Analysis of Wi-Fi Network Security Against Phishing and Distributed Denial of Service (DDoS) Attacks

Authors

  • Muhammad Taufik Rifaat Universitas Muslim Indonesia
  • Amaliah Faradibah Universitas Muslim Indonesia
  • Achmad Nuril Fauzi Universitas Negeri Malang

DOI:

https://doi.org/10.56705/ijonit.v1i2.170

Keywords:

Distributed Denial Of Service (DDOS), Phising, Vulnerability Assesment, Fluxion

Abstract

This study aims to analyze and identify vulnerabilities to Distributed Denial of Service (DDoS) and phishing attacks on FIKOM UMI’s Wi-Fi with the access point SSID “UMI Connect,” and to provide recommendations to FIKOM UMI. The method employed is Vulnerability Assessment using the Fluxion tool and a TP-Link wireless adapter. The findings reveal two types of vulnerabilities—packet injection and wireless hijacking—each with medium risk and medium confidence. These weaknesses reside at the SSID layer. Attackers can exploit them to disconnect clients from the network and subsequently perform phishing to obtain the access-point password of the targeted SSID. While some security components on the target access point are functioning properly, several areas still require improvement—specifically, unlimited packet rates per second passing through TCP/UDP data transmissions between users and the access point, which should be rate-limited.

 

References

E. Pratama, “Wardriving Jaringan WIFI Serta Menganalisa Qos Pada Jaringan Internet Universitas Sriwijaya Yang Tidak Terenkripsi Keamanannya,” vol. 1, no. 2, pp. 11–18, 2024.

R. Anugerah Julyan Rahmat, N. Fahriani, S. Jl Raya Sutorejo No, D. Sutorejo, K. Mulyorejo, and J. Timur, “Deteksi Serangan DDoS Dan Sniffing Pada Jaringan Wireless Di Lab Informatika Um Surabaya Dengan Metode Vulnerability Assessment,” vol. 2, no. 1, pp. 88–96, 2023.

A. Y. Suharmanto, A. S. M. Lumenta, X. B. N. Najoan, T. Elektro, U. Sam, and R. Manado, “Analisa Keamanan Jaringan Wireless Di Universitas Sam Ratulangi,” J. Tek. Inform., vol. 13, no. 3, pp. 1–10, 2018.

S. Dwiyatno, A. P. Sari, A. Irawan, and S. Safig, “Pendeteksi Serangan DDoS (Distributed Denial Of Service) Menggunakan Honeypot Di PT. Torini Jaya Abadi,” J. Sist. Inf. dan Inform., vol. 2, no. 2, pp. 64–80, 2019, doi: 10.47080/simika.v2i2.606.

E. Irawadi Alwi and L. Budi Ilmawan, “Analisis Keamanan Sistem Informasi Akademik (SIAKAD) Universitas XYZ Menggunakan Metode Vulnerability Assessment,” 2021.

Amin Muftiadi, “Studi Kasus Keamanan Jaringan Komputer: Analisis Ancaman Phising Terhadap Layanan Online Banking,” Hexatech J. Ilm. Tek., vol. 1, no. 2, pp. 60–65, 2022.

A. Hamzah, S. Juli, I. Ismail, L. Meisaroh, S. Si, and M. Si, “Implementasi Sistem Monitoring Jaringan Menggunakan Zabbix dan Web Web Application Firewall di PT PLN ( Persero ) Transmisi Jawa Bagian Tengah,” e-Proceeding Appl. Sci., vol. 5, no. 3, pp. 2378–2384, 2019.

Downloads

Published

2025-10-29