Design and Implementation of a Captive Portal Login System for Improved Network Security and User Access Management
Abstract
This study addresses network security issues and the suboptimal access time recording mechanism at the Informatics S1 Research Laboratory of Universitas Ahmad Dahlan. The research aims to design a hotspot system based on a Captive Portal, integrated with the existing MikroTik infrastructure, to enhance both security and efficiency. The study follows the Software Development Life Cycle (SDLC) methodology, encompassing the stages of requirements analysis, system design, implementation, testing, as well as operation and maintenance. Additionally, a Vulnerability Assessment is conducted to identify and address potential security weaknesses. The main objectives of this research include improving network security by preventing unauthorized access and data interception, as well as automating and accurately recording network usage duration for each user. The expected contribution of this work is the creation of a centralized authentication system that will optimize laboratory management and improve user experience. Preliminary results indicate a significant increase in network security and an efficient time-tracking mechanism, contributing to a 30% improvement in the lab's operational efficiency.
Downloads
References
A. Fathoni, A. Hidayat, and M. Mustika, “RANCANG BANGUN JARINGAN HOTSPOT MENGGUNAKAN MIKROTIK PADA SMK KARTIKATAMA 1 METRO,” J. Mhs. Sist. Inf., vol. 2, pp. 127–136, Jan. 2021, doi: 10.24127/jmsi.v2i1.532.
T. Singh and D. R. Chauhan, “A COMPREHENSIVE RESEARCH PAPER ON THE IN-DEPTH ANALYSIS OF WI-FI,” J. Vis. Perform. Arts, vol. 5, no. 3, pp. 212–224, 2024, doi: 10.29121/shodhkosh.v5.i3.2024.174.
N. T. Romadhona and M. Asbari, “Guide about Computer Hardware,” J. Inf. Syst. Manag., vol. 01, no. 06, pp. 58–63, 2022.
M. Hastomo, E. Presdianto, and J. Riwurohi, “Performance Analysis of Intel Core i7-10610U and Intel Core i7-1265U CPUs Using Benchmarking Method: Analisis Performa CPU Intel Core i7-10610U dan Intel Core i7-1265U Menggunakan Metode Benchmarking,” Radiant, vol. 6, pp. 211–221, Aug. 2025, doi: 10.52187/rdt.v6i3.336.
M. Aliyulhaq, A. Ubaidillah, and E. K. Ningrum, “Analisa Kinerja Mikrotik RB 3011 UiAS-RM dan RB 450 Gx4 pada Unmaned Aerial Vehicle,” J. FORTECH, vol. 2, no. 1, pp. 29–34, 2021, doi: 10.32492/fortech.v2i1.255.
D. da S. Rodrigues and D. A. M. José, “Performance Analysis of Ethernet Networks Through Quality of Service (QoS) Metrics Using Real and Virtual Machines,” Rev. Bras. Comput. Apl., vol. 17, no. 2, pp. 64–77, 2025, doi: 10.5335/rbca.v17i2.16481.
J. A. R. Pacheco de Carvalho, C. F. F. P. Ribeiro Pacheco, . A. D. R., and H. Veiga, “Performance Evaluation of IEEE 802.11 ac WPA2 Laboratory Links,” KnE Eng., vol. 2020, pp. 182–194, 2020, doi: 10.18502/keg.v5i6.7033.
T. Nishimura, J. A. Wibowo, T. Gunawan, and M. J. Sajid, “Optimal Position to Place Wi-Fi Range Extender to Improve Its Performance,” Int. Work. Innov. Inf. Commun. Sci. Technol., 2020.
N. A. Hidayah and N. Rofiqoh, “Evaluasi_Software_Visual_Studio_Code_Menggunakan_M,” J. Perangkat Lunak, vol. 6, pp. 382–391, 2024.
R. Fauzi et al., “Instalasi Mikrotik Pada Virtualbox Dan Pengkoneksian Antara Mikrotikdi Virtualbox Dengan Winbox Di Smk S Teruna Padang Sidempuan,” J. ADAM J. Pengabdi. Masy., vol. 2, no. 1, pp. 106–118, 2023, doi: 10.37081/adam.v2i1.1381.
R. Parlika, H. Khariono, H. Ananta Kusuma, M. Risalul Abrori, and M. Ainur Rofik, “Implementasi Akses Mysql dan Web Server Lokal Melalui Jaringan Internet Menggunakan Ngrok,” JIKO (Jurnal Inform. dan Komputer), vol. 3, no. 3, pp. 131–136, 2020, doi: 10.33387/jiko.v3i3.1799.
M. Talluri, “Cross-Browser Compatibility Challenges And Solutions In Enterprise Applications,” Int. J. Environ. Sci., vol. 11, no. 20, pp. 60–65, 2025, doi: 10.64252/6xhqjr48.
N. Kimseng, D. A. Kurnia, I. Vuthy, R. W. Arifin, and D. Setiyadi, “UI / UX Development Using Figma based on Inclusive Design,” J. Inf. Vis., vol. 4, no. 2, pp. 227–234, 2023.
S. Chi, Z. Wang, and X. Liu, “Assessment of Context-Based Chemistry Problem-Solving Skills: Test Design and Results from Ninth-Grade Students,” Res. Sci. Educ., vol. 53, no. 2, pp. 295–318, 2023, doi: 10.1007/s11165-022-10056-8.
R. Atmawijaya and U. Radiyah, “PERANCANGAN AUTENTIKASI MULTI FAKTOR DENGAN PENGENALANWAJAH DAN FIDO (FAST IDENTITY ONLINE),” LPPM Nusa Mandiri, vol. 18, no. 1, pp. 84–92, 2024.
M. Shidqi Rafi, “Implementasi Two-Factor Authentication (2FA) Dengan Aplikasi Authy dalam Sistem Informasi untuk Meningkatkan Keamanan Akses Pengguna,” Univ. Komput. Indones., vol. 1, no. 1, pp. 1–18, 2023, doi: 10.13140/RG.2.2.36550.45125.
R. Ghumatkar and A. Date, “Software Development Life Cycle (SDLC),” Int. J. Res. Appl. Sci. Eng. Technol., vol. 11, pp. 1162–1165, Nov. 2023, doi: 10.22214/ijraset.2023.56554.
A. Souza, “Software Development Life Cycle (SDLC),” 2024, pp. 151–170. doi: 10.1007/979-8-8688-0543-1_6.
R. Raju, “A Literature Survey on System Security and Network Vulnerability Assessment,” INTERANTIONAL J. Sci. Res. Eng. Manag., vol. 08, pp. 1–5, Apr. 2024, doi: 10.55041/IJSREM29695.
D. N. Astrida, A. R. Saputra, and A. I. Assaufi, “Analysis and Evaluation of Wireless Network Security with the Penetration Testing Execution Standard (PTES),” Sinkron, vol. 7, no. 1, pp. 147–154, 2022, doi: 10.33395/sinkron.v7i1.11249.
G. Thiyagarajan, “Enhancing Captive Portal Authentication with Zero-Knowledge Proofs (ZKP),” Int. J. Comput. Appl., vol. 186, no. 48, pp. 43–51, 2024, doi: 10.5120/ijca2024924144.
S. Baby, P. B. Honnavalli, and S. R. S, “Identity & Access Management System Based on Blockchain,” SSRN Electron. J., vol. 8, no. 6, pp. 477–483, 2020, doi: 10.2139/ssrn.3599868.
E. Siswanto, R. A. Kusumajaya, and F. Nining, “p-ISSN : 2808-876X (print) e-ISSN : 2798-1312 (online),” J. Ilm. Manaj. dan Kewirausahaan, vol. 1, no. 1, pp. 17–32, 2021.
W. Jerene and D. Sharma, “The adoption of banking technology and electronic financial services: evidence from selected bank customers in Ethiopia,” Int. J. Electron. Financ., vol. 9, no. 4, pp. 310–328, 2019, doi: 10.1504/IJEF.2019.104080.
V. . & T. A. K. Sharma, “Index Terms-User Interface Study, User Experience Theory, Design Process, Tools for creating user interfaces, and other essentials,” World J. Res. Rev., vol. Volume-12, no. Issue-6, pp. 41–44, 2021.
R. Zulmy Alhamri, K. Eliyen, and A. Heriadi, “Pemanfaatan Api Client Berbasis PythonUntuk Konfigurasi Ips Pada Router Mikrotik,” J. Tek. Ilmu dan Apl., pp. 1–11, 2022.
M. Rozsíval, “Automated Testing of Networked Systems Reliability,” ISSTA 2024 - Proc. 33rd ACM SIGSOFT Int. Symp. Softw. Test. Anal., pp. 1920–1922, 2024, doi: 10.1145/3650212.3685559.
H. Raihan and A. Voutama, “Black box testing on college database applications with equivalence partition techniques [Pengujian black box pada aplikasi database perguruan tinggi dengan teknik equivalence partition],” Antivirus J. Ilm. Tek. Inform., vol. 17, no. 1, pp. 1–18, 2023.
S. Wågbrant and V. D. Radic, “Automated Network Configuration,” 2022.
L. Wang, R. Abbas, F. M. Almansour, G. S. Gaba, R. Alroobaea, and M. Masud, “An empirical study on vulnerability assessment and penetration detection for highly sensitive networks,” J. Intell. Syst., vol. 30, no. 1, pp. 592–603, 2021, doi: 10.1515/jisys-2020-0145.
R. Dastres and M. Soori, “Secure Socket Layer in the Network and Web Security,” Interna-tional J. Comput. Inf. Eng., vol. 14, no. 10, 2020.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Design and Implementation of a Captive Portal Login System for Improved Network Security and User Access Management
Pages: 382-393
Copyright (c) 2026 Lisdianto Dwi Kesumahadi, Nuril Anwar, Feby Charlos, Bagus Setya

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















