IMPLEMENTASI PENANGANAN SERANGAN MAC-CLONE PADA HOTSPOT MIKROTIK DI STMIK PRADNYA PARAMITA MALANG (STUDI KASUS: STMIK PRADNYA PARAMITAMALANG)

  • Santi Dwi Ratnasari Program Studi Teknik Informatika, STMIK Pradnya Paramita Malang
  • Dwi Safiroh Utsalina Program Studi Sistem Informasi, STMIK Pradnya Paramita Malang

Abstract

One of the facilities that is needed is a network agency. In educational institutions such as Colleges and universities are needed to look for references as well as add insight. The technology used is one that is technology hotspot. Currently there are many hotspot technology is applied to the High School and College. However, the hotspot network mikrotik used in STMIK Pradnya Paramita Malang still experienced many problems in network security. Attacks are frequent and intrusive security network that attacks Mac Clone. Disrupt and complicate the issue of employees as well as students who have access rights legally due access rights are duplicated by users who are not responsible. Therefore, to overcome these problems built a network security by firewall settings that the filter rule and NAT. Based on test results concluded that in building a network security RouterOS hotspot using 5.18 to leave the setting on the firewall, can address the existing Mac Clone attack on STMIK Pradnya Paramita Malang.

 

Keywords: Firewall, Hotspot, Mac Clone, Mikrotik RouterOS 5.18.

References

Abdullah, Imam Marzuki, Misdiyanto. Optimalisasi Bandwidth Dengan Filterisasi Menggunakan Mikrotik Routerboard di Universitas Panca Marga Probolinggo. Vol. 4 No. 2 Nopember 2014 36-47. ISSN: 2088-4591.

Anjik Sukmaji, dan Rianto. 2008. Jaringan Komputer Konsep Dasar Pengembangan Jaringan dan Keamanan Jaringan. Yogyakarta: Andi.

Arifin Zainal, E-Bussines membangun bisnis hosting dan domain. Jakarta: PT.Elex Media Komputindo.

Davidson Jonatan, Tina Fox.2002,Developing Cisco Voie Over Ip Solution. Cisco press: Indianapolis USA.

Enterprise Jubilee,2009.100 Tip & Trik Wi-Fi. Jakarta: PT.Elex Media Komputindo.

Fatsyahrina Fitriastuti, Dodi Prasetyo Utomo. 2014. Implementasi Bandwith Management dan Firewall System Menggunakan Mikrotik OS 2.9.27. Vol. 4, No. 1, April 2014 1-9. ISSN: 2088 – 3676.

Kustanto, dan Saputro, Daniel. 2008. Membangun Server Internet Dengan Mikrotik OS. Yogyakarta: Gava Media.

Muryanto ,Prasetyo Uji. Implementasi Sistem Wireless Security dan Managemen Bandwidth Berbasis Radius Server Dengan Mikrotik Di LEMHANNAS Republlik Indonesia.

Purwanto Eko. 2015. Implementasi Jaringan Hotspot dengan Menggunakan Router Mikrotik sebagai Penunjang Pembelajaran (Studi Kasus:SMK Sultan Agung Tirtomoyo Wonogiri). Vol. 1 No. 2 Tahun 2015 20-27. ISSN : 2442-7942.

Prasad. 2005. Implementasi Jaringan Wireless. Yogyakarta: Andi Offset.

Siswo Wardoyo, Taufik Ryadi, Rian Fahrizal. Analisis Performa File Transport Protocol Pada Perbandingan Metode IPv4 Murni, IPv6 Murni dan Tunneling 6to4 Berbasis Router Mikrotik. Vol. 3 No. 2 September 2014 106-117. ISSN: 2302 – 2949.

Solehudin Arip.2015. Implementasi Arsitektur Jaringan dan Penerapan Limiting Upload/Download File Extensions Menggunakan Mikrotik Router di Laboratorium Komputer UNSIKA. Vol. 2 No. 6 Juni 2015 – Agustus 2015 1-10. ISSN:2355-1119.

Wahana Komputer. 2014. Mikrotik Menggunakan Metode Virtualisasi. Yogyakarta: Andi.

Published
2017-03-01