Design and Develop The Deauthentication Attack Detection System on Wi-Fi Networks Based on Python and TCPDUMP
Keywords:
Design, Python, TCPDUMPAbstract
The purpose of this research is to find out how to design and create a Deauthentication attack detection system using tcpdump and python programming language as the main detection programme for Politeknik Jakarta International. The author uses an experimental research approach with a scientific method used to systematically test the effect of a variable on other variables. This research produces a proof that the material used in this research is a trial both in the form of literature study, as well as the results of direct observation and testing conducted by the author. The deauthentication attack detection system is able to detect deauthentication attacks effectively at Politeknik Jakarta International.
Downloads
References
Mubasyira, M. T., Widiyarto, S., Rizkiyah, N., Setyastanto, A. M., Leksono, A. W., Suprapto,
H. A., ... & Suyana, N. (2025). The Need Analysis for WriteMI Application as Digital Basic Writing Teaching Materials Based on Multiple Intelligences Approach. International Journal on Advanced Science, Engineering & Information Technology, 15(3).
Pressman, & Lourenzo, D. (2021). Analisis Absensi Digital Berbasis Aplikasi Website
Manado : Universitas Negeri Manado.
Stephen, W. (2017). Cryptography and Internet Security: Experiment and Practice
(7th ed.). Colorado US.
S. Nurwenda, B. Irawan, And Irzaman, “Analisis Kelakuan Denial-Of-Service Attack
(Dos Attack) Pada Jaringan Komputer Dengan Pendekatan Pada Level
sekuritas,” 2004.
Sugiyono, “Sistem Keamanan Jaringan Komputer Menggunakan Metode
Watchguard Firebox Pada Pt Guna Karya Indonesia,” Jurnal Cki On Spot,
Vol. 9, No. 1, 2016.
Wajong, A. M. R. (2012). Kerentanan yang Dapat Terjadi di Jaringan Komputer pada
Umumnya. ComTech: Computer, Mathematics and Engineering Applications, 3(1), 474-481. https://doi.org/10.21512/comtech.v3i1.2446
Wibowo, Dega & Wiro Sasmito, Ginanjar. (2020). Rancang Bangun Keamanan Jaringan
Wireless Yang Terintergrasi Dengan Usermanager Menggunakan Mikrotik (Studi Kasus: DIV Teknik Informatika Politeknik Harapan Bersama). JURNAL PILAR TEKNOLOGI Jurnal Ilmiah Ilmu Ilmu Teknik. 5. 10.33319/piltek.v5i2.54.
Widiyarto, S., Sunendar, D., Vernia, D. M., Alifah, S., Suprapto, H. A., & Leksono, A.
W. (2023). Learning Dayak Literature through Information Systems. International Journal on Advanced Science, Engineering & Information Technology, 13(6).
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Lanny Catrin Dale

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.