Perbandingan Protokol PPTP dan SSTP untuk Optimalisasi Jaringan VPN menggunakan metode DMVPN
Abstract
Organizations using Virtual Private Network (VPN) are essential to keep their network connections secure and efficient in the current era of digitalization. this research aims to study and compare two VPN protocols in terms of security, memory usage, and CPU speed of PPTP and SSTP protocols, considering how they improve the security and performance of applications. PPTP networks are known for being easy to use but have a lower level of security, SSTP offers flexibility in communication between nodes with strong encryption using certificates for encryption. The performance, scalability, and security of both protocols were evaluated using the DMVPN method. The results show that SSTP is more effective and secure for organizations with complex network requirements with 10% attack vulnerability accuracy, while PPTP is better for easier use with lower security levels with 70% vulnerability accuracy when used in complex networks. Both protocols can use memory resources with a 30% difference in memory usage where PPTP requires 20% of the total memory used in the client while SSTP requires 50% of the total memory in the client, this can make a reference for companies that will use VPN networks.
References
[2] Sari, Yosi Nofita, Irfan, Dedy, Huda, and Asrul, “Network Security Analysis Using Virtual Private Network in Vocational School,” Jurnal Paedagogy, vol. 9, no. 3, p. 582, Jul. 2022, doi: 10.33394/jp.v9i3.5346.
[3] M. A. Gunawan and S. Wardhana, “Implementasi dan Perbandingan Keamanan PPTP dan L2TP/IPsec VPN (Virtual Private Network),” vol. 6, no. 1.
[4] K. Pruthviraj, “SCALABLE DYNAMIC AND MULTIPOINT VIRTUAL PRIVATE NETWORK USING INTERNET PROTOCOL SECURITY FOR AN ENTERPRISE NETWORK,” 2020.
[5] Claude, Mukatshung, Nawej, and Shengzhi Du, Virtual Private Network’s Impact on Network Performance. IEEE, 2020.
[6] H. M. Marah, J. R. Khalil, A. Elarabi, and M. Ilyas, “DMVPN Network Performance Based on Dynamic Routing Protocols and Basic IPsec Encryption,” Institute of Electrical and Electronics Engineers Inc., Jun. 2021. doi: 10.1109/ICECCE52056.2021.9514142.
[7] P. Venkateswari and T. Purusothaman, “COMPARATIVE STUDY OF PROTOCOLS USED FOR ESTABLISHING VPN,” 2020.
[8] N. Sri, J. Kusuma, G. Sastrawangsa, I. Puritan, and W. Adh, “Rancang Bangun Server Network Attached Storage (NAS) Sebagai Penyimpanan Data Terpusat Studi Kasus SMAN 1 Denpasar.”
[9] Prayogi, Hadi, Febri, and Aulia, “Perancangan Implementasi VPN Server Menggunakan Protokol L2TP dan IPSec Sebagai Keamanan Jaringan,” Jurnal KomtekInfo, pp. 169–175, Aug. 2021, doi: 10.35134/komtekinfo.v8i3.128.
[10] B. Shi, “Computer network information security protection based on virtual private network,” in Journal of Physics: Conference Series, IOP Publishing Ltd, Oct. 2020. doi: 10.1088/1742-6596/1646/1/012121.
[11] T. Ghozali, W. A. Azels, and M. Siregar, “Optimizing Secure Communication in Distributed Corporate Networks through PPTP and IPSec VPN Protocols,” 2022.
[12] Ariyadi and Agung Prabowo, “Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security,” JURNAL INOVTEK POLITEKNIK BENGKULU, vol. 6, no. 1, pp. 2527–9866, 2021.
[13] Jay Bryan, Lawas, Allan, Vivero, and Ankit Sharma, Network Performance Evaluation of VPN Protocols (SSTP and IKEv2), vol. 16. IEEE, 2020.
[14] Babkin and Stroganova, Evaluation and Optimization of Virtual Private Network, vol. 19. IEEE, 2020.
[15] R. Azhar, H. Santoso, and B. Krismono, “PENGARUH IMPLEMENTASI KERNEL BASED VIRTUAL MACHINE PADA SERVER VPS TERHADAP PEMAKAIAN CPU MEMORY DAN HARDDISK,” 2022. [Online]. Available: http://e-journal.stmiklombok.ac.id/index.php/jireISSN.2620-6900
[16] J. Juliansah and Y. Akbar, “OPTIMALISASI KINERJA JARINGAN VPN DENGAN METODE DMVPN,” Jurnal Indonesia : Manajemen Informatika dan Komunikasi, vol. 4, no. 3, pp. 1788–1798, Sep. 2023, doi: 10.35870/jimik.v4i3.412.
[17] Yogi Noviantoro, “Analisa Perbandingan Antar Kualitas Jaringan VPN IP Security Dan ZRTP Pada Voice Over Internet Protocol,” 2022.
[18] D. N. Amadi, A. Budiman, and P. Utomo, “Analysis of the effectiveness of VPN and PPTP Protocol in E-Link Health Report Application Using NDLC Method,” Journal of Information Systems and Informatics, vol. 6, no. 2, pp. 949–958, Jun. 2024, doi: 10.51519/journalisi.v6i2.746.
[19] M. Iqbal and I. Riadi, “Analysis of Security Virtual Private Network (VPN) Using OpenVPN,” 2020.
[20] B. Mohamed, R. Alasem, M. Mansour, and N. Ben Saud, “Comparative Analysis of DMVPN Phase 3 Performance Across Dynamic Routing Protocols,” 2024.
Copyright (c) @Desmber2024 Ade Salman, Alam Rahmatulloh

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.