ac

Implementation of Wireshark Application in Data Security Analysis on LMS Website

Authors

  • I Kadek Noppi Adi Jaya Universitas Hindu Indonesia
  • Ida Ayu Utari Dewi Universitas Hindu Indonesia
  • Gede Surya Mahendra STMIK STIKOM Indonesia

DOI:

10.47709/cnahpc.v4i1.1345

Keywords:

LMS, Security, Sniffing, Website, Wireshark

Dimension Badge Record



Abstract

Data security issues are an important aspect of data and information communication over networks. In addition, it is also necessary to look at the security side of the software. In addition to software, computers have an internet protocol in the form of HTTP which is commonly used to access websites. On the LMS website, students have access to lecture materials, discussion forums with lecturers and access to assignments given by lecturers. Wireshark is used to analyze network protocols, can log all packets going through and display detailed data. The purpose of this study is to use a Wireshark application to sniff LMS and pinpoint vulnerabilities in the system. The results of the sniffing process carried out using Wireshark on an LMS that uses the HTTP protocol clearly indicate the absence of encryption and expose the risk of vulnerabilities to the system. Recommendations given to LMS are the use of HTTPS protocol, implementation of Multi Factor Authentication, website log monitoring and password management. Recommended password management are periodic password changes, standardization policies for the use of characters in passwords and password hashing. It is hoped that when the recommendations are implemented it will improve security on the LMS website and reduce risks in data communications

Downloads

Download data is not yet available.

Author Biographies

I Kadek Noppi Adi Jaya, Universitas Hindu Indonesia

Program Studi Sistem Informasi

Ida Ayu Utari Dewi, Universitas Hindu Indonesia

Program Studi Sistem Informasi

Google Scholar Cite Analysis
Abstract viewed = 1101 times

References

Abdillah, M., Yudhana, A., & Fadil, A. (2020). Sniffing Pada Jaringan WiFi Berbasis Protokol 802.1x Menggunakan Aplikasi Wireshark. J-SAKTI (Jurnal Sains Komputer Dan Informatika), 4(1), 1–8. https://doi.org/10.30645/j-sakti.v4i1.181

Alexander, A. D., Salkiawat, R., & Warta, J. (2021). Perancangan Intrusion Detection System Menggunakan Honeypot pada Universitas Bhayangkara Jakarta Raya. Cyber Security Dan Forensik Digital, 4(1), 33–37. https://doi.org/10.14421/csecurity.2021.4.1.2379

Fitriani, Y. (2020). Analisa Pemanfaatan Learning Management System (LMS) sebagai Media Pembelajaran Online Selama Pandemi COVID-19. https://doi.org/10.52362/jisicom.v4i2.312

Huzaeni, F., Gunawan, I., Purnomo, D. C., Yanti, M., & Krisdayanti, N. (2021). Analisis Keamanan Data Pada Website Dengan Wireshark. Jurnal Teknik Elektro Smart, 1(1), 13–17.

Ihsana, A. N., & Maslan, A. (2020). Analisis Keamanan Jaringan dari Serangan Paket Data Sniffing di PT Raden Syaid Kantor Pos Piayu Kota Batam. Computer and Science Industrial Engineering Journal, 3(5), 11.

Iqbal, H., & Naaz, S. (2019). Wireshark as a Tool for Detection of Various LAN Attacks. International Journal of Computer Sciences and Engineering, 7(5), 833–837. https://doi.org/10.26438/ijcse/v7i5.833837

Luthfansa, Z. M., & Rosiani, U. D. (2021). Pemanfaatan Wireshark untuk Sniffing Komunikasi Data Berprotokol HTTP pada Jaringan Internet. Journal Information Engineering and Educational Technology, 5(1), 34–39.

Malek, M. S. A., & Amran, A. R. (2021). A Study of Packet Sniffing as an Imperative Security Solution in Cybersecurity. Journal of Engineering Technology, 9(1), 96–101.

Manoppo, V. A., Lumenta, A. S. M., & Karouw, S. D. S. (2020). Analisa Malware Menggunakan Metode Dynamic Analysis Pada Jaringan Universitas Sam Ratulangi. Jurnal Teknik Elektro dan Komputer, 9(3), 181–188. https://doi.org/10.35793/jtek.9.3.2020.29567

Maulana, A. R., Walidainy, H., Irhamsyah, M., Fathurrahman, & Bintang, A. (2021). Analisis Quality of Service (QoS) Jaringan Internet Pada Website e-Learning Universitas Syiah Kuala Berbasis Wireshark. Jurnal Komputer, Informasi Teknologi dan Elektro, 6(2), 27–30. https://doi.org/10.24815/kitektro.v6i2.22284

Nitra, R. O., & Ryansyah, M. (2019). Implementasi Sistem Keamanan Jaringan Menggunakan Firewall Security Port pada Vitaa Multi Oxygen. Jurnal Sistem dan Teknologi Informasi (JUSTIN), 7(1), 52. https://doi.org/10.26418/justin.v7i1.29979

Prayitno, A. (2019). Analisis Kinerja Trafik Web Browser Dengan Wireshark Network Protocol Analyzer Pada Sistem Client/Server. Musamus Journal Of Research Information and Communication Technology, 2(1), 12–18. https://doi.org/10.35724/mjrict.v2i1.2603

Putri, D. D. (2018). Pengembangan Learning Management System Menggunakan Framework Codeigniter dan Angularjs di PT. XYZ. Jurnal Sistem Informasi, 14(1), 17–27. https://doi.org/10.21609/jsi.v14i1.540

Rakhmawati, N. I. S., Mardliyah, S., Fitri, R., Darni, D., & Laksono, K. (2021). Pengembangan Learning Management System (LMS) di Era Pandemi Covid-19 pada Pendidikan Anak Usia Dini. Jurnal Obsesi?: Jurnal Pendidikan Anak Usia Dini, 6(1), 107–118. https://doi.org/10.31004/obsesi.v6i1.991

Riswandi, Kasim, & Muh. Fajri Raharjo. (2020). Evaluasi Kinerja Web Server Apache menggunakan Protokol HTTP2. Journal of Engineering, Technology, and Applied Science, 2(1), 19–31. https://doi.org/10.36079/lamintang.jetas-0201.92

Susianto, D., & Rachmawati, A. (2018). Implementasi dan Analisis Jaringan Menggunakan Wireshark, Cain and Abels, Network Minner (Studi Kasus: Amik Dian Cipta Cendikia). Jurnal Cendekia, 16(2), 120–125.

Yana, D., & Adam. (2019). Efektivitas Penggunaan Platform LMS sebagai Media Pembelajaran Berbasis Blended Learning terhadap Hasil Belajar Mahasiswa. JURNAL DIMENSI, 8(1), 1–12. https://doi.org/10.33373/dms.v8i1.1816

Downloads

ARTICLE Published HISTORY

Submitted Date: 2022-01-25
Accepted Date: 2022-01-25
Published Date: 2022-01-25

How to Cite

Jaya, I. K. N. A., Dewi, I. A. U., & Mahendra, G. S. (2022). Implementation of Wireshark Application in Data Security Analysis on LMS Website. Journal of Computer Networks, Architecture and High Performance Computing, 4(1), 79-86. https://doi.org/10.47709/cnahpc.v4i1.1345