Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing
- DOI
- 10.2991/icst-18.2018.220How to use a DOI?
- Keywords
- VPN; point-to-point; sniffing; FTP
- Abstract
PPTP (Point-to-Point Tunneling Protocol) is a network protocol used in the implementation of Virtual Private Networks (VPN). PPTP uses a client-server design that operates at Layer 2 of the OSI model. Network administrators require the existence of performance testing Point to point protocol and VPN network topology; this can be done with the result of simulation of computer networks. This research will discuss about the level of performance and security of PPTP to sniffing in VPN network. Simulations were performed with an average file packet delivery scenario of 500 MB. Graphical Network Simulator-3 (GNS3) is a network software emulator. This allows a combination of virtual and real devices, used to simulate complex networks. The simulation will be done using a VPN network and not using VPN by using GNS3 network simulation tool. Measurement of performance and security analysis is obtained by using Wireshark. The simulation results of the test will produce data to be used in the analysis process. PPTP performance analysis is performed in testing data transfer using FTP protocol when using the VPN network and not using VPN network. Performance parameters measured using Wireshark include throughput and delay. Testing is done by transferring data from the FTP protocol using a VPN network and not using a VPN network. The data transfer test results will get the parameters of output, delay, and data level of confidentiality. The best throughput values give results, data transfers that not use VPN are higher than using a VPN with an average yield of 153 KB and a delay in the network that does not use a VPN that is 0.0032 MS. Data transmission process from both methods shows the security of the FTP protocol, this concludes the security of the PPTP VPN protocol
- Copyright
- © 2018, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Chrystia Aji Putra AU - Yisti Vita Via AU - Wahyu SJ Saputra PY - 2018/12 DA - 2018/12 TI - Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing BT - Proceedings of the International Conference on Science and Technology (ICST 2018) PB - Atlantis Press SP - 1094 EP - 1097 SN - 2589-4943 UR - https://doi.org/10.2991/icst-18.2018.220 DO - 10.2991/icst-18.2018.220 ID - Putra2018/12 ER -