scholarly journals Implementasi System Captive Portal Dengan Otentikasi RADIUS

2020 ◽  
Vol 12 (1) ◽  
pp. 49
Author(s):  
Fandi Ali Mustika ◽  
Febryo Ponco Sulistyo ◽  
Chairul Anhar Tanof

Abstract The rapid development of Internet networks in offices, industries, homes, and universities, transforming the conventional system into modern, especially with the Internet. Therefore, it is very important to use a good authentication method to avoid unauthorized user access. Wireless network without authentication can harm users in their activities using Internet access. One of the most effective ways for secure wireless network authentication with Captive portals with Radius authentication method. Captive portals are web pages that control Hyper Text Transfer Protocol (HTTP) browser access to the Internet. The user who is in authentication is their MAC address. Radius is a service that authenticates and authorizes users to network and network infrastructure. This paper will discuss how to use RADIUS authentication with captive portals to manage user authentication on wireless networks. Built-in security mechanism in Wifi 802.11.x equipment to control who can associate to an Access Point (AP). The use of captive portal so that the AP works without configuration settings, so it does not burden the work of the AP itself.Keywords: Captive Portal, Radius, Authentication, Wireless Network Abstrak Perkembangan jaringan internet yang semakin pesat di kantor, industri, rumah, dan universitas, mengubah sistem konvensional menjadi modern, terutama dengan adanya internet. Oleh karena itu, sangat penting untuk menggunakan metode otentikasi yang baik untuk menghindari akses pengguna yang tidak sah. Wireless network tanpa otentikasi dapat membahayakan pengguna dalam aktivitas mereka dalam menggunakan akses internet. Salah satu cara yang paling efektif untuk otentikasi wireless network yang aman dengan Captive Portal dengan metode otentikasi Radius. Captive portal adalah halaman web yang mengkontrol Hyper Text Transfer Protocol (HTTP) akses browser ke internet. Pengguna yang di otentikasi adalah MAC address mereka. Radius adalah layanan yang mengotentikasi dan mengotorisasi pengguna ke jaringan dan infrastruktur jaringan. Mekanisme keamanan built-in di peralatan Wifi 802.11.x untuk mengontrol siapa saja yang dapat berasosiasi ke Access Point (AP). Penggunaan captive portal agar AP bekerja tanpa seting konfigurasi, sehingga tidak membebani kerja dari AP itu sendiri.Kata Kunci: Captive Portal, Radius, Otentikasi, Wireless Network

2020 ◽  
Vol 2 (1) ◽  
pp. 17-24
Author(s):  
Muchamad Rusdan ◽  
Muhamad Sabar

Wireless networks are one of the best alternatives in building practical and flexible computer networks that have high mobility. Most of them use wireless networks to support existing cable networks, but on wireless networks, they still use cable media as a backbone of the access point, which supports communication users can access the internet and find information. The problem of using cables as backbone media can be a significant challenge in places that are difficult to reach by wires. Wireless networks provide convenience and convenience that is high enough to use. As long as they are in an area that is supported by a wireless network, users can access the internet at any time. To make the wireless network connected to the internet safe and easy to use, we can create a user authentication system based on Multi-Factor Authentication (MFA) that can be used to authenticate and authorize. In general, each user can use existing wireless network services by verifying users based on Wifi Protected Access 2 Pre-Shared Key (WPA2-PSK). The purpose of this research is to develop a wireless network that uses Multi-Factor Authentication (MFA) based user authentication to be able to connect to the wireless network to increase security and provide the use of existing wireless networks. The research method used in this study uses descriptive qualitative research methods, with data collection using literature study and observation techniques. After analysis and design, it can be concluded that user authentication is based on Multi-factor Authentication (MFA) in a safe and user-friendly manner that can determine the users who are allowed and not allowed to use wireless networks.


Author(s):  
Meenakshi Suresh ◽  
P. P. Amritha ◽  
Ashok Kumar Mohan ◽  
V. Anil Kumar

In the current world scenario where everyone is using the Internet, it is becoming a strenuous task to preserve security. Furthermore the world is becoming progressively digital by the passing of each minute.Alarge portion of the Internet is conducted using the Hyper Text Transfer Protocol (HTTP). But in 2015, it underwent a consequential enhancement and was released as HTTP/2. HTTP/2 includes pipelining, response multiplexing, server push and header compression using HPACKbesides the properties of HTTP/1.1. These properties make it difficult for the eavesdroppers to monitor or fingerprint a website running on HTTP/2. This paper deals with the research on how strong the HTTP/2 protocol keeps the user information hidden and secure. By monitoring a live network traffic, its properties with HTTP/2 is assessed. This study helps understand the different aspects of the protocol and its influence on the network and browsers.  


2018 ◽  
Vol 17 ◽  
pp. 01013
Author(s):  
Dapeng Huangfu ◽  
Xiaoping Tian ◽  
Xingjian Wang ◽  
Ping Chen

With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.


2015 ◽  
Vol 764-765 ◽  
pp. 900-904
Author(s):  
Yu Hsiang Hsneh ◽  
Fu Hau Hsu ◽  
Shih Jen Chen ◽  
Yao Hsin Chen ◽  
Yan Ling Hwang ◽  
...  

An evil twin is a kind of rogue Wi-Fi access point (AP) which has the same SSID name to the legitimate one and is set up by an adversary. The user who associates to the evil twin, adversary may eaves-drops sensitive data on wireless communications to the Internet. Most of existing detection solutions are administrator-based, which is used by wireless network administrator to verify whether a given AP is in an authorized list or not. Such administrator-based solutions are limited, hardly maintained, and difficult to protect users timely when the attack is launched. Hence, we propose a client-based detection by operating the wireless network interface controller (WNIC) in monitor mode and capturing the Internet packets. Through analyzing the captured packets, client users can easily and precisely detect the evil twin attack even in a complicated AP scenario as well as avoid any threat arisen from connecting to an AP. Our method does not need to know any authorized AP list, and does not rely on data training or machine learning technique of target wireless network. Finally, we implemented a detecting system on Windows 7, which is widely used nowadays.


2014 ◽  
Vol 543-547 ◽  
pp. 3441-3444
Author(s):  
Ying Li Wang ◽  
Zhi Jiang Xu ◽  
Si Si Li

The rapid development of 3 g mobile internet technology and the extensive use of intelligent mobile phone system make a user access the Internet not only can through a computer which has networking conditions, but also can through the mobile phone whenever and wherever. This paper designed and developed the method of accessing to the Web server based on the Android platform, it provides a quick and convenient way for the developers.


Micromachines ◽  
2021 ◽  
Vol 12 (12) ◽  
pp. 1455
Author(s):  
Qiongfeng Shi ◽  
Huicong Liu

In recent years, we have witnessed the revolutionary innovation and flourishing advancement of the Internet of things (IoT), which will maintain a strong momentum even more with the gradual rollout of the fifth generation (5G) wireless network and the rapid development of personal healthcare electronics [...]


2019 ◽  
Vol 1 (1) ◽  
pp. 32
Author(s):  
Tri Rochmadi

Cybercrime continues to increase and innovate along with the rapid development of internet and more easily accessible everywhere. Most business organizations have used the internet for its operations so that the use of browsers is a necessity to support work. So that the browser also adjusts to improve security on the user's side so that information accessed by users cannot be known by other users. Browzar is a browser that answers these challenges, where Browzar can run without having to be installed on the computer and automatically deletes information generated by the use of the browser itself. However, these advantages become a challenge for investigators because these advantages can be exploited by cybercriminals to eliminate, minimize existing digital evidence. This study intends to analyze and find digital evidence in criminal cases using Browzar with Live Forensic. Digital evidence is obtained using dumpit for data acquisition and forensic volatility memory and winhex to analyze data and information on RAM. Results of the study were able to obtain information that could be used for digital evidence on Browzar web browser, namely URL history, account used log in, namely username and password, timestamp, that is, the user access time to a web page.


Author(s):  
Firmansyah Firmansyah ◽  
Rachmat Adi Purnama ◽  
Rachmawati Darma Astuti

The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login


2000 ◽  
Vol 39 (01) ◽  
pp. 70-72 ◽  
Author(s):  
H. Singer ◽  
M. Yakami ◽  
T. Takahashi ◽  
A. Alkhateeb

Abstract:The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.


Sign in / Sign up

Export Citation Format

Share Document