PENERAPAN VPN WIREGUARD UNTUK KEAMANAN SERVER JARINGAN SAHABAT NET DARI SNIFFING ATTACK
DOI:
https://doi.org/10.31849/8p3wpx64Keywords:
VPN, Wireguard, Sniffing, Enkripsi, MikrotikAbstract
Dalam era digital yang terus berkembang, kebutuhan akan sistem keamanan jaringan yang andal menjadi sangat penting, khususnya bagi penyedia layanan internet seperti Sahabat Net. Penelitian ini bertujuan meningkatkan keamanan jaringan dengan menerapkan protokol Virtual Private Network (VPN) WireGuard pada infrastruktur Sahabat Net yang sebelumnya rentan terhadap serangan sniffing. Metode yang digunakan adalah kualitatif deskriptif melalui observasi, wawancara, studi literatur, dan pengujian jaringan sebelum dan sesudah penerapan VPN. Pengujian awal menunjukkan bahwa jaringan tanpa enkripsi memungkinkan pencurian data sensitif pengguna melalui sniffing menggunakan Ettercap dan Wireshark. Setelah implementasi WireGuard VPN pada router Mikrotik, konfigurasi dan pengujian ulang membuktikan bahwa lalu lintas jaringan berhasil dienkripsi dan tidak lagi dapat diakses pihak ketiga. Hasil penelitian menunjukkan peningkatan signifikan dalam keamanan jaringan. Kesimpulannya, penerapan WireGuard VPN efektif dalam mencegah penyadapan data serta menjaga kerahasiaan dan integritas komunikasi jaringan di lingkungan Sahabat Net
References
[1] S. Bumbungan, “PERAN DAN PERKEMBANGAN JARINGAN INTERNET DALAM MENDUKUNG TRANSFORMASI DIGITAL GLOBAL,” Bulletin of Network Engineer and Informatics, vol. 3, no. 1, p. 11, Apr. 2025, doi: 10.59688/bufnets.v3i1.66.
[2] S. Scherrer, S. Tabaeiaghdaei, and A. Perrig, “Quality Competition Among Internet Service Providers,” Aug. 2023, [Online]. Available: http://arxiv.org/abs/2305.06811
[3] M. Jufri, “PENINGKATAN KEAMANAN JARINGAN WIRELESS DENGAN MENERAPKAN SECURITY POLICY PADA FIREWALL,” JOISIE Journal Of Information System And Informatics Engineering, vol. 5, no. Desember, pp. 98–108, 2021.
[4] A. Imran and A. Rustianto, “ANALISIS DAN IMPLEMENTASI INTERKONEKSI JARINGAN KOMPUTER BERBASIS VPNL2TP IPSEC PADA SMK TKJ DI DEPOK ,” Jurnal Informatika Terpadu , vol. 7, no. 1, pp. 33–38, Mar. 2021.
[5] H. Jumakhan and A. Mirzaeinia, “Wireguard: An Efficient Solution for Securing IoT Device Connectivity,” Feb. 2024, [Online]. Available: http://arxiv.org/abs/2402.02093
[6] Zuhe Liu, “Application and Security Analysis of Virtual Private Network (VPN) in Network Communication,” Academic Journal of Computing & Information Science, vol. 6, no. 11, 2023, doi: 10.25236/ajcis.2023.061108.
[7] I. K. Rahman and L. N. Harnaningrum, “Analisa Quality of Service (QoS) Pada Jaringan L2TP IPSec Dan Wireguard VPN untuk mengamankan VoIP,” JURNAL RESISTOR, vol. 3, no. 1, pp. 10–20, 2020, [Online]. Available: https://s.id/jurnalresistor
[8] Bongga Arifwidodo, “Mekanisme Keamanan Jaringan Menggunakan Protokol Wireguard Pada Jaringan Privat,” Journal of Informatics and Communication Technology , vol. 5, no. 2, pp. 78–86, Dec. 2023, doi: https://doi.org/10.52661/j_ict.v5i2.211.
[9] R. Hermawan and Y. M. Saputra, “Analisis Perbandingan Penggunaan Metode Tunneling Cloud Virtual Private Network dan WireGuard Virtual Private Network pada Implementasi Infrastruktur Hybrid Cloud,” Journal of Internet and Software Engineering, vol. 6, no. 1, 2025.
[10] T. S. Ali, I. Santoso, A. S. Quiko, G. Santoso, U. Teknologi, and M. Jakarta, “JAREKOM: Jurnal Jaringan dan Rekayasa Komputer Pengaruh Virtual Private Network (VPN) Terhadap Keamanan dan Performa Akses Jaringan,” Jun. 2025, doi: 10.9020/jarekom.v1i1.
[11] L. O. Sari and H. Helena, “Implementasi Virtual Private Network MenggunakanLayer 2 Tunneling Protocol Berbasis Mikrotik,” MALCOM: Indonesian Journal of Machine Learning and Computer Science, vol. 4, no. 4, pp. 1496–1504, Sep. 2024, doi: 10.57152/malcom.v4i4.1651.
[12] R. Elsya Putra et al., “MENGAMANKAN SERANGAN PACKET SNIFFING PADA JARINGAN KOMPUTER MENGGUNAKAN VPN TUNNEL,” Jurnal Sains Manajemen Informatika dan Komputer, vol. 22, no. 2, pp. 340–347, 2023, doi: https://doi.org/10.53513/jis.v22i2.7438.
[13] Ade Frihadi, “PERANCANGAN INTERKONEKSI JARINGAN MENGGUNAKAN VPN BERBASIS INTERNET DENGAN IMPLEMENTASI IPV6,” Jurnal Ekselenta, vol. 1, no. 1, 2024.
[14] D. Novianto, Y. S. Japriadi, and L. Tommy, “Implementasi Keamanan Akses Terhadap Website Menggunakan Wireguard VPN Di Routerboard Mikrotik,” Jurnal Ilmiah Informatika Global, vol. 13, no. 2, Aug. 2022, doi: 10.36982/jiig.v13i2.2308.
[15] J. Literasiologi Literasi Kita Indonesia, T. Wulandari, D. Purnama Sari, and A. Rahmi Nasution, “Deskripsi Mendalam untuk Memastikan Keteralihan Temuan Penelitian Kualitatif,” Jurnal Literasiologi, vol. 11, no. 2, 2023, doi: 10.47783/literasiologi.v9i4.
[16] Tamsir Ariyadi, “Analisis Keamanan Jaringan Wifi Mahasiswa UBD Dari Serangan Packet Sniffing,” Jurnal Ilmiah Informatika, vol. 12, no. 1, 2024, doi: https://doi.org/10.33884/jif.v12i01.8739.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 ZONAsi: Jurnal Sistem Informasi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
CC BY-SA 4.0
Attribution-ShareAlike 4.0
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
