IMPLEMENTASI SECURE SOCKET TUNNELING PROTOCOL (SSTP) UNTUK KEAMANAN DATA PADA JARINGAN KOMPUTER

FIRMANSYAH, RIFKI and Heryanto, Ahmad and Hermansyah, Adi (2023) IMPLEMENTASI SECURE SOCKET TUNNELING PROTOCOL (SSTP) UNTUK KEAMANAN DATA PADA JARINGAN KOMPUTER. Diploma thesis, Sriwijaya University.

[thumbnail of RAMA_56401_09040581822014.pdf] Text
RAMA_56401_09040581822014.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_56401_09040581822014_TURNITIN.pdf] Text
RAMA_56401_09040581822014_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4MB) | Request a copy
[thumbnail of RAMA_56401_09040581822014_0022018703_0030048909_01_front_ref.pdf] Text
RAMA_56401_09040581822014_0022018703_0030048909_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (1MB)
[thumbnail of RAMA_56401_09040581822014_0022018703_0030048909_02.pdf] Text
RAMA_56401_09040581822014_0022018703_0030048909_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (500kB) | Request a copy
[thumbnail of RAMA_56401_09040581822014_0022018703_0030048909_03.pdf] Text
RAMA_56401_09040581822014_0022018703_0030048909_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (856kB) | Request a copy
[thumbnail of RAMA_56401_09040581822014_0022018703_0030048909_04.pdf] Text
RAMA_56401_09040581822014_0022018703_0030048909_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (755kB) | Request a copy
[thumbnail of RAMA_56401_09040581822014_0022018703_0030048909_05.pdf] Text
RAMA_56401_09040581822014_0022018703_0030048909_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (150kB) | Request a copy
[thumbnail of RAMA_56401_09040581822014_0022018703_0030048909_06_ref.pdf] Text
RAMA_56401_09040581822014_0022018703_0030048909_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (360kB) | Request a copy
[thumbnail of RAMA_56401_09040581822014_0022018703_0030048909_07_lamp.pdf] Text
RAMA_56401_09040581822014_0022018703_0030048909_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy

Abstract

Building a secure socket tunneling protocol method to access port services on the MikroTikrouterboard. Limiting ports that are easy to access remotely on the MikroTikrouterboard. Knowing the steps of the secure socket tunneling protocol Virtual Private Network (VPN) method is one way to protect the exchange of important information data over the internet network, especially by using the Secure Socket Tunneling Protocol (SSTP) protocol method can make communication between multiple networks through a Tunneling through the internet network becomes more secure Using methods of collecting data or information from various sources such as journals, books, the web, and from other related information from this research project entitled implementation of secure socket tunneling protocol (SSTP) for data security on computer networks . The results will show how much speed decrease occurs when the connection passes through the encryption layer. Pingflood measures how an SSTP VPN handles a "pingflood" attack, which is sending a large number of ping requests to a server simultaneously to disrupt a connection. The VPN server can run well under different conditions depending on the speed and number of data packets sent. The implementation of Secure Socket Tunneling Protocol (SSTP) is to optimize the SSTP VPN configuration and MikroTik devices to improve performance. Keywords: secure socket tunneling protocol, Virtual Private Network, Pingflood

Item Type: Thesis (Diploma)
Uncontrolled Keywords: Implementasi Secure Socket Tunneling Protocol (SSTP) Untuk Keamanan Data
Subjects: T Technology > T Technology (General) > T58.4 Managerial control systems Information technology. Information systems (General)
Divisions: 09-Faculty of Computer Science > 56401-Computer Engineering (D3)
Depositing User: Rifki Firmansyah
Date Deposited: 06 Dec 2023 06:38
Last Modified: 06 Dec 2023 06:38
URI: http://repository.unsri.ac.id/id/eprint/131881

Actions (login required)

View Item View Item