Analisis Kelemahan Fitur Cloud pada Access Point Berbasis Cloud
Main Article Content
Abstract
Article Summary
This study aims to identify and analyze vulnerabilities of Cloud features in Access Points through an experimental approach. Cloud features in Access Points include network resource management, storage, data processing, and internet-based device management services used to monitor device traffic, update firmware, and perform centralized configuration. The research began with the design of Access Point configurations, followed by a simulation of a Man-in-the-Middle (MITM) attack using the SSL Strip method. Testing was conducted using a Ruijie Reyee RG-EW1200 Access Point with the support of Bettercap software on the Kali Linux operating system and a Windows virtual machine. The research process involved identifying Cloud features of the device, collecting technical documentation, executing SSL Strip attack simulations, and analyzing discovered vulnerabilities. Experimental results revealed specific vulnerabilities in the Cloud security system of the Access Point, including data leakage of Password, SSID, IP, Serial Number, Network Name, Device Type, Firmware Version, MAC Address, Forward Mode, Access Point Status, and Port Status, which were then analyzed to provide mitigation recommendations. These findings are expected to serve as a reference for enhancing security of Cloud features in network devices, particularly centralized management-based Access Points.
Keywords
Article Keywords
Downloads
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-BY 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Adzimi, S. N., Alfasih, H. A., Ramadhan, F. N. G., Neyman, S. N., & Setiawan, A. (2022). Implementasi konfigurasi firewall dan sistem deteksi intrusi menggunakan Debian. Public Journal of Information System Engineering, 1(4), 1-10. https://doi.org/10.47134/pjise.v1i4.2681
Dharmawan, N., Indriyanta, G., & Senapartha, I. K. D. (2022). Analisis Keamanan Jaringan Universitas Kristen Duta Wacana Dengan Serangan Ssl/Tls. Jurnal Terapan Teknologi Informasi, 6(2), 121-130. https://doi.org/10.21460/jutei.2022.62.214
Dirgantara, R. R. C., & Suartana, I. M. (2020). Implementasi ARP watch dengan pfSense untuk mekanisme pengamanan access point. Jurnal Manajemen Informatika, 10(1), 63-72.
Faizi, M. A., & Christanto, F. W. (2024). Manajemen Perangkat Jaringan Access Point Menggunakan UniFi Controller di Jaringan Kampus. JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia), 9(2), 67-76. https://doi.org/10.32528/justindo.v9i2.1471
Husein, & Gunawan, D. (2023). Penerapan Metode SNMP (Simple Network Management Protocol) dalam Optimalisasi Kinerja Jaringan Komputer Studi Kasus pada IDN Boarding School. Jurnal Indonesia : Manajemen Informatika Dan Komunikasi, 4(3), 1814-1821. https://doi.org/10.35870/jimik.v4i3.410
Hae, Y. (2021). Analisis Keamanan Jaringan Pada Web Dari Serangan Sniffing Dengan Metode Eksperimen. JATISI (Jurnal Teknik Informatika dan Sistem Informasi), 8(4), 2095-2105. https://doi.org/10.35957/jatisi.v8i4.1196
Mallu, S., Andisana, I. P. G. S., Chyan, P., Rizki, F., Smrti, N. N. E., Syamsuddin, S., ... & Yahya, K. (2024). Sistem Operasi: Konsep Dasar dan Penerapan Modern. Penerbit Mifandi Mandiri Digital, 1(01).
Martani, A. K., Munandar, A. H., & Gusman, M. A. (2023). Implementasi Global Positioning System (GPS) pada kendaraan menggunakan Mikrotik Lt AP Mini. Jurnal Sistem Komputer, 8(2), 1-16. https://doi.org/10.59134/jsk.v8i2.532
Wibowo, S. H., Irawan, J. D., Wahyuddin, S., Winardi, B., Santoso, L. W., Safrizal, Yuniansyah, Dewantara, R., Jamaludin, Nurhadi, Sihombing, F. A., Aulia, A. P., Heryana, N., & Kurnaedi, D. (2022). Cyber crime di era digital. PT. Global Eksekutif Teknologi. https://www.academia.edu/94200419/CYBER_CRIME_DI_ERA_DIGITAL#page=28