Wireshark Implementation to Monitor Security on Wifi Indihome

Authors

  • Rizki Ananta Universitas Islam Al-Azhar Author
  • Firmansyah Firmansyah Universitas Islam Al-Azhar Author
  • Muh. Fadli Hasa Universitas Muhammadiyah Sorong Author

DOI:

https://doi.org/10.36679/s4kira.v3i1.29

Keywords:

Wireshark, Network Security, WiFi Monitoring, Indihome , Packet Analysis

Abstract

The increasing use of wireless networks, such as Indihome WiFi, raises significant concerns regarding network security. Cyber threats like data theft, unauthorized access, and malware attacks can compromise user privacy and data integrity. Therefore, monitoring network traffic is essential to detect and mitigate potential security risks. This study explores the implementation of Wireshark, a widely used network protocol analyzer, to monitor security on Indihome WiFi networks. Wireshark enables real-time packet capture and analysis, allowing for the inspection of data traffic, detection of suspicious activities, and identification of vulnerabilities. This research focuses on analyzing network protocols, identifying anomalies such as unauthorized access attempts, and evaluating encryption effectiveness. The methodology involves capturing WiFi packets, filtering data based on protocols (e.g., TCP, UDP, HTTP), and analyzing potential security threats like ARP spoofing or DNS hijacking. The results indicate that Wireshark effectively detects irregular traffic patterns, unencrypted data transmissions, and potential intrusion attempts. However, its effectiveness depends on proper configuration and user expertise in interpreting packet data. The study concludes that Wireshark is a valuable tool for enhancing Indihome WiFi security but should be complemented with other security measures such as firewalls, strong encryption (e.g., WPA3), and regular network audits. Future research could explore automated threat detection integration with Wireshark to improve real-time response capabilities.

References

Z. M. Luthfansa and U. D. Rosiani, “Pemanfaatan Wireshark untuk Sniffing Komunikasi Data Berprotokol HTTP pada Jaringan Internet,” Journal of Information Engineering and Educational Technology, vol. 5, no. 1, 2021, doi: 10.26740/jieet.v5n1.p34-39.

S. Muflih Khaerullah, D. Mustofa, and J. Let Jend Pol Soemarto Purwokerto, “PENGGUNAAN WIRESHARK DALAM PENYADAPAN LALU LINTAS DATA BERPROTOKOL HTTP PADA JARINGAN WI-FI,” 2024.

I. Ubaedila, O. Nurdiawan, Y. A. Wijaya, and J. Sidik, “Layanan Jaringan Menggunakan Metode Sniffing Berbasis Wireshark,” INFORMATICS FOR EDUCATORS AND PROFESSIONALS, vol. 6, no. 1, pp. 95–104, 2021.

R. Hanipah and H. Dhika, “Analisa Pencegahan Aktivitas Ilegal Didalam Jaringan Dengan Wireshark,” DoubleClick: Journal of Computer and Information Technology, vol. 4, no. 1, 2020, doi: 10.25273/doubleclick.v4i1.5668.

M. Katoningati et al., “Analisis Layer Aplikasi (Protokol HTTP) menggunakan Wireshark,” 2021. [Online]. Available: https://ilmukomputer.org/2013/06/02/monitoring-layer-aplikasi-

R. Novita Sari and R. Purnama Sari, “Peramalan Jumlah Pemasangan Wifi Indihome di PT.Telekomunikasi Kandatel Langsa,” JURNAL GAMMA-PI, vol. 3, no. 1, 2021, doi: 10.33059/jgp.v3i1.3687.

A. S. M. IKHSAN, “Implementasi Wireshark Dan Firewall Untuk Mendukung Trafik Keamanan Jaringan,” e-jurnal, vol. 5, no.1, 2025.

F. Rahmadana, Y. A. Dalimunthe, and F. R. Lubis, “PEMANFAATAN METODE TIME SERIES UNTUK MEMPREDIKSI JUMLAH PEMASANGAN BARU WIFI INDIHOME,” Djtechno: Jurnal Teknologi Informasi, vol. 3, no. 1, 2022, doi: 10.46576/djtechno.v3i1.2209.

S. R. Hashim, R. A. Enad, A. M. Al-Khafagi, and N. K. Abdalhameed, “The facilities of detection by using a tool of Wireshark,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, no. 1, 2023, doi: 10.11591/ijeecs.v31.i1.pp329-336.

M. A. Abdillah, A. Yudhana, and A. Fadil, “Sniffing Pada Jaringan WiFi Berbasis Protokol 802.1x Menggunakan Aplikasi Wireshark,” J-SAKTI (Jurnal Sains Komputer dan Informatika), vol. 4, no. 1, 2020, doi: 10.30645/j-sakti.v4i1.181.

“Analysing Network Information and Protocol Using Wireshark,” Advances in Multidisciplinary and scientific Research Journal Publication, vol. 1, no. 1, 2022, doi: 10.22624/aims/crp-bk3-p33.

Dr. B. KalaiSelvi and Aruna. K, “Network Traffic Analysis Using Wireshark,” International Journal of Research Publication and Reviews, vol. 4, no. 12, 2023, doi: 10.55248/gengpi.4.1223.123506.

R. Afzal and R. K. Murugesan, “Implementation of a Malicious Traffic Filter Using Snort and Wireshark as a Proof of Concept to Enhance Mobile Network Security,” Journal of Telecommunications and Information Technology, vol. 2022, no. 1, 2022, doi: 10.26636/jtit.2022.155821.

R. Tri Novita, I. Gunawan, I. Marleni, O. Gregarius Grasia, and M. Nanda Valentika abcde Teknik Elektro Sekolah Tinggi Teknologi Ronggolawe Cepu Penulis Korenspondensi, “Analisis Keamanan Wifi Menggunakan Wireshark,” 2021. [Online]. Available: https://www.researchgate.net/publication/316464159_Analisis_Keama

A. Hussain, A. Hussain, S. Qadri, A. Razzaq, H. Nazir, and M. S. Ullah, “Enhancing LAN Security by Mitigating Credential Threats via HTTP Packet Analysis with Wireshark”, doi: 10.56979/602/2024.

M. Sya’i, I. Gunawan, I. Irawan, P. Poningsih, and R. Dewi, “Sistem Pakar untuk Mendeteksi Kerusakan Jaringan Internet pada Indihome di Pematangsiantar,” Jurnal Ilmu Komputer dan Informatika, vol. 2, no. 1, 2022, doi: 10.54082/jiki.17.

J. Rosalina Tanjung and S. Rahman, “Pengaruh Kualitas Pelayanan, Kualitas Produk Dan Kepercayaan Terhadap Kepuasan Dan Loyalitas Pelanggan Indihome Pt. Telkom Indonesia Pekanbaru,” Jurnal BANSI - Jurnal Bisnis Manajemen Akutansi, vol. 3, no. 1, 2023, doi: 10.58794/bns.v3i1.451.

C. P. Aissyah, A. Hermani, and H. S. Nugraha, “Pengaruh Harga dan Pelayanan terhadap Loyalitas Pelanggan Indihome PT Telkom Indonesia Semarang,” Jurnal Ilmu Administrasi Bisnis, vol. 11, no. 2, 2022, doi: 10.14710/jiab.2022.34675.

R. W. Setiotirin, “Strategi Komunikasi Pemasaran Indihome Melalui Aplikasi Mobile My Indihome (Studi Kasus di Direktorat Konsumer PT. Telekomunikasi Indonesia, Tbk),” Idea : Jurnal Humaniora, 2018, doi: 10.29313/idea.v0i0.4175.

R. Wicaksono, A. A. Nugroho, and R. D. Agustanti, “Perlindungan Hukum Terhadap Konsumen Indihome Ditinjau Dari Undang-Undang Perlindungan Konsumen,” Jurnal Ilmiah Penegakan Hukum, vol. 8, no. 2, 2021, doi: 10.31289/jiph.v8i2.4793.

F. Latief, “DIMENSI RELATIONSHIP MARKETING TERHADAP LOYALITAS PELANGGAN INDIHOME TRIPLE PLAY PT TELKOM,” Bongaya Journal for Research in Management (BJRM), vol. 2, no. 1, 2019, doi: 10.37888/bjrm.v2i1.104.

Downloads

Published

2025-06-03

How to Cite

[1]
Rizki Ananta, F. Firmansyah, and M. F. . Hasa , Trans., “Wireshark Implementation to Monitor Security on Wifi Indihome”, SAKIRA, vol. 3, no. 01, pp. 01–06, Jun. 2025, doi: 10.36679/s4kira.v3i1.29.

Most read articles by the same author(s)