Network Security Design Using Virtual Private Network (VPN) Method By Utilizing Point To Point Tunneling Protocol (PPTP) Technology On Local Area Network (LAN)

Authors

  • Sony Putra Universitas Pembangunan Panca Budi
  • Muhammad Iqbal Universitas Pembangunan Panca Budi
  • Andysah Putera Utama Siahaan Universitas Pembangunan Panca Budi

Keywords:

Design Network, Mikrotik, Point To Point Tunneling, Protocol, Virtual Private Network

Abstract

Computer networks provide the ability as a communication medium that can accelerate the work process both in terms of time and space. In addition, information technology can facilitate access to information. So that the development of information technology is very influential in all human life. communication that is no longer limited by space and time, one way to build data communication security in the internet network is to use a Virtual Private Network (VPN) network. Virtual Private Network (VPN) technology allows users who are in different locations to access resources in the local network, get the same rights and settings as physically being in the place where the local network is located, Virtual Private Network (VPN) is one of the right answers for network security solutions in the scope of Local Area Network (LAN) to the scope of Wide Area Network (WAN) even. VPN is a way to use a public network as a private network safely via the internet. Along with the increasing use of the Internet, many companies have switched to using the internet as part of their network to save costs.

References

Burhanuddin, Burhanuddin, and Mohammad Badrul. "Penerapan Metode Open Vpn-access Server sebagai Rancangan Jaringan Wide Area Network." Techno Nusa Mandiri 11.2 (2014): 227370.

Putra, Jordy Lasmana, Luthfi Indriyani, and Yeni Angraini. "Penerapan sistem keamanan jaringan menggunakan VPN dengan metode PPTP pada pt. asri pancawarna." IJCIT (Indonesian Journal on Computer and Information Technology) 3.2 (2018).

Umam, Chairul, Emilia Roza, and Irfan Irfan. "Perancangan Jaringan Keamanan Virtual Private Network (VPN) Site to Site." (2016).

Iqbal, Muhammad, and Imam Riadi. "Analysis of security virtual private network (VPN) using openVPN." International Journal of Cyber-Security and Digital Forensics 8.1 (2019): 58-65.

Cheung, Kwok Ho, and J. Mišić. "On virtual private networks security design issues." Computer Networks 38.2 (2002): 165-179.

Akinsanya, Michael Oladipo, Cynthia Chizoba Ekechi, and Chukwuekem David Okeke. "Virtual private networks (vpn): a conceptual review of security protocols and their application in modern networks." Engineering Science & Technology Journal 5.4 (2024): 1452-1472.

Ezra, Paul Joan, et al. "Secured communication using virtual private network (VPN)." Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (2022): 309-319.

Ezra, Paul Joan, et al. "Secured communication using virtual private network (VPN)." Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021 (2022): 309-319.

Scott, Charlie, Paul Wolfe, and Mike Erwin. Virtual private networks. " O'Reilly Media, Inc.", 1999.

Afira, Riandana, Radius Prawiro, and Annisa Izzaty Jamhur. "VIRTUAL PRIVATE NETWORK (VPN) BASED ON IP SECURITY DESIGN ON TOPOLOGY." JOURNAL OF DYNAMICS (International Journal of Dynamics in Engineering and Sciences) 8.2 (2023): 56-59.

Schneier, Bruce, and Mudge. "Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP)." Proceedings of the 5th ACM Conference on Computer and Communications Security. 1998.

Hamzeh, K., et al. "RFC2637: Point-to-Point Tunneling Protocol." (1999).

Putra, Chrystia Aji, Yisti Vita Via, and Wahyu SJ Saputra. "Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing." International Conference on Science and Technology (ICST 2018). Atlantis Press, 2018.

Jahan, Sohely, Md Saifur Rahman, and Sajeeb Saha. "Application specific tunneling protocol selection for Virtual Private Networks." 2017 international conference on networking, systems and security (nsyss). IEEE, 2017.

Oktivasari, Prihatin, and Andri Budhi Utomo. "Analysis Of Virtual Private Network Using Openvpn And Point To Point Tunneling Protocol-Analisa Virtual Private Network Menggunakan Openvpn Dan Point To Point Tunneling Protocol." Jurnal Penelitian Komunikasi dan Opini Publik 20.2 (2016).

Satryawati, Eka, Dwi Agung Pangestu, and Ade Surya Budiman. "Implementasi virtual private networ menggunakan point-to-point tunneling protocol." Jurnal Elektro dan Informatika Swadharma 2.1 (2022): 36-42.

Febrianti, Riana, and Muhamad Ryansyah. "Implementation of virtual private network using point to point tunneling protocol mikrotik router at state fighter vocational school haurgeulis indramayu." Jurnal Mantik 6.3 (2022): 3350-3357.

Arora, Poonam, Prem R. Vemuganti, and Praveen Allani. "Comparison of VPN protocols–IPSec, PPTP, and L2TP." Department of Electrical and Computer Engineering George Mason University, Project Report ECE 646 (2011).

Siadi, Ilham Wahyudi, Iskandar Fitri, and Rini Nuraini. "Tunneling Design with Point to Point Protocol over Ethernet (PPPoE) using Mikrotik RB-941 (Case Study of SMK Taruna Bhakti): Tunneling Design with Point to Point Protocol over Ethernet (PPPoE) using Mikrotik RB-941 (Case Study of SMK Taruna Bhakti)." Jurnal Mantik 4.1 (2020): 238-247.

Raj, T. Mohan, S. Shahul Hammed, and A. Amala Deepan. "Enhancing security measures by tunnelling protocol in distributed grid network." International Journal of Computer Applications 38.1 (2012).

Haya, Aqilla Fadia, et al. "BUILDING A LINUX-BASED VPN SERVER USING POINT TO POINT TUNNELING PROTOCOL (PPTP)." Jurnal ilmiah Sistem Informasi dan Ilmu Komputer 1.2 (2021): 11-17.

Kazemi, Keihan, and Ali Fanian. "Tunneling protocols identification using light packet inspection." 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC). IEEE, 2015.

Audrey, Berby Febriana. "Virtual Private Network Menggunakan Point To Point Tunnel Protocol Berbasis Mikrotik." Journal Of Network And Computer Applications (ISSN: 2964-6669) 1.1 (2022): 1-10.

Schwenk, Jörg. "Point-to-Point Security." Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications. Cham: Springer International Publishing, 2022. 85-97.

Narayan, Shaneel, et al. "Performance analysis of 4to6 and 6to4 transition mechanisms over point to point and IPSec VPN protocols." 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2016.

Downloads

Published

30-11-2024

How to Cite

Sony Putra, Muhammad Iqbal, & Andysah Putera Utama Siahaan. (2024). Network Security Design Using Virtual Private Network (VPN) Method By Utilizing Point To Point Tunneling Protocol (PPTP) Technology On Local Area Network (LAN). International Journal Of Computer Sciences and Mathematics Engineering, 3(2), 50–58. Retrieved from https://ijecom.org/index.php/IJECOM/article/view/96