CFP last date
20 May 2024
Reseach Article

Wireless Implementation on Fake Wifi using Network Forensic Development Life Cycle Method

by Richa Retno Rahmadhani Sembiring, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 26
Year of Publication: 2023
Authors: Richa Retno Rahmadhani Sembiring, Imam Riadi
10.5120/ijca2023922042

Richa Retno Rahmadhani Sembiring, Imam Riadi . Wireless Implementation on Fake Wifi using Network Forensic Development Life Cycle Method. International Journal of Computer Applications. 185, 26 ( Aug 2023), 1-8. DOI=10.5120/ijca2023922042

@article{ 10.5120/ijca2023922042,
author = { Richa Retno Rahmadhani Sembiring, Imam Riadi },
title = { Wireless Implementation on Fake Wifi using Network Forensic Development Life Cycle Method },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2023 },
volume = { 185 },
number = { 26 },
month = { Aug },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number26/32849-2023922042/ },
doi = { 10.5120/ijca2023922042 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:03.586340+05:30
%A Richa Retno Rahmadhani Sembiring
%A Imam Riadi
%T Wireless Implementation on Fake Wifi using Network Forensic Development Life Cycle Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 26
%P 1-8
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Internet technology is growing rapidly, making use of more and more internet networks. From the rapid use of the internet, many attacks or criminal acts committed to attack Internet network aims to steal personal information data. An example of one internet network attack, namely fake wifi where the attack has away the work of duplicating a wifi network with the same SSID name aims gets information from the original wifi by using fluxion tools based on Kali Linux OS. Therefore, to ensnare the perpetrators of crimes against Internet attacks carried out the process of finding evidence and analyzing it. This research uses the Network Forensics Development Life method Cycle (NFDLC) with several stages, namely Initiations, Acquisition, Implementation, Operations, and Disposition. This research uses tools Wireshark for the monitoring process and for further analysis using Network Miner tools that can analyze traffic or files suspiciously. The research results obtained from the NFDLC method are starting with analyzing the equipment used, attack flowcharts and investigation, attack simulation, and monitoring analysis results. Analysis results the last one shows that there are some suspicious files such as HTML files and CSS. The last analysis is how the difference between real and fake wifi is for example in terms of security and also the victim is directed to the website page enter wifi if victim access fake wifi

References
  1. Ahmad, M. S., Riadi, I., & Prayudi, Y. (2017). Live Forensic Investigation From User Side To Analyze Evil Twin-Based Man in the Middle Attack. ILKOM Scientific Journal, 9(1), 1–8.
  2. Salman, O., Elhajj, I. H., Chehab, A., & Kayssi, A. (2018). A Multi-level Internet Traffic Classifier Using Deep Learning. 2018 9th International Conference on the Network of the Future (NOF), 68–75.
  3. Aji, S., Fadlil, A., & Riadi, I. (2017). Development of a Computer Network Security System Based on Network Forensic Analysis. Scientific Journal of Computer and Informatics Electrical Engineering, 3(1), 1.
  4. Vishwa Modi, & Asst. Prof. Chandresh Parekh. (2017). Detection of Rogue Access Point to Prevent Evil Twin Attack in Wireless Network. International Journal of Engineering Research And, V6(04), 23–26.
  5. S. Ayare, S. Das, V. Sayanekar, dan P. R. Patkar. (2010) “Fake access point detection in network,” Int. J. Adv. Res. Comput. Commun.
  6. Paramita, F., Alvina, O., Sentia, R. E., & Kurniawan, A. (2021). Unauthorized Access Point Analysis Using Network Forensics Techniques. Telematics Journal, 14(2), 10.
  7. Singh, O., (2009). Network Forensics. Indian Computer Response Team (CERT- In) Department of Information Technology, New Delhi, India.
  8. Putri, R. U., & Istiyanto, J. E. (2013). Network Forensic Analysis Case Study SQL Injection Attack on Gadjah Mada University Server. IJCCS (Indonesian Journal of Computing andCybernetics Systems), 7(1).
  9. Sulianta, F., (2008), Forensic Computer Jakarta : PT.Elex Media Komputindo
  10. I. Riadi dan A. Kurniawan. (2019). Forensic Network & Cloud. yogyakarta: DiandraKreatif.
  11. Tella, F., Riadi, I. (2020). Comparison of Network Forensics Results Against E-mail Spamming and Spoofing Attacks. XII (2), 121–127.
  12. Hermaduanti, N. (2016). Development of Mitigation Framework for Mitigation of Rogue Access Point Cases on Ieee 802.1X Wireless Networks.
  13. Zamidra zam, E. (2014). Easy Ways to Create a Wireless Network. Elex Media Komputindo.
  14. Sari, M. W. (2016). Analysis of Wi-Fi Network Security Using the Signal Scanning Method at the Faculty of Engineering, Pgri Yogyakarta University. Yogyakata.
  15. University, S., Mada, G., & Mada, G. (2013). Network Forensic Analysis CaseStudy of SQL Injection Attack on Gadjah Mada University Server. IJCCS (Indonesian Journal of Computing andCybernetics Systems), 6(2).
  16. M. Agarwal, S. Biswas, and S. Nandi. (2018). An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi- Fi Networks, International Journal of Wireless Information Networks, pp. 1-16.
  17. Z. Tang, Y. Zhao, L. Yang, S. Qi, D. Fang, X. Chen, et al. (2017). Exploiting wireless received signal strength indicators to detect evil- twin attacks in smart homes. Mobile Information Systems, vol. 2017.
  18. Alsahlany, A. M., Almusawy, A. R., & Alfatlawy, Z. H. (2018). Risk analysis of afake access point attack against Wi-Fi network. 9(5), 322–326.
  19. A. Kumar dan P. Paul. (2016). Security analysis and implementation of asimple method for prevention and detection against evil twin attackin IEEE 802.11 wireless LAN. International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).
  20. Lasaharu, S., & Riadi, I. (2022). Network Forensic on Web-based Applications using Network Forensic Development Life Cycle Method. International Journal of Computer Applications, 183(47), 8–14.
  21. Hidayat, M. R., & Riadi, I. (2021). Investigation of Botnet Attacks using Network Forensic Development Life Cycle Method. International Journal of Computer Applications, 183(25), 30–36.
  22. Pratama, I. P. A. E. (2014). Computer Networking (1st ed.). Bandung: Bandung Informatics.
  23. Purba, W. W., & Efendi, R. (2021). Design and analysis of computer network security systems using SNORT. Aiti, 17(2), 143–158.
  24. Rahmatulloh, A., & MSN, F. (2017). Implementation of Load Balancing Web Server using proxy and File Synchronization on the AcademicInformation System of Siliwangi University. National Journal of Information Technology and Systems, 3(2), 241–248.
  25. Sudradjat, B. (2017). Intruder Detection and Prevention System On Computer Networks Using Snort and Firewalls. JISAMAR (Journal of Information Systems, Applied, Management, Accounting and Research), 1(1), 10–24.
Index Terms

Computer Science
Information Sciences

Keywords

Fake Wifi NFDLC Wireshark Network Miner Wifi