RANCANGAN VIRTUAL PRIVATE NETWORK PADA KANTOR PROLOV MENGGUNAKAN ZEROTIER
DOI:
https://doi.org/10.31000/jika.v8i1.9979Abstrak
Pentingnya menjaga keamanan data di era digitalisasi saat ini dapat dihubungkan langsung dengan ancaman yang dihadapi dari pihak-pihak yang tidak bertanggung jawab, seperti hacker. Serangan siber, seperti Man in The Middle (MiTM) dan Distributed Denial of Service (DDoS), menjadi potensi serius yang dapat mencuri informasi serta merusak kinerja server. MiTM, sebagai contoh, merupakan tindakan siber yang bertujuan untuk mencuri data dan memantau aktivitas korban dengan memanfaatkan koneksi internet yang tidak aman. Kantor Prolov, dalam menjalankan operasionalnya, turut menggunakan jaringan internet, namun demikian, hal ini membawa risiko serangan karena berbagi jaringan dengan pengguna internet umum ketika mengakses Virtual Private Server admin. Untuk mengatasi risiko tersebut, diperlukan implementasi Virtual Private Network (VPN) guna memperkuat keamanan data. Sebagai solusi, digunakanlah Zerotier sebagai platform yang terbuka dan terenkripsi. Penelitian ini bertujuan untuk merancang kebijakan keamanan yang jelas dan efektif. Setelah penerapan Zerotier, hasilnya menunjukkan bahwa Zerotier dapat berfungsi sebagai VPN yang bersifat open-source dan memiliki lapisan enkripsi. Penelitian ini berhasil meningkatkan efektivitas keamanan jaringan di Kantor Prolov, terutama karena Zerotier dapat dipantau dan dikontrol oleh administrator, memberikan kemudahan dalam manajemen jaringan.
Referensi
AdhiSantoso, N., Maulidin, Z., DwiKurniawan, R., & YMI Tegal, S. (2022). Analisis Jaringan Komputer Menggunakan Teknologi Virtualisasi. Jurnal MinfoPolgan, 11(2).
Almurayh, A. (n.d.). Virtual Private Server.
Andini, M. D., Amirulloh, M., &NoviantyMuchtar, H. (2020). Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) dalam Mengakses Situs Terblokir (Vol. 29, Issue 2). https://ditsti.itb.ac.id/layanan-vpn/
Ariyadi, T. (2018). Mitigasi Keamanan Dynamic Host Control Protocl (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN).3(2).
DadiRiskiono, S. (2019). Analisis dan Desain Jalur Transmisi Jaringan Alternatif Menggunakan Virtual Private Networks (VPN). In Jurnal TEKNOINFO (Vol. 13, Issue 2).
Dewi, S., Riyadi, F., Suwastitaratu, T., & Hikmah, N. (2020). Keamanan Jaringan Menggunakan VPN (Virtual Private Network) Dengan Metode PPTP (Point To Point Tunneling Protocol) Pada Kantor Desa Kertaraharja Ciamis. JurnalSains Dan Manajemen, 8(1).
Fitriawati, N., Herdiansah, A., Taufiq, R., & Destriana, R. (2022). IT Disaster Recovery Plan Dalam Mendukung Continuity Plan Saat Terjadi Force Majure. JIKA (Jurnal Informatika), 6(3), 249–255. https://doi.org/10.31000/jika.v6i3.6320
Hartono, S. B., &Niam, M. A. (2020). Client Server Sistem Informasi Aktivitas Penjualan UKM Partner Cloth (Vol. 19, Issue 2).
http://ejournal.upi.edu/index.php/manajerial/
Hasibuan, M., &EkoSuharyanto, C. (2021). Implementasi dan Perancangan VOIP Server Menggunakan Trixbox Opensource dan VPN Sebagai Pengamanan Antar Client. In Jurnal COMASIE.
Latifah, F. (n.d.). Implementasi Virtual Private Network (VPN) dengan Otentikasi Server pada PT. Anugerah Tunggal Mandiri Jakarta (Vol. 1).
http://www.mysecurecyberspace.com/encycl
Mujiastuti, R., &Prasetyo, I. (2021). Membangun Sistem Keamanan Jaringan Berbasis VPN yang Terintegrasi dengan DNS Filtering PIHOLE. www.google.com
Musril, H. A. (2019). Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF). InfoTekJar (Jurnal Nasional Informatika Dan TeknologiJaringan), 3(2), 83–88. https://doi.org/10.30743/infotekjar.v3i2.1055
Phang, V., &Setyaningsih, E. (n.d.).Perancangan Virtual Private Network DenganProtokol PPTP Menggunakan MikroTik Untuk Kebutuhan Remote Access. Jurnal POLEKTRO: Jurnal Power Elektronik, 10(2), 2021.
Putra, T. G. S., &Widiasari, I. R. (2022).Rancangan Virtual Private Server Pada Kantor Kelurahan Menggunakan ZeroTier. Building of Informatics, Technology and Science (BITS), 4(2), 352–360. https://doi.org/10.47065/bits.v4i2.1810
Prolov. (2023). About Us Prolov. Retrieved Mei 19, 2023, from Prolov Website: https://prolov.co.id/
Ruslianto, I., & Ristian, U. (2019). Perancangan dan Implementasi Virtual Private Network (VPN) Menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Mikrotik di Fakultas MIPA Universitas Tanjungpura (Vol. 4, Issue 1).
Syarif1, R. F., &Sobari, I. A. (n.d.). Implementasi Virtual Private Network (VPN) menggunakan Metode PPTP pada PT. Sinar Quality Internusa.
Umaroh, L., &Rifauddin, M. (2020). Implementasi Virtual Private Network (VPN) di Perpustakaan Universitas Islam Malang. Jurnal Dokumentasi dan Informasi. 41(2), 193. https://doi.org/10.14203/j.baca.v41i2.531
Wahyudi, M., &AdiPurnama, R. (2019).Analisis Performa Site to Site IP Security Virtual Private Network (VPN) Menggunakan Algoritma Enkripsi ISAKMP (Performance Analysis Site to Site IP Security Virtual Private Network (VPN) with Algorithm Encryption. ISAKMP. Vol. 7, Issue 2
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Advances in Intelligent Informatics agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Licensing for Data Publication
International Journal of Advances in Intelligent Informatics use a variety of waivers and licenses, that are specifically designed for and appropriate for the treatment of data:
Open Data Commons Attribution License, http://www.opendatacommons.org/licenses/by/1.0/ (default)
Creative Commons CC-Zero Waiver, http://creativecommons.org/publicdomain/zero/1.0/
Open Data Commons Public Domain Dedication and Licence, http://www.opendatacommons.org/licenses/pddl/1-0/
Other data publishing licenses may be allowed as exceptions (subject to approval by the editor on a case-by-case basis) and should be justified with a written statement from the author, which will be published with the article.
Open Data and Software Publishing and Sharing
The journal strives to maximize the replicability of the research published in it. Authors are thus required to share all data, code or protocols underlying the research reported in their articles. Exceptions are permitted but have to be justified in a written public statement accompanying the article.
Datasets and software should be deposited and permanently archived inappropriate, trusted, general, or domain-specific repositories (please consult http://service.re3data.org and/or software repositories such as GitHub, GitLab, Bioinformatics.org, or equivalent). The associated persistent identifiers (e.g. DOI, or others) of the dataset(s) must be included in the data or software resources section of the article. Reference(s) to datasets and software should also be included in the reference list of the article with DOIs (where available). Where no domain-specific data repository exists, authors should deposit their datasets in a general repository such as ZENODO, Dryad, Dataverse, or others.
Small data may also be published as data files or packages supplementary to a research article, however, the authors should prefer in all cases a deposition in data repositories.