EVALUATION OF TWO-FACTOR AUTHENTICATION METHOD IN IMPROVING AUTHENTICATION SECURITY ON SSL VPN (Case Study of PT. Kanmo Group)

Authors

  • Muhamad Akbar Prasetyo teknik informatika, UHAMKA
  • Nur Chalik Azhar
(*) Corresponding Author

DOI:

https://doi.org/10.34288/jri.v7i3.367

Keywords:

SSL VPN, two-factor authentication (2FA), network security, remote access, PT. Kanmo Group, data security, VPN

Abstract

The increasing use of remote access in corporate environments through Virtual Private Networks (VPNs) requires additional security measures to protect corporate data and systems from cyber threats. In Indonesia, several data leakage cases involving large companies have revealed vulnerabilities in existing security systems, highlighting the importance of stronger data protection. At PT Kanmo Group, the VPN used is still vulnerable to security threats such as brute force attacks and credential theft, because it has not implemented 2FA in increasing its security. To overcome this problem, this research aims to improve SSL VPN security by implementing 2FA as an additional layer in the user authentication process. The research methodology includes problem identification, literature study, implementation, and simulation of system testing using an experimental approach. The results showed that the implementation of 2FA significantly improved VPN access security, reduced the risk of credential leakage, and provided a basis for recommendations for companies in strengthening their security systems. This research is expected to be a reference for the development of a more reliable remote access security system in the corporate environment.

Downloads

Download data is not yet available.

References

Affandi, M. (2022). IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) OPEN VPN DENGAN KEAMANAN SERTIFIKAT SSL PADA NETWORK ATTACHED STORAGE (NAS) FREENAS. Jurnal Impresi Indonesia (JII), 1(12). https://doi.org/https://doi.org/10.58344/jii.v1i12.748

Afifi Al-Atsari, H., & Suharjo, I. (2023). Integrasi Server On-Premise dengan Server Cloud Menggunakan Cloud VPN dan Mikrotik Ipsec Untuk Peningkatan Keamanan Koneksi. Jurnal Syntax Admiration, 4(11), 1977–1996. https://doi.org/10.46799/jsa.v4i11.757

Badeges, W., & Fauzi, M. N. (2023). IMPLEMENTASI MULTI FACTOR AUTHENTICATION PADA PHPMYADMIN. Jurnal Tiple A Pendidikan Teknologi Informasi Dan Teknologi Informasi, 2(1). https://jurnal.umj.ac.id/index.php/TripleA/article/view/17517

Cahyaningrum, Y. (2024). Evaluation of System Access Security in The Implementation of Multi-Factor Authentication (MFA) in Educational Institutions. Journal of Practical Computer Science, 4(1). https://doi.org/https://doi.org/10.37366/jpcs.v4i1.4451

Efendi, R., Wahyono, T., & Widiasari, I. R. (2024). Uji kerentanan keamanan pada aplikasi berbasis web menggunakan metode Vulnerability Assessment. AITI: Jurnal Teknologi Informasi, 21(Maret), 44–57. https://doi.org/https://doi.org/10.24246/aiti.v21i1.44-57

Kurniawan, D. E., Iqbal, M., Friadi, J., Hidayat, F., & Permatasari, R. D. (2021). Login Security Using One Time Password (OTP) Application with Encryption Algorithm Performance. Journal of Physics: Conference Series, 1783(1). https://doi.org/10.1088/1742-6596/1783/1/012041

Laksono, I. A., & Alamin, M. M. (2025). IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) BERBASIS MIKROTIK MENGGUNAKAN METODE PPTP PADA JARINGAN INTERNET DI FAKULTAS ILMU KOMPUTER UNUSIDA. Jurnal Mahasiswa Teknik Informatika), 9(3). https://doi.org/https://doi.org/10.36040/jati.v9i3.13582

Noorshalih, P., Septiana, R., Nurul, I., & Afrianto, I. (2024). IMPLEMENTASI DUA FACTOR AUTHENTICATION DAN MONITORING TRANSACTION PADA APLIKASI PEMESANAN JASA FOTOGRAFI DAN VIDEOGRAFI DI PRIMAPICTURES. INFOKOM : Journal of Information and Technology, 17(1), 52–57. https://jurnal.stikompoltekcirebon.ac.id/index.php/file_jurnal/article/view/112

Nurhasanah, S., & Harahap, A. A. (2022). EVALUASI TINGKAT KESIAPAN PENGGUNA SISTEM SINGLE SIGN ON PADA PORTAL UNIVERSITAS ALMA ATA MENGGUNAKAN METODE TECHNOLOGY READINESS INDEX (TRI). Indonesian Journal of Business Intelligence (IJUBI), 5(1), 1. https://doi.org/10.21927/ijubi.v5i1.2126

Nuryati, N., Lasambouw, C. M., Djatnika, D., Meilinda, L. L., Agoes, F., Sholahuddin, M. R., & Harika, M. (2022). Two Factor Authentication Sistem Inventarisasi Barang dan Manajemen Dana Bantuan Operasional Sekolah Dinas Pendidikan Nasional. Building of Informatics, Technology and Science (BITS), 4(2). https://doi.org/10.47065/bits.v4i2.2297

Pariddudin, A., & Syawaludin, M. (2021). Penerapan Algoritma Rivest Shamir Adleman Untuk Meningkatkan Keamanan Virtual Private Network. Jurnal Ilmiah Teknologi - Informasi & Sains, 11, 73–84. https://doi.org/10.36350/jbs.v11i2

Pongoh, D. S., Eksan, S., Pairunan, T., & Manado, P. N. (2023). Analisis Keamanan Perangkat Lunak Terhadap Serangan Melalui Jaringan WiFi Publik. Jurnal Komputasi Terdistribusi, 6(4). https://oaj.jurnalhst.com/index.php/jkt/article/view/2813

Pratama, F., & Putra, P. (2022). PENGEMBANGAN SISTEM PRESENSI UNTUK WORK FROM HOME (WFH) DAN WORK FROM OFFICE (WFO) SELAMA PANDEMI COVID-19. Jurnal Sains, Nalar, Dan Aplikasi Teknologi Informasi, 1(2). https://doi.org/10.20885/snati.v1i2.9

Prayogi Wicaksana, Hadi, F., & Aulia Fitrul Hadi. (2021). Perancangan Implementasi VPN Server Menggunakan Protokol L2TP dan IPSec Sebagai Keamanan Jaringan. Jurnal KomtekInfo, 169–175. https://doi.org/10.35134/komtekinfo.v8i3.128

Raka Herdiantoro, H., Reza Redo Islami, M., Informatika, T., Dharma Wacana Metro Jl Kenanga No, S., Metro Bar, K., & Metro, K. (2023). IMPLEMENTASI TWO-FACTOR AUTHENTICATION (2FA) DAN FIREWALL POLICIES DALAM MENGAMANKAN WEBSITE. 4(1), 1–9. https://doi.org/https://doi.org/10.24127/ilmukomputer.v4i1.3300

Shadowserver Foundation. (2022). Honeypot Brute Force Events Report. https://www.shadowserver.org/wp-content/uploads/2022/06/Honeypot_Brute_Force_Events_March_2022.pdf

Syahputri, N. I., Harahap, H., Siregar, R., & Tommy, T. (2023). Penyuluhan Pentingnya Two Factor Authentication dan Aplikasinya Di Era Keamanan Digital. Jurnal Pengabdian Masyarakat Bangsa, 1(6), 768–773. https://doi.org/https://doi.org/10.59837/jpmba.v1i6.256

Tahir, M., Hariyanto, H., Firdausi, M. I., Saim, S., Nuriyah, N., & Maimunah, M. (2024). Peningkatan Keamanan Jaringan LAN dan WLAN Melalui Standard Acces Control List. Digital Transformation Technology, 4(1), 607–614. https://doi.org/10.47709/digitech.v4i1.4261

Tiara Pramesti Wulandari, Novaldi Ramdani Reza, Errisa Zulqa Deswana, Muhammad Rifqi Adillah, & Didik Aribowo. (2024). Penerapan VPN Dalam Topologi Star Untuk Keamanan Pengiriman Data. Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi, 2(2), 63–70. https://doi.org/10.61132/neptunus.v2i2.93

Wijoyo, A., Rosadi, A., Hanafi, M., & Sidik, R. (2023). Keamanan Jaringan Melindungi Sistem dari Serangan Luar. https://jurnalmahasiswa.com/index.php/jriin/article/view/407

Yeboah-Boateng, E. O., & Kwabena-Adade, G. D. (2020). Remote Access Communications Security: Analysis of User Authentication Roles in Organizations. Journal of Information Security, 11(03), 161–175. https://doi.org/10.4236/jis.2020.113011

Downloads

Published

2025-06-12

How to Cite

Akbar Prasetyo, M., & Chalik Azhar, N. (2025). EVALUATION OF TWO-FACTOR AUTHENTICATION METHOD IN IMPROVING AUTHENTICATION SECURITY ON SSL VPN (Case Study of PT. Kanmo Group). Jurnal Riset Informatika, 7(3), 186–191. https://doi.org/10.34288/jri.v7i3.367

Issue

Section

Articles