DOI QR코드

DOI QR Code

Development of Sustainable Home-Network Security Tool

  • Hamid, Erman (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) ;
  • Hasbullah, M. Syafiq E. (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) ;
  • Harum, Norharyati (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) ;
  • Anawar, Syarulnaziah (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) ;
  • Ayop, Zakiah (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) ;
  • Zakaria, Nurul Azma (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) ;
  • Shah, Wahidah Md (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM))
  • Received : 2021.11.05
  • Published : 2021.11.30

Abstract

Home networking and its security issues are directly related. Previous studies have shown that home-network and understanding the security of it is a problem for non-technical users. The existing network management tools or ISP adapter tools are far too technical and difficult to be understood by ordinary home-network users. Its interface is not non-technical user-directed and does not address the home user's needs in securing their network. This paper presents an interactive security monitoring tool, which emphasizes support features for home-network users. The tool combines an interactive visual appearance with a persuasive approach that supports sustainability. It is not only an easy-to-use tool for all categories of home-network users but also acts as a monitoring feature for the user to secure their home-network.

Keywords

Acknowledgement

The authors would like to thank the INSFORNET, Fakulti Teknologi Maklumat dan Komunikasi (FTMK), Universiti Teknikal Malaysia Melaka.

References

  1. R. Yu, X. Zhang, and M. Zhang, "Smart Home Security Analysis System Based on the Internet of Things," in 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2021, 2021, pp. 596-599, doi: 10.1109/ICBAIE52039.2021.9389849.
  2. N. Castelli, C. Ogonowski, T. Jakobi, M. Stein, G. Stevens, and V. Wulf, "What Happened in my Home ?: An End-User Development Approach for Smart Home Data Visualization," in 2017 CHI Conference on Human Factors in Computing Systems, 2017, pp. 853-866.
  3. E. Hamid, M. C. Ang, and A. Jaafar, "A Comparative Study on Visualization Technique for Home Network," in Progress in Intelligent Decision Science, 2021, pp. 71-85.
  4. V. C. Shekar, S. U. Rahman, S. V. B. DB, A. Mateen, and R. A.S, "Enhanced Network Security for IoT based Home Automation System," Int. J. Emerg. Res. Manag. Technol., vol. 6, no. 6, p. 278, 2018, doi: 10.23956/ijermt.v6i6.282.
  5. S. T. Ali, V. Sivaraman, A. Radford, and S. Jha, "A Survey of Securing Networks Using Software Defined Networking," IEEE Trans. Reliab., vol. 64, no. 3, pp. 1086-1097, 2015, doi: 10.1109/TR.2015.2421391.
  6. S. S. I. Samuel, "A review of connectivity challenges in IoT-smart home," in 2016 3rd MEC International Conference on Big Data and Smart City, ICBDSC 2016, 2016, pp. 364-367, doi: 10.1109/ICBDSC.2016.7460395.
  7. A. Crabtree, R. Mortier, T. Rodden, and P. Tolmie, "Unremarkable networking: the home network as a part of everyday life," Proc. Des. Interact. Syst. Conf. ACM., pp. 554-563, 2012, Accessed: Mar. 20, 2014. [Online]. Available: http://dl.acm.org/citation.cfm?id=2318039.
  8. A. Moallem, "Why should home networking be complicated?," in Advances in Usability Evaluation: Part II, CRC Press, 2013, pp. 4169-4178.
  9. R. Mortier et al., "Control and understanding: Owning your home network," 2012 Fourth Int. Conf. Commun. Syst. Networks (COMSNETS 2012), pp. 1-10, Jan. 2012, doi: 10.1109/COMSNETS.2012.6151322.
  10. C. Wilson, T. Hargreaves, and R. Hauxwell-Baldwin, "Benefits and risks of smart home technologies," Energy Policy, vol. 103, no. January, pp. 72-83, 2017, doi: 10.1016/j.enpol.2016.12.047.
  11. G. Conti and K. Abdullah, "Passive visual fingerprinting of network attack tools," in VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, 2004, pp. 45-54, doi: 10.1145/1029208.1029216.
  12. J. L. Chen and K. C. Yen, "Transparent bridging support for bluetooth-IP service interworking," Int. J. Netw. Manag., vol. 12, no. 6, pp. 379-386, 2002, doi: 10.1002/nem.454.
  13. E. Anthi, S. Ahmad, O. Rana, G. Theodorakopoulos, and P. Burnap, "EclipseIoT: A secure and adaptive hub for the Internet of Things," Comput. Secur., vol. 78, pp. 477-490, 2018, doi: 10.1016/j.cose.2018.07.016.
  14. W. Rahman, P. T. Nguyen, M. Rusliyadi, E. Laxmi Lydia, and K. Shankar, "Network monitoring tools and techniques uses in the network traffic management system," Int. J. Recent Technol. Eng., vol. 8, no. 2 Special Issue 11, pp. 4182-4188, 2019, doi: 10.35940/ijrte.B1603.0982S1119.
  15. A. Rahman, K. R. Kawshik, A. A. Sourav, and A.-A. Gaji, "Advanced Network Scanning," Am. J. Eng. Res., no. 5, pp. 38-42, 2016, [Online]. Available: www.ajer.org.
  16. W. Da Chen and Z. X. Lin, "A Prototype Development of the Smart Mousetrap System Equipped with LoRa," 2018, doi: 10.1109/ICCE-China.2018.8448569.
  17. S. Ibnu Hunais, M. Yamin, "Penerapan Keamanan Jaringan Menggunakan Metode Host Based IDPS WLAN dan LAM Berbasis Web dan SMS Gateway," J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 1, p. 97, 2020. https://doi.org/10.32736/sisfokom.v9i1.770
  18. M. A. Doshi and P. Sharma, "Digital Forensics Analysis for Network Related Data," Int. Res. J. Eng. Technol., vol. 7, no. 4, pp. 1390-1398, 2020.
  19. D. Avasthi, "Network Forensic Analysis with Efficient Preservation for SYN Attack.," Int. J. Comput. Appl., vol. 46, no. 24, pp. 17-22, 2012, [Online]. Available: http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:Network+Forensic+Analysis+with+Efficient+Preservation+for+SYN+Attack#0.
  20. C. Science, S. Madden, T. Supervisor, and A. Smith, "iNav: A Hybrid Approach to WiFi Localization and," 2008.
  21. M. R. Kurniawan and L. O. Sari, "Analisis Sistem Keamanan Wireless Local Area Network (Wlan) Pada Proses Tethering," Jom FTEKNIK, vol. 5, no. 2, pp. 1-7, 2018.
  22. E. Nasr, M. Jalloul, J. Bachalaany, and R. Maalouly, "Wi-Fi Network Vulnerability Analysis and Risk Assessment in Lebanon," MATEC Web Conf., vol. 281, p. 05002, 2019, doi: 10.1051/matecconf/201928105002.
  23. M. Akbar, "Perancangan Software Ids Snort Untuk Pendeteksian Serangan Interruption (Netcut) Pada Jaringan Wireless," J. INSTEK (Informatika Sains dan Teknol., vol. 3, no. 1, pp. 121-129, 2018, doi: 10.24252/instek.v3i1.5007.
  24. J. A. Yani, N. Palembang, and S. Selatan, "Evaluasi Penerapan Autentikasi Pengguna Wireless LAN Berbasis Radius Server Universitas Bina Darma," J. Mhs. Tek. Inform., no. 12, 2014.
  25. M. Mongiovi, P. Bogdanov, R. Ranca, E. E. Papalexakisy, C. Faloutsos, and A. K. Singh, "NetSpot: Spotting significant anomalous regions on dynamic networks," in Proceedings of the 2013 SIAM International Conference on Data Mining, SDM 2013, 2013, pp. 28-36, doi: 10.1137/1.9781611972832.4.
  26. Z. Ali, F. Naz, Javed, M. Qurban, M. Yasir, and S. Jehangir, "Analysis of VoIP over wired & wireless network with implementation of QoS CBWFQ & 802.11e," Int. J. Comput. Netw. Inf. Secur., vol. 12, no. 1, pp. 43-39, 2020, doi: 10.5815/ijcnis.2020.01.05.
  27. N. A. Fadzil and N. Jaafar, "Sikap Pelajar Sekolah Menengah Arab Jabatan Agama Islam Melaka Terhadap Pembelajaran Bahasa Arab," e-Prosiding PASAK 4. 24-25 April 2019, vol. 4, no. April, pp. 191-202, 2019.
  28. A. Almaarif and S. Yazid, "ARP Cache Poisoning sebagai Teknik Alternatif untuk Membatasi Penggunaan Bandwidth berbasis Waktu," J. Rekayasa Sist. Ind., vol. 5, pp. 108-113, 2018, doi: 10.25124/jrsi.v6i1.367.
  29. J. Hong, A. Levy, L. Riliskis, and P. Levis, "Don't talk unless i say so! securing the internet of things with default-off networking," in Proceedings - ACM/IEEE International Conference on Internet of Things Design and Implementation, IoTDI 2018, 2018, pp. 117-128, doi: 10.1109/IoTDI.2018.00021.
  30. T. Al-Kadi, Z. Al-Tuwaijri, and A. Al-Omran, "Arduino Wi-Fi network analyzer," in Procedia Computer Science, 2013, vol. 21, pp. 522-529, doi: 10.1016/j.procs.2013.09.073.
  31. A. Setiawan and A. I. Purnamasari, "Pengembangan Smart Home Dengan Microcontrollers ESP32 Dan MC-38 Door Magnetic Switch Sensor Berbasis Internet of Things (IoT) Untuk Meningkatkan Deteksi Dini Keamanan Perumahan," J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 3, no. 3, pp. 451-457, 2019, doi: 10.29207/resti.v3i3.1238.
  32. R. C. Joshi and E. S. Pilli, "Network Forensic Tools," in Fundamentals of Network Forensics., 2016, pp. 71-93.
  33. D. Gajjar and A. Prajapati, "EasyChair Preprint Working of Offline Cloud Storage Using FTP , RDP and RPC with Router," Am. J. Eng. Res., vol. 5, no. 6, pp. 38-42, 2020.
  34. V. Ndatinya, Z. Xiao, V. R. Manepalli, K. Meng, and Y. Xiao, "Network forensics analysis using Wireshark," Int. J. Secur. Networks, vol. 10, no. 2, pp. 91-106, 2015, doi: 10.1504/IJSN.2015.070421.
  35. I. P. A. E. Pratama and P. A. Dharmesta, "Implementasi Wireshark Dalam Melakukan Pemantauan Protocol Jaringan ( Studi Kasus : Intranet Jurusan Teknologi Informasi Universitas Udayana )," Mantik Penusa, vol. 3, no. 1, pp. 94-99, 2019.
  36. D. E. Goncharov, S. V. Zareshin, R. V. Bulychev, and D. S. Silnov, "Vulnerability analysis of the Wifi spots using WPS by modified scanner vistumbler," in Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018, vol. 2018-Janua, pp. 48-51, doi: 10.1109/EIConRus.2018.8317027.
  37. S. A. Soomro, H. Casakin, and G. V. Georgiev, "Sustainable design and prototyping using digital fabrication tools for education," Sustain., vol. 13, no. 3, pp. 1-17, 2021, doi: 10.3390/su13031196.
  38. B. Camburn et al., "Design prototyping methods: State of the art in strategies, techniques, and guidelines," Des. Sci., vol. 3, 2017, doi: 10.1017/dsj.2017.10.
  39. E. Hamid, N. Bahaman, A. Jaafar, A. M. Choo, and A. A. Malek, "Development of home network sustainable interface tools," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 2, pp. 72-76, 2019, doi: 10.14569/ijacsa.2019.0100210.
  40. N. binti Harum, N. A. Zakaria, N. A. Emran, Z. Ayop, and S. Anawar, "Smart book reader for visual impairment person using IoT device," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 2, pp. 251-255, 2019, doi: 10.14569/ijacsa.2019.0100233.