CFP last date
20 January 2025
Reseach Article

Wi-Fi Security Level Analysis for Minimizing Cybercrime

by Anis Susila Abadi, Imam Riadi, Yudi Prayudi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 7
Year of Publication: 2017
Authors: Anis Susila Abadi, Imam Riadi, Yudi Prayudi
10.5120/ijca2017913667

Anis Susila Abadi, Imam Riadi, Yudi Prayudi . Wi-Fi Security Level Analysis for Minimizing Cybercrime. International Journal of Computer Applications. 164, 7 ( Apr 2017), 35-39. DOI=10.5120/ijca2017913667

@article{ 10.5120/ijca2017913667,
author = { Anis Susila Abadi, Imam Riadi, Yudi Prayudi },
title = { Wi-Fi Security Level Analysis for Minimizing Cybercrime },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 7 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number7/27499-2017913667/ },
doi = { 10.5120/ijca2017913667 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:43.110127+05:30
%A Anis Susila Abadi
%A Imam Riadi
%A Yudi Prayudi
%T Wi-Fi Security Level Analysis for Minimizing Cybercrime
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 7
%P 35-39
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increasing human need for Internet access requires Internet access service that is easy to do as the availability of Wi-Fi hotspot. Among the many Wi-Fi hotspots in public service locations in Yogyakarta is still very little attention to the security of data communications on the wireless network. This makes the hacker be interested to discover his ability to perform various activities of cybercrime. This study aims to analyze and test the Wi-Fi network security contained in locations of public services in Yogyakarta. The method used in this study is a qualitative method that consists of five main steps, namely the study of literature, the issue of criteria Wi-Fi, research instruments, data collection, and analysis. The location of public services, Wi-Fi hotspot providers selected in three categories: hotel, restaurant / cafe, and educational institutions. Each public service category taken sample 5 different locations. Testing is done with action that leads to crime by type of action such as sniffing, DNS spoofing and hijacking. The results showed that the majority of Wi-Fi located at the location of public service vulnerable to criminal attack. Wi-Fi throughout the studied (100%) are not secure against sniffing activities, 80% are not secure against DNS spoofing activities, and 66.6% are not secure against hijacking action.

References
  1. Bamrara A, "Evaluating Database Security and Cyber Attacks: A Relational Approach," Journal of Internet Banking and Commerce An, pp. 1-17, 2015.
  2. D. Solak and M. Topaloglu, "The Perception Analysis of Cyber Crimes In View of Computer Science Students," Procedia - Social and Behavioral Sciences 182 , p. 590–595, 2015.
  3. G. Rathee and H. Saini, "Security Concerns with Open Research Issues of," International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, pp. 406-432, 2016.
  4. J. Khan, H. Abbas and J. Al-Muhtadi, "Survey on Mobile User's Data Privacy Threats and Defense Mechanisms," Procedia Computer Science 56, p. 376–383, 2015.
  5. Hamid and F. Yuda, "Studi Analisa Tingkat Keamanan Hotspot pada Jaringan FTI UII," Universitas Islaman Indonesia, 2013.
  6. T. Mekhaznia and A. Zidani, "Wi-Fi security analysis," Procedia Computer Science 73, p. 172–178, 2015.
  7. P. Jindal and B. Singh, "Quantitative analysis of the security performance in wireless LANs," Journal of King Saud University - Computer and Information Sciences, p. 23, 2015.
  8. A.Arabo, "Cyber Security Challenges within the Connected Home Ecosystem Futures," Procedia Computer Science 61, p. 227 – 232, 2015.
  9. S. Chakravarty, G. Portokalidis, M. Polychronakis and A. D. Keromytis, "Detection and analysis of eavesdropping in anonymous communication networks," Int. J. Inf. Secur., p. 205–220, 2015.
  10. J. A. R. P. d. Carvalho, H. Veiga, C. F. R. Pacheco and A. D. Reis, "Performance evaluation of laboratory wi-fi ieee 802.11a wpa point-to-multipoint links," Procedia Technology 9 (, p. 146–151, 2013.
  11. S. Safavi, Z. Shukur and R. Razali, "Reviews on Cybercrime Affecting Portable Devices Seyedmostafa," Procedia Technology 11 (, p. 650–657, 2013.
  12. S. S. Wagh, A. More and P. R. Kharote, "Performance Evaluation of IEEE 802.15.4 Protocol Under Coexistence ofWiFi 802.11b," Procedia Computer Science 57, p. 745–751, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Wi-Fi security cybercrime sniffing DNS spoofing hijacking