Detection and Analysis of Packet Sniffing Attacks Using Wireshark on Wifi Networks: A Practical Approach to Network Security Case Study of Puskesmas Sungsang
Abstract
In the last two decades, advances in internet technology have significantly influenced various sectors, including healthcare. The integration of information technology into health services has become essential for improving operational efficiency through integrated medical information systems, structured patient management, and digital financial administration. The Sungsang Health Center, as a community-based healthcare facility, relies heavily on networked systems to support daily activities such as patient registration and electronic medical record management, which involve highly sensitive data. This condition increases the risk of data leakage, particularly due to packet sniffing attacks. Therefore, strengthening network security policies is a critical need. This research aims to analyze potential packet sniffing threats and support the prevention of data leaks at the Sungsang Health Center by utilizing Wireshark as a network analysis tool. Wireshark enables detailed monitoring and analysis of data packets to identify suspicious activities that are not easily detected manually. The study provides insights into techniques for detecting and analyzing network vulnerabilities, which can serve as a reference for improving network security policies. The results are expected to support the development of safer and more reliable digital health systems and raise awareness of the importance of protecting patient data.
Downloads
References
Alsharabi, et al. (2023). Detect unusual activity on local networks using Snort and Wireshark tools. Journal of Information Technology Advancement, 14 (4),, 616-624.
Arini, et al. (2023). Wi-Fi Network Security Against Packet Sniffing Attacks Using Firewall Rule (Case Study :Pt.Akurat.Co). Cybersecurity and Digital Forensics E-ISSN: 2615-8442Vol. 6, No. 2, November 2023, pp. 30-38, 30-38.
Cahyawati, et al. (2023). Network Security Design Using the Firewall Security Port Method. In Proceedings of the Amikom Surakarta National Seminar, 203-209.
Cahyawati, R. K. (2023). Network Security Design Using the Firewall Security Port Method. NATIONAL SEMINAR AMIKOM SURAKARTA (SEMNASA) 2023.
D. Wicaksono, ". (2022). Network Security System Firewall Using Firewall with Port Blocking and Firewall Filtering Methods. JATISI (Tek Journal. Inform. Then Sist. Information), vol. 9, no. 2, pp. 1380–1392, 2022, doi: 10.35957/jatisi.V9i2.2103, 1380-1392.
Darmawan, M. A. (2024). NETWORK SECURITY ANALYSIS AGAINST SNIFFING USING WIRESHARK. Just IT : Journal of Information Systems, Information Technology and Computers.
F. N. E. M. , & Sons. (2018). Internet Network Security (Wi-Fi) Analysis of Packet Data Sniffing Attack at the University of Muhammadiyah Palembang. Scientific Journal of Information Technology, 2018.
F. N. Hidayat, et al. (2018). Network security analysis on Internet facilities (Wi-Fi) is free against packet sniffing attacks. Journal of Information Technology, Vol. 1, No. 2, 112-119.
F. N. N. I. Kurniati, ". (2018). Network Security Analysis on Free Internet Facilities (Wi-Fi) Against Packet Sniffing Attacks. Journal of Information Technology, Vol. 1, No. 2, 112–119.
Fauzi, et al. (2018). Wireless network monitoring against packet sniffing attacks using ids. J. Manaj. Inform, 8(2), 7.
Hartomo, K. D. (2007). ANALYSIS OF THE DESIGN OF INTRUSION DETECTION SYSTEM (IDS) SOFTWARE ON COMPUTER NETWORKS BASED ON MOBILE TECHNOLOGY. National Seminar on Systems and Informatics 2007; Bali.
Jain, G. (2021). Applications of Snort and Wireshark in network traffic analysis. In IOP Conference Series: Materials Science And Engineering (Vol. 1119, No. 1, P. 012007) IOP Publishing.
Luthfansa, & et al. (2021). The use of wireshark to sniffing data communication with the HTTP protocol on the internet network. Journal of Information Engineering And Educational Technology) ISSN, 2549, 869X.
Luthfansa, Z. M., & Rosiani, U. D. (2021). The use of wireshark to sniffing data communication with the HTTP protocol on the internet network. Journal of Information Engineering And Educational Technology) ISSN, 2549, 869X.
Mabsali, et al. (2022). The effectiveness of the Wireshark tool for detecting attacks and vulnerabilities in network traffic. in the 1st International Conference on Innovation in Information Technology and Business (ICIITB).
Mulyanto, et al. (2024). Computer network security analysis uses intrusion detection system (IDS) and firewall methods. Digital Transformation Technology.
N. M. M. Listyawati, & Et al. (2022). Implementation and analysis of system profiles on Paloalto Firewall virtualization based on compute resource metrics,". Journal of Computer and Information Systems Vol. 4, No.1.
N. Tamsir. (2023). Information System Security. Bandung: Indie Press.
Novita, et al. (2021). Wifi Security Analysis Using Wireshark. JES ( Journal of Electro Smart ), 1(1), 1–3, 1-3.
O. Rivaldi, & N. L. Marpaung, ". (2023). The Implementation of Network Security Systems Using the Suricata-Based Intrusion Prevention System,. " INOVTEK Polbeng -Seri Inform., Vol. 8, No. 1, 141.
Scott, N. F. (2025). Analysis of the Implementation of the Electronic-Based Government System (SPBE) in Improving the Efficiency of Public Services in Indonesia. Digital Footprint. Multidisciplinary Scientific Journal.
Putra, et al. (2018). The implementation of a network security system using a VPN with the PPTP method at Pt. Asri Pancawarna. IJCIT (Indonesian Journal On Computer And Information Technology), 3(2).
Sugiyono. (2017). Quantitative, Qualitative and R&D Research Methods. Bandung: Alvabeta.
Suherdi, D. (2021). The use of firewalls on the network uses the RB951Ui–2hnd microtik. Journal of Information Systems Technology and TGD Computer Systems, 4(2).
Yuazijah, A., & et al. ( 2024). THE NETWORK MONITORING SYSTEM USES THE QUALITY OF SERVICE (Qos) METHOD WITH THE DUDE SOFTWARE (CASE STUDY: PT. ATLAS LINTAS INDONESIA). JATI (Journal of Informatics Engineering Students), 12137-12142.
Copyright (c) 2025 M. Hajaji Alfarizi, Zulhipni Reno Saputra Elsi, Apriansyah, Karnadi4

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This is an open-access article distributed under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License which permits unrestricted use, distribution, and reproduction in any medium. Users are allowed to read, download, copy, distribute, search, or link to full-text articles in this journal without asking by giving appropriate credit, provide a link to the license, and indicate if changes were made. All of the remix, transform, or build upon the material must distribute the contributions under the same license as the original.












