PREVENTION EFFORTS FOR SOCIAL ENGINEERING ATTACKS FROM ROGUE ACCESS POINT (CASE STUDY : TEMOO CAFÉ)

Wirda Fitriani, Musthafa Zufar Bahri, Nova Mayasari

Abstract


An access point is a network device containing a transceiver and antenna for transmitting and receiving signals to and from remote clients. One device that can endanger a network is the presence of a Rogue Access Point (RAP). One technique used by rogue access point owners to obtain their target is by using Social Engineering techniques. This attack can camouflage itself and is therefore categorized as a dangerous attack. This attack can monitor network traffic and steal sensitive data from victims, which can ultimately be misused.
The prevention efforts of social engineering attacks from rogue access points through two methods: creating educational posters and using a rogue access point detection tool. Posters are used to help everyone to prevent themselves from such attacks, while the rogue access point detection tool is used to monitor the presence of these rogue access points. This tool works only to monitor and does not address the issue directly and technically. The cafe management has a role in directly addressing the existence of these rogue access points.


Keywords


social engineering, rogue access point, prevention, attack.

Full Text:

PDF

References


Chamim. (2012). Mikrokontroler Belajar Code Vision AVR Mulai Dari Nol

Dahoud, A. Al, & Fezari, M. (2018). NodeMCU V3 For Fast IoT Application Development. Notes, October, 5.

Nugroho, A. A. (2012). Implementasi Aplikasi Berbasis Web Sebagai Sistem Pendeteksi Rogue Access Point Dengan Wired-Side Solution.

Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. . Future Internet.

Sowah, R. A., Ofori-Amanfo, K. B., Mills, G. A., & Koumadi, K. M. (2019). Detection and prevention of man-in-the-middle spoofing attacks in MANETs using predictive techniques in Artificial Neural Networks (ANN). Journal of Computer Networks and Communications, 2019. https://doi.org/10.1155/2019/4683982

Taruk, M., Budiman, E., & Safril, M. (2021). Kinerja Perangkat Access Point Menggunakan Metode Coverage Visualization. Jurnal Rekayasa Teknologi Informasi (JURTI). doi:https://doi.org/10.30872/jurti.v5i1.7069

Witemyre, S., Abegaz, T., Payne, B., & Mady, A. N. (2018). Hijacking Wireless Communications using WiFi Pineapple NANO as a Rogue Access Point. Proceedings of the 2018 Conference on Cybersecurity Education, Research and Practice.


Article Metrics

Abstract view : 14 times
PDF – 4 times

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Wirda Fitriani, Musthafa Zufar Bahri, Nova Mayasari

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


Prosiding Seminar Nasional dan Internasional Fakultas Teknik dan Ilmu Komputer Universitas Dharmawangsa Terindex pada:

PROSIDING SEMINAR NASIONAL DAN INTERNASIONAL FAKULTAS TEKNIK DAN ILMU KOMPUTER UNIVERSITAS DHARMAWANGSA PUBLISHED BY :

UPT. Penerbitan dan Publikasi Ilmiah
UNIVERSITAS DHARMAWANGSA

Alamat : Jl. K. L. Yos Sudarso No. 224 Medan
Kontak : Tel. 061 6635682 - 6613783  Fax. 061 6615190
Surat Elektronik : ppi@dharmawangsa.ac.id

 

 Creative Commons License

Prosiding Fakultas Teknik dan Ilmu Komputer By Universitas Dharmawangsa is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Based on a work at
 https://proceeding.dharmawangsa.ac.id/index.php/PFTIK/index