Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Wi-Fi Security Level Analysis for Minimizing Cybercrime

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Anis Susila Abadi, Imam Riadi, Yudi Prayudi

Anis Susila Abadi, Imam Riadi and Yudi Prayudi. Wi-Fi Security Level Analysis for Minimizing Cybercrime. International Journal of Computer Applications 164(7):35-39, April 2017. BibTeX

	author = {Anis Susila Abadi and Imam Riadi and Yudi Prayudi},
	title = {Wi-Fi Security Level Analysis for Minimizing Cybercrime},
	journal = {International Journal of Computer Applications},
	issue_date = {April 2017},
	volume = {164},
	number = {7},
	month = {Apr},
	year = {2017},
	issn = {0975-8887},
	pages = {35-39},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2017913667},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The increasing human need for Internet access requires Internet access service that is easy to do as the availability of Wi-Fi hotspot. Among the many Wi-Fi hotspots in public service locations in Yogyakarta is still very little attention to the security of data communications on the wireless network. This makes the hacker be interested to discover his ability to perform various activities of cybercrime. This study aims to analyze and test the Wi-Fi network security contained in locations of public services in Yogyakarta. The method used in this study is a qualitative method that consists of five main steps, namely the study of literature, the issue of criteria Wi-Fi, research instruments, data collection, and analysis. The location of public services, Wi-Fi hotspot providers selected in three categories: hotel, restaurant / cafe, and educational institutions. Each public service category taken sample 5 different locations. Testing is done with action that leads to crime by type of action such as sniffing, DNS spoofing and hijacking. The results showed that the majority of Wi-Fi located at the location of public service vulnerable to criminal attack. Wi-Fi throughout the studied (100%) are not secure against sniffing activities, 80% are not secure against DNS spoofing activities, and 66.6% are not secure against hijacking action.


  1. Bamrara A, "Evaluating Database Security and Cyber Attacks: A Relational Approach," Journal of Internet Banking and Commerce An, pp. 1-17, 2015.
  2. D. Solak and M. Topaloglu, "The Perception Analysis of Cyber Crimes In View of Computer Science Students," Procedia - Social and Behavioral Sciences 182 , p. 590–595, 2015.
  3. G. Rathee and H. Saini, "Security Concerns with Open Research Issues of," International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, pp. 406-432, 2016.
  4. J. Khan, H. Abbas and J. Al-Muhtadi, "Survey on Mobile User's Data Privacy Threats and Defense Mechanisms," Procedia Computer Science 56, p. 376–383, 2015.
  5. Hamid and F. Yuda, "Studi Analisa Tingkat Keamanan Hotspot pada Jaringan FTI UII," Universitas Islaman Indonesia, 2013.
  6. T. Mekhaznia and A. Zidani, "Wi-Fi security analysis," Procedia Computer Science 73, p. 172–178, 2015.
  7. P. Jindal and B. Singh, "Quantitative analysis of the security performance in wireless LANs," Journal of King Saud University - Computer and Information Sciences, p. 23, 2015.
  8. A.Arabo, "Cyber Security Challenges within the Connected Home Ecosystem Futures," Procedia Computer Science 61, p. 227 – 232, 2015.
  9. S. Chakravarty, G. Portokalidis, M. Polychronakis and A. D. Keromytis, "Detection and analysis of eavesdropping in anonymous communication networks," Int. J. Inf. Secur., p. 205–220, 2015.
  10. J. A. R. P. d. Carvalho, H. Veiga, C. F. R. Pacheco and A. D. Reis, "Performance evaluation of laboratory wi-fi ieee 802.11a wpa point-to-multipoint links," Procedia Technology 9 (, p. 146–151, 2013.
  11. S. Safavi, Z. Shukur and R. Razali, "Reviews on Cybercrime Affecting Portable Devices Seyedmostafa," Procedia Technology 11 (, p. 650–657, 2013.
  12. S. S. Wagh, A. More and P. R. Kharote, "Performance Evaluation of IEEE 802.15.4 Protocol Under Coexistence ofWiFi 802.11b," Procedia Computer Science 57, p. 745–751, 2015.


Wi-Fi security, cybercrime, sniffing, DNS spoofing, hijacking