Analisis Keamanan Jaringan Terhadap Serangan Packet Sniffing Menggunakan Wireshark, Ettercap dan PCAP-Droid

Ryan Setiawan, Rahmat Sufri, Rahmat Hermanto

Abstract


Network security is a primary concern in the management of information systems. One of the common threats in local networks is packet sniffing, a technique used to intercept network traffic using specific software tools. This study aims to analyze the level of network security against packet sniffing attacks using three software tools: Wireshark, Ettercap, and Pcap-Droid. The research method employed is experimental, with testing conducted on both LAN and Wi-Fi networks. The results show that protocols lacking encryption, such as HTTP, are highly vulnerable to interception, while protocols like HTTPS and services protected by SSL/TLS are generally secure. This research highlights the importance of using secure protocols to protect the confidentiality of user data.

Keywords


Packet Sniffing; Network Security; Wireshark; Ettercap; Pcap-Droid

Full Text:

PDF

References


Moussa, A., & Wazid, M. (2023). “A Survey on Security Threats and Solutions in Cloud Computing and Internet of Things”. International Journal of Computer Applications, 175(1), 56-63

Kurose, J. F., & Ross, K. W. (2017). “Computer Networking: A Top-Down Approach”. Pearson.

Sharma, R., & Singh, M. (2021). “Packet Sniffing and Network Security: Techniques and Tools”. Journal of Cyber Security Technology, 5(3), 123-135.

Bargig, A., Shaar, M., & Zaher, H. (2022). “Utilizing Ettercap in Network Traffic Sniffing and Man-in-the- Middle Attacks”. International Journal of Information Technology and Security, 15(2)

Sundaram, K., Rajendran, S., & Kumar, N. (2023). “Pcapdroid: Mobile Packet Sniffing and Security Analysis”. Journal of Wireless Communication and Mobile Computing, 2023

Husain, M., Sharma, S., & Kapoor, V. (2021). “The Importance of Securing Web Login Systems: A Review of Authentication Methods and Encryption Protocols”. Journal of Information Security, 12(4), 65-78

Thomas, A., & Singh, R. (2021).“Securing Online Transactions with HTTPS: Analyzing the Role of Digital Certificates in Web Security”. Cybersecurity Review, 5(3), 65-80

Kurose, J. F., & Ross, K. W. (2017). “Computer Networking: A Top-Down Approach”. Pearson.

Shinder, D. L., & Cross, M. (2008). “Microsoft Internet Information Services (IIS) 7.0 Administrator's Pocket Consultant”. Microsoft Press.

Chen, X., & Zheng, Y. (2023). “An Overview of Web Security Protocols: HTTP, HTTPS, and Their Role in Securing Web Applications”. Journal of Cybersecurity and Privacy, 1(4), 112-127


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.