Proceedings of the International Conference on Science and Technology (ICST 2018)

Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing

Authors
Chrystia Aji Putra, Yisti Vita Via, Wahyu SJ Saputra
Corresponding Author
Chrystia Aji Putra
Available Online December 2018.
DOI
https://doi.org/10.2991/icst-18.2018.220How to use a DOI?
Keywords
VPN; point-to-point; sniffing; FTP
Abstract

PPTP (Point-to-Point Tunneling Protocol) is a network protocol used in the implementation of Virtual Private Networks (VPN). PPTP uses a client-server design that operates at Layer 2 of the OSI model. Network administrators require the existence of performance testing Point to point protocol and VPN network topology; this can be done with the result of simulation of computer networks. This research will discuss about the level of performance and security of PPTP to sniffing in VPN network. Simulations were performed with an average file packet delivery scenario of 500 MB. Graphical Network Simulator-3 (GNS3) is a network software emulator. This allows a combination of virtual and real devices, used to simulate complex networks. The simulation will be done using a VPN network and not using VPN by using GNS3 network simulation tool. Measurement of performance and security analysis is obtained by using Wireshark. The simulation results of the test will produce data to be used in the analysis process. PPTP performance analysis is performed in testing data transfer using FTP protocol when using the VPN network and not using VPN network. Performance parameters measured using Wireshark include throughput and delay. Testing is done by transferring data from the FTP protocol using a VPN network and not using a VPN network. The data transfer test results will get the parameters of output, delay, and data level of confidentiality. The best throughput values give results, data transfers that not use VPN are higher than using a VPN with an average yield of 153 KB and a delay in the network that does not use a VPN that is 0.0032 MS. Data transmission process from both methods shows the security of the FTP protocol, this concludes the security of the PPTP VPN protocol

Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the International Conference on Science and Technology (ICST 2018)
Series
Atlantis Highlights in Engineering
Publication Date
December 2018
ISBN
978-94-6252-650-1
ISSN
2589-4943
DOI
https://doi.org/10.2991/icst-18.2018.220How to use a DOI?
Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Chrystia Aji Putra
AU  - Yisti Vita Via
AU  - Wahyu SJ Saputra
PY  - 2018/12
DA  - 2018/12
TI  - Point to Point Protocol Tunneling VPN Simulation and Analysis on Sniffing
BT  - Proceedings of the International Conference on Science and Technology (ICST 2018)
PB  - Atlantis Press
SP  - 1094
EP  - 1097
SN  - 2589-4943
UR  - https://doi.org/10.2991/icst-18.2018.220
DO  - https://doi.org/10.2991/icst-18.2018.220
ID  - Putra2018/12
ER  -