Implementasi Secure Tunnel pada Peering BGP untuk Mitigasi Serangan Man-in-the-Middle di Jaringan TCP/IP

Authors

  • Surono Universitas Semarang
  • Agus Hartanto Universitas Semarang
  • Galih Setiarso Universitas Semarang
  • Krida Pandu G Universitas Semarang

DOI:

https://doi.org/10.36596/jitu.v10i1.2284

Keywords:

BGP, MITM, Network Performance, Network Security, OpenVPN

Abstract

The Border Gateway Protocol (BGP), as the core internet routing protocol, lacks built-in security mechanisms, making it vulnerable to Man-in-the-Middle (MITM) attacks and sniffing. This research aims to test the effectiveness of an OpenVPN-based secure tunnel in enhancing the security of BGP peering sessions while analyzing its impact on network performance. The method used is an experiment with a pre-test and post-test design, comparing conditions before and after OpenVPN implementation between two routers on different platforms (Linux/FRRouting and MikroTik RouterOS). Test results show that OpenVPN successfully secures BGP communication by encrypting all traffic, thereby eliminating the risk of plaintext reading and passive MITM attacks. However, this implementation introduces a performance trade-off: latency increases by 2.6 ms (50%), throughput decreases by 289 Mbps (30.6%), and CPU utilization surges up to 60% due to encryption overhead. Nonetheless, BGP session stability is maintained with 99.95% uptime. The research concludes that OpenVPN is an effective solution for securing BGP in high-risk environments, with the caveat that hardware capacity and bandwidth requirements must be evaluated to minimize performance overhead impact.

References

A. R. Putri dan D. Puspitasari, “Perancangan Desain dan Manajemen Jaringan Pada Fakultas Farmasi Universitas Hang Tuah Surabaya Menggunakan Cisco Packet Tracer Dengan Metode …,” Pros. Semin. Nas. …, vol. 4, no. 9, hal. 50–56, 2024.

C. Y. Maulida, M. Murhaban, dan C. Mutia, “Perancangan Jaringan Point To Multipoint Menggunakan Metode Prepare, Plan, Design, Implement, Operate, Dan Optimize (PPDIOO) (Studi Kasus: Gedung U2C Lantai 4 Universitas Teuku Umar),” J. Teknol. Inf., vol. 4, no. 1, hal. 42, 2025, doi: 10.35308/jti.v4i1.11256.

R. Aulia, Risko Liza, dan Haida Dafitri, “Analisis Routing Loop dalam Open Shortest Path First (OSPF) Routing Menggunakan Teknik Spanning Tree di Jaringan Multi Area,” Hello World J. Ilmu Komput., vol. 2, no. 4, hal. 158–168, 2024, doi: 10.56211/helloworld.v2i4.419.

Taqwanur dan Mega Bilqis Suryawantiningtyas, “G-Tech?: Jurnal Teknologi Terapan,” G-Tech J. Teknol. Terap., vol. 6, no. 2, hal. 295–305, 2022.

L. Mastilak, P. Helebrandt, M. Galinski, dan I. Kotuliak, “Secure Inter-Domain Routing Based on Blockchain: A Comprehensive Survey,” Sensors, vol. 22, no. 4, 2022, doi: 10.3390/s22041437.

M. A. Ajharie dan M. Sulistiyono, “Implementasi Framework Mitm (Man in the Middle Attack) Untuk Memantau Aktifitas Pengguna Dalam Satu Jaringan,” J. Infomedia, vol. 7, no. 1, hal. 45, 2022, doi: 10.30811/jim.v7i1.2966.

A. Putri Arini, M. Raihan Ramadhani Isworo, A. Salim, U. Pembangunan Nasional, dan J. Timur, “Seminar Nasional Informatika Bela Negara (SANTIKA) Desain Dan Manajemen Jaringan Pada Sma Negeri 15 Surabaya Menggunakan Cisco Packet Tracer Dengan Metode PPDIOO,” Semin. Nas. Inform. Bela Negara, vol. 4, hal. 1–32, 2021.

A. W. Fiqri dan A. Prapanca, “Analisis Kinerja Dan Implementasi Load Balancing Menggunakan Metode PCC (Per Connection Classifier) Pada SMP Negeri 53 Surabaya,” J. Informatics Comput. Sci., vol. 5, no. 03, hal. 331–343, 2024, doi: 10.26740/jinacs.v5n03.p331-343.

Samia Bilhaj dan Nuredin Ahmed, “Design and Implementation of a Secure WAN Using Site-to-Site VPN: A Practical Comparison with MPLS,” AlQalam J. Med. Appl. Sci., vol. 9, no. 1, hal. 46, 2026, doi: 10.54361/ajmas.269109.

R. J. Romadhondaru dan A. Basuki, “Visualisasi Topologi Jaringan berdasarkan Data Routing Border Gateway Protocol,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 6, no. 9, hal. 4329–4338, 2022.

M. Apriyatna, “Analisis dan Implementasi Network Ad-blocking Pi-Hole di Raspberry Pi 4 Menggunakan OPNSense DHCP Dengan Metode PPDIOO Studi Kasus Dinas Komunikasi Informatika Statistik dan Persandian Kabupaten Lebak,” J. Ilmu Komput. dan Sci., vol. 1, no. 11, hal. 1943–1950, 2022.

Downloads

Published

2026-05-13

How to Cite

Surono, Agus Hartanto, Setiarso, G., & Pandu G, K. (2026). Implementasi Secure Tunnel pada Peering BGP untuk Mitigasi Serangan Man-in-the-Middle di Jaringan TCP/IP. JITU : Journal Informatic Technology And Communication, 10(1), 82–91. https://doi.org/10.36596/jitu.v10i1.2284

Issue

Section

Articles