FIRMANSYAH, RIFKI and Heryanto, Ahmad and Hermansyah, Adi (2023) IMPLEMENTASI SECURE SOCKET TUNNELING PROTOCOL (SSTP) UNTUK KEAMANAN DATA PADA JARINGAN KOMPUTER. Diploma thesis, Sriwijaya University.
Text
RAMA_56401_09040581822014.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy |
|
Text
RAMA_56401_09040581822014_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (4MB) | Request a copy |
|
Text
RAMA_56401_09040581822014_0022018703_0030048909_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (1MB) |
|
Text
RAMA_56401_09040581822014_0022018703_0030048909_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (500kB) | Request a copy |
|
Text
RAMA_56401_09040581822014_0022018703_0030048909_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (856kB) | Request a copy |
|
Text
RAMA_56401_09040581822014_0022018703_0030048909_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (755kB) | Request a copy |
|
Text
RAMA_56401_09040581822014_0022018703_0030048909_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (150kB) | Request a copy |
|
Text
RAMA_56401_09040581822014_0022018703_0030048909_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (360kB) | Request a copy |
|
Text
RAMA_56401_09040581822014_0022018703_0030048909_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy |
Abstract
Building a secure socket tunneling protocol method to access port services on the MikroTikrouterboard. Limiting ports that are easy to access remotely on the MikroTikrouterboard. Knowing the steps of the secure socket tunneling protocol Virtual Private Network (VPN) method is one way to protect the exchange of important information data over the internet network, especially by using the Secure Socket Tunneling Protocol (SSTP) protocol method can make communication between multiple networks through a Tunneling through the internet network becomes more secure Using methods of collecting data or information from various sources such as journals, books, the web, and from other related information from this research project entitled implementation of secure socket tunneling protocol (SSTP) for data security on computer networks . The results will show how much speed decrease occurs when the connection passes through the encryption layer. Pingflood measures how an SSTP VPN handles a "pingflood" attack, which is sending a large number of ping requests to a server simultaneously to disrupt a connection. The VPN server can run well under different conditions depending on the speed and number of data packets sent. The implementation of Secure Socket Tunneling Protocol (SSTP) is to optimize the SSTP VPN configuration and MikroTik devices to improve performance. Keywords: secure socket tunneling protocol, Virtual Private Network, Pingflood
Item Type: | Thesis (Diploma) |
---|---|
Uncontrolled Keywords: | Implementasi Secure Socket Tunneling Protocol (SSTP) Untuk Keamanan Data |
Subjects: | T Technology > T Technology (General) > T58.4 Managerial control systems Information technology. Information systems (General) |
Divisions: | 09-Faculty of Computer Science > 56401-Computer Engineering (D3) |
Depositing User: | Rifki Firmansyah |
Date Deposited: | 06 Dec 2023 06:38 |
Last Modified: | 06 Dec 2023 06:38 |
URI: | http://repository.unsri.ac.id/id/eprint/131881 |
Actions (login required)
View Item |