EVALUATION OF TWO-FACTOR AUTHENTICATION METHOD IN IMPROVING AUTHENTICATION SECURITY ON SSL VPN (Case Study of PT. Kanmo Group)
DOI:
https://doi.org/10.34288/jri.v7i3.367Keywords:
SSL VPN, two-factor authentication (2FA), network security, remote access, PT. Kanmo Group, data security, VPNAbstract
The increasing use of remote access in corporate environments through Virtual Private Networks (VPNs) requires additional security measures to protect corporate data and systems from cyber threats. In Indonesia, several data leakage cases involving large companies have revealed vulnerabilities in existing security systems, highlighting the importance of stronger data protection. At PT Kanmo Group, the VPN used is still vulnerable to security threats such as brute force attacks and credential theft, because it has not implemented 2FA in increasing its security. To overcome this problem, this research aims to improve SSL VPN security by implementing 2FA as an additional layer in the user authentication process. The research methodology includes problem identification, literature study, implementation, and simulation of system testing using an experimental approach. The results showed that the implementation of 2FA significantly improved VPN access security, reduced the risk of credential leakage, and provided a basis for recommendations for companies in strengthening their security systems. This research is expected to be a reference for the development of a more reliable remote access security system in the corporate environment.
Downloads
References
Affandi, M. (2022). IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) OPEN VPN DENGAN KEAMANAN SERTIFIKAT SSL PADA NETWORK ATTACHED STORAGE (NAS) FREENAS. Jurnal Impresi Indonesia (JII), 1(12). https://doi.org/https://doi.org/10.58344/jii.v1i12.748
Afifi Al-Atsari, H., & Suharjo, I. (2023). Integrasi Server On-Premise dengan Server Cloud Menggunakan Cloud VPN dan Mikrotik Ipsec Untuk Peningkatan Keamanan Koneksi. Jurnal Syntax Admiration, 4(11), 1977–1996. https://doi.org/10.46799/jsa.v4i11.757
Badeges, W., & Fauzi, M. N. (2023). IMPLEMENTASI MULTI FACTOR AUTHENTICATION PADA PHPMYADMIN. Jurnal Tiple A Pendidikan Teknologi Informasi Dan Teknologi Informasi, 2(1). https://jurnal.umj.ac.id/index.php/TripleA/article/view/17517
Cahyaningrum, Y. (2024). Evaluation of System Access Security in The Implementation of Multi-Factor Authentication (MFA) in Educational Institutions. Journal of Practical Computer Science, 4(1). https://doi.org/https://doi.org/10.37366/jpcs.v4i1.4451
Efendi, R., Wahyono, T., & Widiasari, I. R. (2024). Uji kerentanan keamanan pada aplikasi berbasis web menggunakan metode Vulnerability Assessment. AITI: Jurnal Teknologi Informasi, 21(Maret), 44–57. https://doi.org/https://doi.org/10.24246/aiti.v21i1.44-57
Kurniawan, D. E., Iqbal, M., Friadi, J., Hidayat, F., & Permatasari, R. D. (2021). Login Security Using One Time Password (OTP) Application with Encryption Algorithm Performance. Journal of Physics: Conference Series, 1783(1). https://doi.org/10.1088/1742-6596/1783/1/012041
Laksono, I. A., & Alamin, M. M. (2025). IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) BERBASIS MIKROTIK MENGGUNAKAN METODE PPTP PADA JARINGAN INTERNET DI FAKULTAS ILMU KOMPUTER UNUSIDA. Jurnal Mahasiswa Teknik Informatika), 9(3). https://doi.org/https://doi.org/10.36040/jati.v9i3.13582
Noorshalih, P., Septiana, R., Nurul, I., & Afrianto, I. (2024). IMPLEMENTASI DUA FACTOR AUTHENTICATION DAN MONITORING TRANSACTION PADA APLIKASI PEMESANAN JASA FOTOGRAFI DAN VIDEOGRAFI DI PRIMAPICTURES. INFOKOM : Journal of Information and Technology, 17(1), 52–57. https://jurnal.stikompoltekcirebon.ac.id/index.php/file_jurnal/article/view/112
Nurhasanah, S., & Harahap, A. A. (2022). EVALUASI TINGKAT KESIAPAN PENGGUNA SISTEM SINGLE SIGN ON PADA PORTAL UNIVERSITAS ALMA ATA MENGGUNAKAN METODE TECHNOLOGY READINESS INDEX (TRI). Indonesian Journal of Business Intelligence (IJUBI), 5(1), 1. https://doi.org/10.21927/ijubi.v5i1.2126
Nuryati, N., Lasambouw, C. M., Djatnika, D., Meilinda, L. L., Agoes, F., Sholahuddin, M. R., & Harika, M. (2022). Two Factor Authentication Sistem Inventarisasi Barang dan Manajemen Dana Bantuan Operasional Sekolah Dinas Pendidikan Nasional. Building of Informatics, Technology and Science (BITS), 4(2). https://doi.org/10.47065/bits.v4i2.2297
Pariddudin, A., & Syawaludin, M. (2021). Penerapan Algoritma Rivest Shamir Adleman Untuk Meningkatkan Keamanan Virtual Private Network. Jurnal Ilmiah Teknologi - Informasi & Sains, 11, 73–84. https://doi.org/10.36350/jbs.v11i2
Pongoh, D. S., Eksan, S., Pairunan, T., & Manado, P. N. (2023). Analisis Keamanan Perangkat Lunak Terhadap Serangan Melalui Jaringan WiFi Publik. Jurnal Komputasi Terdistribusi, 6(4). https://oaj.jurnalhst.com/index.php/jkt/article/view/2813
Pratama, F., & Putra, P. (2022). PENGEMBANGAN SISTEM PRESENSI UNTUK WORK FROM HOME (WFH) DAN WORK FROM OFFICE (WFO) SELAMA PANDEMI COVID-19. Jurnal Sains, Nalar, Dan Aplikasi Teknologi Informasi, 1(2). https://doi.org/10.20885/snati.v1i2.9
Prayogi Wicaksana, Hadi, F., & Aulia Fitrul Hadi. (2021). Perancangan Implementasi VPN Server Menggunakan Protokol L2TP dan IPSec Sebagai Keamanan Jaringan. Jurnal KomtekInfo, 169–175. https://doi.org/10.35134/komtekinfo.v8i3.128
Raka Herdiantoro, H., Reza Redo Islami, M., Informatika, T., Dharma Wacana Metro Jl Kenanga No, S., Metro Bar, K., & Metro, K. (2023). IMPLEMENTASI TWO-FACTOR AUTHENTICATION (2FA) DAN FIREWALL POLICIES DALAM MENGAMANKAN WEBSITE. 4(1), 1–9. https://doi.org/https://doi.org/10.24127/ilmukomputer.v4i1.3300
Shadowserver Foundation. (2022). Honeypot Brute Force Events Report. https://www.shadowserver.org/wp-content/uploads/2022/06/Honeypot_Brute_Force_Events_March_2022.pdf
Syahputri, N. I., Harahap, H., Siregar, R., & Tommy, T. (2023). Penyuluhan Pentingnya Two Factor Authentication dan Aplikasinya Di Era Keamanan Digital. Jurnal Pengabdian Masyarakat Bangsa, 1(6), 768–773. https://doi.org/https://doi.org/10.59837/jpmba.v1i6.256
Tahir, M., Hariyanto, H., Firdausi, M. I., Saim, S., Nuriyah, N., & Maimunah, M. (2024). Peningkatan Keamanan Jaringan LAN dan WLAN Melalui Standard Acces Control List. Digital Transformation Technology, 4(1), 607–614. https://doi.org/10.47709/digitech.v4i1.4261
Tiara Pramesti Wulandari, Novaldi Ramdani Reza, Errisa Zulqa Deswana, Muhammad Rifqi Adillah, & Didik Aribowo. (2024). Penerapan VPN Dalam Topologi Star Untuk Keamanan Pengiriman Data. Neptunus: Jurnal Ilmu Komputer Dan Teknologi Informasi, 2(2), 63–70. https://doi.org/10.61132/neptunus.v2i2.93
Wijoyo, A., Rosadi, A., Hanafi, M., & Sidik, R. (2023). Keamanan Jaringan Melindungi Sistem dari Serangan Luar. https://jurnalmahasiswa.com/index.php/jriin/article/view/407
Yeboah-Boateng, E. O., & Kwabena-Adade, G. D. (2020). Remote Access Communications Security: Analysis of User Authentication Roles in Organizations. Journal of Information Security, 11(03), 161–175. https://doi.org/10.4236/jis.2020.113011
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Muhamad Akbar Prasetyo, Nur Chalik Azhar

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The Jurnal Riset Informatika has legal rules for accessing digital electronic articles uunder a Creative Commons Attribution-NonCommercial 4.0 International License . Articles published in Jurnal Riset Informatika, provide Open Access, for the purpose of scientific development, research, and libraries.










