ANALISIS KEAMANAN JARINGAN WI-FI PUBLIK TERHADAP SERANGAN EVIL TWIN
DOI:
https://doi.org/10.69714/vzqtrw67Keywords:
Public Wi Fi, Evil Twin, Man In The Middle, Penetration Testing, Network SecurityAbstract
Public wireless networks (Wi‑Fi) are widely used in educational institutions, offices, and public areas due to their ease of access and flexibility. However, this convenience is accompanied by significant security risks, particularly Man‑In‑The‑Middle (MITM) attacks using the Evil Twin technique. This attack exploits fake access points that imitate legitimate networks to deceive users into connecting and transmitting sensitive data. This study aims to analyze the characteristics of Evil Twin attacks on public Wi‑Fi networks, evaluate the effectiveness of Deauthentication and Web Phishing techniques, and assess network monitoring tools in detecting traffic anomalies. The research method applied is an experimental approach using penetration testing in a controlled environment. Several tools such as Aircrack‑ng, Hostapd‑WPE, Wireshark, Zui, and Wi‑Fi Analyzer were utilized. The results indicate that Evil Twin attacks are highly effective in intercepting HTTP traffic and potentially compromising HTTPS sessions when users ignore digital certificate warnings. Monitoring based on metadata successfully detects abnormal traffic patterns, while the implementation of a Resilient Certificate Management System (RCMS) significantly improves network security by rejecting unauthorized certificates. This research provides practical recommendations for administrators and users to enhance public Wi‑Fi security.
References
Akhyasi Ulfiah, G. Z. (2025). Eksploitasi dan Pencegahan Serangan Man In The Middle (MITM) Dengan Teknik Evil Twin Pada Jaringan WI-FI Publik. RJTI (Riau Jurnal Teknik Informatika), Vol. 4 No. 2, 316-323.
Daldoul, Y. (2021). A Robust Certificate Management System to Prevent Evil Twin Attacks in IEEE 802.11 Networks. 1-10.
Sharma Priyanka, P. K. (2015). Survey on Evil Twin Attack. International Journal of Scientific Engineering and Research (IJSER) , 23447-3878.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Jurnal Riset Sistem Informasi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.








