Design and Implementation of a Captive Portal Login System for Improved Network Security and User Access Management


  • Lisdianto Dwi Kesumahadi * Mail Pamulang University, Banten, Indonesia
  • Nuril Anwar Ahmad Dahlan University, Yogyakarta, Indonesia
  • Feby Charlos Pamulang University, Banten, Indonesia
  • Bagus Setya Pamulang University, Banten, Indonesia
  • (*) Corresponding Author
Keywords: Captive Portal; Login; Network Security; SDLC; Vulnerability Assessment

Abstract

This study addresses network security issues and the suboptimal access time recording mechanism at the Informatics S1 Research Laboratory of Universitas Ahmad Dahlan. The research aims to design a hotspot system based on a Captive Portal, integrated with the existing MikroTik infrastructure, to enhance both security and efficiency. The study follows the Software Development Life Cycle (SDLC) methodology, encompassing the stages of requirements analysis, system design, implementation, testing, as well as operation and maintenance. Additionally, a Vulnerability Assessment is conducted to identify and address potential security weaknesses. The main objectives of this research include improving network security by preventing unauthorized access and data interception, as well as automating and accurately recording network usage duration for each user. The expected contribution of this work is the creation of a centralized authentication system that will optimize laboratory management and improve user experience. Preliminary results indicate a significant increase in network security and an efficient time-tracking mechanism, contributing to a 30% improvement in the lab's operational efficiency.

Downloads

Download data is not yet available.

References

A. Fathoni, A. Hidayat, and M. Mustika, “RANCANG BANGUN JARINGAN HOTSPOT MENGGUNAKAN MIKROTIK PADA SMK KARTIKATAMA 1 METRO,” J. Mhs. Sist. Inf., vol. 2, pp. 127–136, Jan. 2021, doi: 10.24127/jmsi.v2i1.532.

T. Singh and D. R. Chauhan, “A COMPREHENSIVE RESEARCH PAPER ON THE IN-DEPTH ANALYSIS OF WI-FI,” J. Vis. Perform. Arts, vol. 5, no. 3, pp. 212–224, 2024, doi: 10.29121/shodhkosh.v5.i3.2024.174.

N. T. Romadhona and M. Asbari, “Guide about Computer Hardware,” J. Inf. Syst. Manag., vol. 01, no. 06, pp. 58–63, 2022.

M. Hastomo, E. Presdianto, and J. Riwurohi, “Performance Analysis of Intel Core i7-10610U and Intel Core i7-1265U CPUs Using Benchmarking Method: Analisis Performa CPU Intel Core i7-10610U dan Intel Core i7-1265U Menggunakan Metode Benchmarking,” Radiant, vol. 6, pp. 211–221, Aug. 2025, doi: 10.52187/rdt.v6i3.336.

M. Aliyulhaq, A. Ubaidillah, and E. K. Ningrum, “Analisa Kinerja Mikrotik RB 3011 UiAS-RM dan RB 450 Gx4 pada Unmaned Aerial Vehicle,” J. FORTECH, vol. 2, no. 1, pp. 29–34, 2021, doi: 10.32492/fortech.v2i1.255.

D. da S. Rodrigues and D. A. M. José, “Performance Analysis of Ethernet Networks Through Quality of Service (QoS) Metrics Using Real and Virtual Machines,” Rev. Bras. Comput. Apl., vol. 17, no. 2, pp. 64–77, 2025, doi: 10.5335/rbca.v17i2.16481.

J. A. R. Pacheco de Carvalho, C. F. F. P. Ribeiro Pacheco, . A. D. R., and H. Veiga, “Performance Evaluation of IEEE 802.11 ac WPA2 Laboratory Links,” KnE Eng., vol. 2020, pp. 182–194, 2020, doi: 10.18502/keg.v5i6.7033.

T. Nishimura, J. A. Wibowo, T. Gunawan, and M. J. Sajid, “Optimal Position to Place Wi-Fi Range Extender to Improve Its Performance,” Int. Work. Innov. Inf. Commun. Sci. Technol., 2020.

N. A. Hidayah and N. Rofiqoh, “Evaluasi_Software_Visual_Studio_Code_Menggunakan_M,” J. Perangkat Lunak, vol. 6, pp. 382–391, 2024.

R. Fauzi et al., “Instalasi Mikrotik Pada Virtualbox Dan Pengkoneksian Antara Mikrotikdi Virtualbox Dengan Winbox Di Smk S Teruna Padang Sidempuan,” J. ADAM J. Pengabdi. Masy., vol. 2, no. 1, pp. 106–118, 2023, doi: 10.37081/adam.v2i1.1381.

R. Parlika, H. Khariono, H. Ananta Kusuma, M. Risalul Abrori, and M. Ainur Rofik, “Implementasi Akses Mysql dan Web Server Lokal Melalui Jaringan Internet Menggunakan Ngrok,” JIKO (Jurnal Inform. dan Komputer), vol. 3, no. 3, pp. 131–136, 2020, doi: 10.33387/jiko.v3i3.1799.

M. Talluri, “Cross-Browser Compatibility Challenges And Solutions In Enterprise Applications,” Int. J. Environ. Sci., vol. 11, no. 20, pp. 60–65, 2025, doi: 10.64252/6xhqjr48.

N. Kimseng, D. A. Kurnia, I. Vuthy, R. W. Arifin, and D. Setiyadi, “UI / UX Development Using Figma based on Inclusive Design,” J. Inf. Vis., vol. 4, no. 2, pp. 227–234, 2023.

S. Chi, Z. Wang, and X. Liu, “Assessment of Context-Based Chemistry Problem-Solving Skills: Test Design and Results from Ninth-Grade Students,” Res. Sci. Educ., vol. 53, no. 2, pp. 295–318, 2023, doi: 10.1007/s11165-022-10056-8.

R. Atmawijaya and U. Radiyah, “PERANCANGAN AUTENTIKASI MULTI FAKTOR DENGAN PENGENALANWAJAH DAN FIDO (FAST IDENTITY ONLINE),” LPPM Nusa Mandiri, vol. 18, no. 1, pp. 84–92, 2024.

M. Shidqi Rafi, “Implementasi Two-Factor Authentication (2FA) Dengan Aplikasi Authy dalam Sistem Informasi untuk Meningkatkan Keamanan Akses Pengguna,” Univ. Komput. Indones., vol. 1, no. 1, pp. 1–18, 2023, doi: 10.13140/RG.2.2.36550.45125.

R. Ghumatkar and A. Date, “Software Development Life Cycle (SDLC),” Int. J. Res. Appl. Sci. Eng. Technol., vol. 11, pp. 1162–1165, Nov. 2023, doi: 10.22214/ijraset.2023.56554.

A. Souza, “Software Development Life Cycle (SDLC),” 2024, pp. 151–170. doi: 10.1007/979-8-8688-0543-1_6.

R. Raju, “A Literature Survey on System Security and Network Vulnerability Assessment,” INTERANTIONAL J. Sci. Res. Eng. Manag., vol. 08, pp. 1–5, Apr. 2024, doi: 10.55041/IJSREM29695.

D. N. Astrida, A. R. Saputra, and A. I. Assaufi, “Analysis and Evaluation of Wireless Network Security with the Penetration Testing Execution Standard (PTES),” Sinkron, vol. 7, no. 1, pp. 147–154, 2022, doi: 10.33395/sinkron.v7i1.11249.

G. Thiyagarajan, “Enhancing Captive Portal Authentication with Zero-Knowledge Proofs (ZKP),” Int. J. Comput. Appl., vol. 186, no. 48, pp. 43–51, 2024, doi: 10.5120/ijca2024924144.

S. Baby, P. B. Honnavalli, and S. R. S, “Identity & Access Management System Based on Blockchain,” SSRN Electron. J., vol. 8, no. 6, pp. 477–483, 2020, doi: 10.2139/ssrn.3599868.

E. Siswanto, R. A. Kusumajaya, and F. Nining, “p-ISSN : 2808-876X (print) e-ISSN : 2798-1312 (online),” J. Ilm. Manaj. dan Kewirausahaan, vol. 1, no. 1, pp. 17–32, 2021.

W. Jerene and D. Sharma, “The adoption of banking technology and electronic financial services: evidence from selected bank customers in Ethiopia,” Int. J. Electron. Financ., vol. 9, no. 4, pp. 310–328, 2019, doi: 10.1504/IJEF.2019.104080.

V. . & T. A. K. Sharma, “Index Terms-User Interface Study, User Experience Theory, Design Process, Tools for creating user interfaces, and other essentials,” World J. Res. Rev., vol. Volume-12, no. Issue-6, pp. 41–44, 2021.

R. Zulmy Alhamri, K. Eliyen, and A. Heriadi, “Pemanfaatan Api Client Berbasis PythonUntuk Konfigurasi Ips Pada Router Mikrotik,” J. Tek. Ilmu dan Apl., pp. 1–11, 2022.

M. Rozsíval, “Automated Testing of Networked Systems Reliability,” ISSTA 2024 - Proc. 33rd ACM SIGSOFT Int. Symp. Softw. Test. Anal., pp. 1920–1922, 2024, doi: 10.1145/3650212.3685559.

H. Raihan and A. Voutama, “Black box testing on college database applications with equivalence partition techniques [Pengujian black box pada aplikasi database perguruan tinggi dengan teknik equivalence partition],” Antivirus J. Ilm. Tek. Inform., vol. 17, no. 1, pp. 1–18, 2023.

S. Wågbrant and V. D. Radic, “Automated Network Configuration,” 2022.

L. Wang, R. Abbas, F. M. Almansour, G. S. Gaba, R. Alroobaea, and M. Masud, “An empirical study on vulnerability assessment and penetration detection for highly sensitive networks,” J. Intell. Syst., vol. 30, no. 1, pp. 592–603, 2021, doi: 10.1515/jisys-2020-0145.

R. Dastres and M. Soori, “Secure Socket Layer in the Network and Web Security,” Interna-tional J. Comput. Inf. Eng., vol. 14, no. 10, 2020.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Design and Implementation of a Captive Portal Login System for Improved Network Security and User Access Management

Dimensions Badge
Article History
Submitted: 2026-01-01
Published: 2026-01-28
Abstract View: 55 times
PDF Download: 35 times
How to Cite
Kesumahadi, L., Anwar, N., Charlos, F., & Setya, B. (2026). Design and Implementation of a Captive Portal Login System for Improved Network Security and User Access Management. Journal of Information System Research (JOSH), 7(2), 382-393. https://doi.org/10.47065/josh.v7i2.9082
Section
Articles