Mekanisme Keamanan Jaringan Menggunakan Protokol Wireguard Pada Jaringan Privat
DOI:
https://doi.org/10.52661/j_ict.v5i2.211Keywords:
VPN, Wireguard, Tunnel, keamanan jaringanAbstract
Keamanan informasi pada komunikasi menjadi kebutuhan utama, sejalan dengan perkembangan teknologi komunikasi. Jaringan privat virtual (VPN) merupakan teknologi yang dianggap mempunyai kemampuan dalam menghubungkan jaringan privat antara perangkat dengan basis keamanan informasi yang baik. Penelitian ini menggunakan salah satu protokol modern VPN yang saat ini masih dikembangkan namun memiliki keamanan dan kinerja yang baik yaitu Wireguard. Topologi uji menggunakan dua jaringan lokal server dan klien terhubung melalui internet. Uji penelitian menunjukkan hasil parameter Qos pada protokol WireGuard masuk dalam kategori baik menurut standar Tiphon dimana nilai delay sebesar 8,18ms, paket loss 0%, throughput sebesar 94,17 Mbit/s dan jitter sebesar 0,29ms pada skenario transfer file. Sehingga keamanan menggunakan protokol WireGuard pada jaringan privat layak dikonfigurasikan.
References
O. Z. Wa, F. A. LM and M. Yamin, "Analisis Perbandingan Performa Qos, Pptp, L2Tp, Sstp Dan IPsec Pada Jaringan Vpn Menggunakan Mikrotik,” semanTIK,," semanTIK : Teknik Informasi, vol. 4, no. 2, pp. 29-35, 2018.
L. Lukman and A. Mukhlishah, "Analisis Perbandingan Kinerja Jaringan Secure Socket Tunneling Protocol (Sstp) Dan Layer Two Tunneling Protocol (L2tp) + Internet Protocol Security (IPsec) Menggunakan Metode Quality Of Service (Qos)," Respati, vol. 15, no. 2, pp. 16-25, 2020.
A. Tamsir and A. P. Muhamad, "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security," Inovtek Polbeng Seri Informatika, vol. 6, no. 1, p. 80, 2021.
N. Dian, S. J. Yohanes and T. Lukas, "Implementasi Keamanan Akses Terhadap Website Menggunakan WireGuard VPN Di Routerboard Mikrotik," JURNAL ILMIAH INFORMATIKA GLOBAL, vol. 13, no. 2, pp. 139-145, 2022.
N. P. H. Phu, N. H. Hoa, B. Q. Bao and H. Trang, "A Comparative Research on VPN Technologies on Operating System for Routers," in 2021 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh City, Vietnam , 2021.
K. Sondre, E. Ali, K. Katina and G. Danilo, "Secure Service Implementation with Slice Isolation and WireGuard," in 2022 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Athens, Greece, 2022.
S. B. Bambang and R. Niki, "ANALISIS QOS (QUALITY OF SERVICE) DENGAN METODE TRAFICK SHAPING PADA JARINGAN INTERNET (STUDY KHASUS : PT. NETCITI PERSADA ALAM SUTERA TANGERANG)," JORAPI : Journal of Research and Publication Innovation, vol. 1, no. 2, pp. 155-161, 2023.
D. Sari, R. Fajar, S. Tika and H. Noer, "Keamanan Jaringan Menggunakan VPN (Virtual Private Network) Dengan Metode PPTP (Point To Point Tunneling Protocol) Pada Kantor Desa Kertaraharja Ciamis," Evolusi: Jurnal Sains dan Manajemen, vol. 8, no. 1, pp. 128-139, 2020.
N. K. Siti and A. U. Liliyani, "Implementasi Failover Pada Jaringan WAN Berbasis VPN," Jurnal Teknik Informatika, vol. 4, no. 1, p. 62–66, 2018.
K. S. Madhuri and M. Jithendranath, "Data Security using Integrated GCN2 Encryption Algorithm," in International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), Bangalore, India , 2020 .
B. Dani and A. W. P. Prasetyo, "Comparison of Implementation Tiny Encryption Algorithm (TEA) and Advanced Encryption Standard (AES) Algorithm on Android Based Open Source Cryptomator Library," in International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Yogyakarta, Indonesia, 2018 .
M. A. Adnan, W. S. Baraa, Q. Z. Diyar and D. Dana, "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol," International Journal of Interactive Mobile Technologies (iJIM), vol. 14, no. 18, p. 157–177, 2020.
P. Maximilian, E. Paul, G. Sebastian and C. Georg, "Performance Analysis of VPN Gateways," in IFIP Networking Conference (Networking), Paris, France, 2020.
O. N. Ridatu and R. Muhamad, "Implementasi Sistem Keamanan Jaringan Menggunakan Firewall Security Port pada Vitaa Multi Oxygen," Jurnal Sistem dan Teknologi Informasi (JustIN), vol. 7, no. 1, p. 52, 2019.
J. Sumardi, T. Ahmad and A. Hasyim, "Implementasi Keamanan Jaringan dengan Packet Filtering Berbasis Mikrotik Untuk Internet Positif Di SMKN 1 Praya," Jurnal Ranah Publik Indonesia Kontemporer (Rapik), vol. 1, no. 2, p. 65–77, 2021.
K. Santosh and R. Sonam, "Survey on Transport Layer Protocols: TCP & UDP," International Journal of Computer Applications, vol. 46, no. 7, pp. 20-25, 2012.
M. Yesi and S. Julidian, "ANALISIS PERBANDINGAN UNJUK KERJA PROTOKOL TCP, UDP, DAN SCTP MENGGUNAKAN SIMULASI LALU LINTAS DATA MULTIMEDIA," Jurnal Media Infotama, vol. 13, no. 2, pp. 73-84, 2017.
I. Irfan, S. Ramdan and F. Farniwati, "Keamanan Jaringan VLAN dan VoIP Menggunakan Firewall," Buletin Sistem Informasi dan Teknologi Islam (BUSITI), vol. 2, no. 1, pp. 27-35, 2021.
S. Irma, L. Lindawati and S. Irma, "Analisa QOS (Quality Of Service) Jaringan Internet Di Teknik Elektro Politeknik Negeri Sriwijaya," IT Journal Research and Development (ITJRD), vol. 3, no. 1, pp. 32 - 42, 2018.
ETSI, "Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); General aspects of Quality of Service (QoS)," 1999. [Online]. Available: http://www.etsi.org.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Bongga Arifwidodo
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.