijaya is one of the companies that supply cleaning service personnel. This company already has Wireless Local Area Network (WLAN) which is used as a medium for exchanging data and information by utilizing wireless transmission media, LAN PT. Rikku Mitra Sriwijaya currently uses WPA2-PSK as a security system for authenticate users to be able to access the internet. However, the use of WPA2-PSK as WLAN security still has weaknesses due to the use of the a same password for many users can be connected to the PT. Rikku Mitra Sriwijaya WLAN hotspot will be a chance of occurrence the cyber crime. This happens because it will be very easy for users who are not responsible for enter to WLAN PT. Rikku Mitra Sriwijaya. From the information obtained, in 2017 PT. Rikku Mitra Sriwijaya has lost and damaged their data and information. Therefore, captive portal authentication will be applied in this research as an effort to increase PT. Rikku Mitra Sriwijaya WLAN security that replace WPA2-PSK. This research process uses the Network Development Life Cycle (NDLC) method, this method is network oriented which has 6 stages with a cycle that has no beginning and ending. The entire configuration needed to build an captive portal authentication utilizes the Winbox program. This research has been carried out resulted limitation for users authentication specifically for users who have registered on PT. Rikku Mitra Sriwijaya WLAN is allowed to access the internet of this company. Furthermore, Winbox program also can be used for monitoring all connected users to PT. Rikku Mitra Sriwijaya WLAN both active and inactive users.
References
Hermawan, R. (2015). Kesiapan Aparatur Pemerintah dalam Menghadapi Cyber Crime di Indonesia. Faktor Exacta, 6(1), 43-50.
Hidayat, A. (2018). Design of radius server on server network internet faculty of Computer Science University Muhammadiyah Metro. IJISCS (International Journal Of Information System and Computer Science), 2(1), 13-30.
Idland, C., Jelle, T., & Mjølsnes, S. F. (2012). Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints. International Conference on Digital Forensics and Cyber Crime (pp. 283-301). Berlin: Springer.
Novrianda, R. (2017). Rancang bangun keamanan jaringan wireless pada STIPER Sriwigama Palembang dengan radius server. Jurnal Maklumatika, 4(1), 19-29.
Purwanto, T. D., & Cholil, W. (2013). Analisa Kinerja Wireless Radius Server Pada Perangkat Access Point 802.11 g (Studi Kasus di Universitas Bina Darma). Semantik, 3(1), 371-376.
Ratnasari, S. D., Farida, E., & Firdaus, N. (2017). Implementasi Controller Access Point System Manager (CAPsMAN) Dan Wireless Distribution System (WDS) Jaringan Wireless Di SMK Terpadu Al Ishlahiyah Singosari Malang. Seminar Nasional Sistem Informasi (SENASIF). 1, pp. 624-635. Malang: Universitas Merdeka Malang.
Sharma, P., & Benith, T. (2014). Design and Configuration of App Supportive Indirect Internet Access using a Transparent Proxy Server. International Journal Of Modern Engineering Research (IJMER), 4(10), 9-17.
Silitonga, P. (2014). Analisis QoS (Quality of Service) Jaringan Kampus dengan Menggunakan Microtic Routerboard. Jurnal Times, 3(2), 19-24.
Tampi, B. A., Najoan, M. E., Sinsuw, A. A., & Lumenta, A. S. (2013). Implementasi Routing Pada IP Camera Untuk Monitoring Ruang di Universitas Sam Ratulangi. e-journal Teknik Elektro dan Komputer, 2(2), 1-7.
Wongkar, S., Sinsuw, A. A., & Najoan, X. (2015). Analisa Implementasi Jaringan Internet dengan Menggabungkan Jaringan LAN dan WLAN di Desa Kawangkoan Bawah wilayah Amurang II. Jurnal Teknik Elektro dan Komputer, 4(6), 62-68.
Downloads
Published
How to Cite
Issue
Section
License
Please find the rights and licenses in Register: Jurnal Ilmiah Teknologi Sistem Informasi. By submitting the article/manuscript of the article, the author(s) agree with this policy. No specific document sign-off is required.
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)' Warranties
The author warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author(s).
3. User/Public Rights
Register's spirit is to disseminate articles published are as free as possible. Under the Creative Commons license, Register permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and Register on distributing works in the journal and other media of publications. Unless otherwise stated, the authors are public entities as soon as their articles got published.
4. Rights of Authors
Authors retain all their rights to the published works, such as (but not limited to) the following rights;
Copyright and other proprietary rights relating to the article, such as patent rights,
The right to use the substance of the article in own future works, including lectures and books,
The right to reproduce the article for own purposes,
The right to self-archive the article (please read out deposit policy),
The right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Register: Jurnal Ilmiah Teknologi Sistem Informasi).
5. Co-Authorship
If the article was jointly prepared by more than one author, any authors submitting the manuscript warrants that he/she has been authorized by all co-authors to be agreed on this copyright and license notice (agreement) on their behalf, and agrees to inform his/her co-authors of the terms of this policy. Register will not be held liable for anything that may arise due to the author(s) internal dispute. Register will only communicate with the corresponding author.
6. Royalties
Being an open accessed journal and disseminating articles for free under the Creative Commons license term mentioned, author(s) aware that Register entitles the author(s) to no royalties or other fees.
7. Miscellaneous
Register will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed. Register's editors may modify the article to a style of punctuation, spelling, capitalization, referencing and usage that deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers as mentioned in point 3.