Potential Threat Analysis Hypertext Transfer Protocol and Secure Hypertext Transfer Protocol of Public WiFi Users (Batam Case)

Suharyanto, Cosmas Eko Potential Threat Analysis Hypertext Transfer Protocol and Secure Hypertext Transfer Protocol of Public WiFi Users (Batam Case). International Journal of Scientific & Engineering Research, 2017, vol. 8, n. 3, pp. 320-326. [Journal article (Paginated)]

[thumbnail of 5. 2017_Potential Threat (IJSER).pdf]
Preview
Text
5. 2017_Potential Threat (IJSER).pdf

Download (2MB) | Preview

English abstract

Computer network security has became an international issue in the last decade. We can not deny the ability of a network administrator is increasingly needed to secure the system. One of the important skills that must be possessed is able to read the data packets in computer network traffic. Protocol analysis needed to monitor and analyze information from any data packets that are sent or received on the network. From the user side, are required to have knowledge of information security, especially if accessing via free public wifi. The purpose of this study is to provide and analize the captured HTTP and HTTPS packets using a network packet analyzer tool. The Object of this research is user of public wifi in the city of Batam, Indonesia. The study resulted a comprehensive analysis of data packets, we obtained user behavior when accessing information via public wifi. Despite many sites have been using secure protocols such as HTTPS but there are still using standard protocols resulting information open to hackers.

Item type: Journal article (Paginated)
Keywords: packet sniffer, sniffing, internet security, public wifi, man in the middle (MITM)
Subjects: L. Information technology and library technology > LB. Computer networking.
Depositing user: mr Cosmas Eko Suharyanto
Date deposited: 10 Apr 2020 11:31
Last modified: 10 Apr 2020 11:31
URI: http://hdl.handle.net/10760/38875

References

[1] T. Karygiannis and L. Owens, “Wireless network security 802.11, bluetooth and handheld devices,” NIST Spec. Publ., vol. 128, pp. 800–48, 2002.

[2] APJII, “Penetrasi & Perilaku Pengguna Internet Indonesia,” Jakarta, 2016.

[3] G. Sadasivan, J. Brownlee, B. Claise, and J. Quittek, “Architecture for IP flow information export.” [Online]. Available: https://tools.ietf.org/html/rfc7235. [Accessed: 11-Mar-2017].

[4] C. Sanders, PR AC T I C A L PAC K E T A N A LY S I S WIRESHARK TO SOLV E RE A L-WORLD, 2nd ed. San Francisco: William Pollock, 2011.

[5] R. Fielding et al., “RFC 2616 - Hypertext Transfer Protocol - HTTP/1.1,” Internet Soc., no. 2616, pp. 1–114, 1999.

[6] R. T. Fielding, T. Berners-Lee, and H. Frystyk, “Hypertext Transfer Protocol -- HTTP/1.0.” [Online]. Available: https://tools.ietf.org/html/rfc1945. [Accessed: 11-Mar-2017].

[7] P. J. Leach, T. Berners-Lee, J. C. Mogul, L. Masinter, R. T. Fielding, and J. Gettys, “Hypertext Transfer Protocol -- HTTP/1.1.” [Online]. Available: https://tools.ietf.org/html/rfc2616#section-9. [Accessed: 11-Mar-2017].

[8] E. Rescorla, “HTTP Over TLS.” [Online]. Available: https://tools.ietf.org/html/rfc2818. [Accessed: 12-Mar-2017].

[9] E. Rescorla and A. Schiffman, “The Secure HyperText Transfer Protocol.” [Online]. Available: https://tools.ietf.org/html/rfc2660. [Accessed: 12-Mar-2017].

[10] H. P. Pallavi Asrodia, “Network Traffic Analysis Using Packet Sniffer,” Int. J. Eng. Res. Appl., vol. 2, no. 3, pp. 854–856, 2012.

[11] M. A. Qadeer, M. Zahid, A. Iqbal, and M. R. Siddiqui, “Network Traffic Analysis and Intrusion Detection Using Packet Sniffer,” Commun. Softw. Networks, 2010. ICCSN ’10. Second Int. Conf., pp. 313–317, 2010.

[12] P. Asrodia and V. Sharma, “Network Monitoring and Analysis by Packet Sniffing Method,” Int. J. Eng. Trends Technol., vol. 4, no. May, pp. 2133–2135, 2013.

[13] U. Banerjee, A. Vashishtha, and M. Saxena, “Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection,” Int. J. Comput. Appl., vol. 6, no. 7, pp. 975–8887, 2010.

[14] Gerald Combs, “Wireshark · Go Deep.” [Online]. Available: https://www.wireshark.org/. [Accessed: 12-Mar-2017].

[15] M. V. Alberto Ornaghi, “Ettercap Home Page.” [Online]. Available: https://ettercap.github.io/ettercap/index.html. [Accessed: 12-Mar-2017].

[16] R. Wagner, “Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks,” 2003.

[17] M. Dunker, “ettercap Primer,” 2004.

[18] G. Kaur, “Comparative Investigation of ARP Poisoning Mitigation Techniques using Standard Testbed for Wireless Networks,” Int. J. Comput. Appl., vol. 121, no. 13, pp. 15–19, 2015.

[19] Ahmad Dahlan, “Wujudkan Batam sebagai The Smart City.” [Online]. Available: https://kominfo.go.id/index.php/content/detail/4800/Wujudkan+Batam+sebagai+The+Smart+City/0/sorotan_media. [Accessed: 12-Mar-2017].


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item