Published: 2025-08-01
Optimization of Bandwidth Management and Network Security Using PPPoE Method and Intrusion Detection Prevention System
DOI: 10.35870/ijsecs.v5i2.5021
Muhammad Arham, Yuma Akbar
- Muhammad Arham: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
- Yuma Akbar: Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
Abstract
Rural internet networks frequently struggle with unstable connections, bandwidth waste, and cyber vulnerabilities. We optimized bandwidth management and network security by implementing Point to Point Protocol over Ethernet (PPPoE) alongside Intrusion Detection and Prevention System (IDPS). PPPoE manages user authentication and dynamic bandwidth allocation, while IDPS identifies and blocks network threats. Our experimental research took place in Sukanegara Village network environment. Testing involved network load simulations and cyber-attack scenarios to evaluate system performance. We compared network metrics before and after implementation, focusing on bandwidth consumption, threat detection rates, and connection stability. PPPoE implementation reduced bandwidth consumption by 35% through controlled user access and fair distribution mechanisms. The IDPS successfully detected 92% of simulated attack attempts, including port scanning, flooding attacks, and unauthorized access attempts. Network latency dropped significantly during peak usage hours, while connection stability improved across all user categories. The combined PPPoE-IDPS solution effectively addresses rural network challenges. The system delivers cost-efficient bandwidth management while maintaining robust security protection. Implementation requires minimal additional hardware and allows management by local technical staff. Our findings support widespread adoption in community and village-scale networks seeking reliable internet infrastructure with adequate security measures.
Keywords
Bandwidth ; Network Security ; PPPoE ; IDPS
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Metrics
- Views0
- Downloads0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Article Information
This article has been peer-reviewed and published in the International Journal Software Engineering and Computer Science (IJSECS). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 5 No. 2 (2025)
-
Section: Articles
-
Published: August 1, 2025
-
License: CC BY 4.0
-
Copyright: © 2025 Authors
-
DOI: 10.35870/ijsecs.v5i2.5021
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.




Muhammad Arham
Information Systems Study Program, Faculty of Computer Science, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika, East Jakarta City, Special Capital Region of Jakarta, Indonesia
-
Lukman, A. M., & Bachtiar, Y. (2018). Analisis sistem pengelolaan, pemeliharaan dan keamanan jaringan internet pada IT Telkom Purwokerto. Jurnal Khatulistiwa Informatika, 6(2), 486692. https://doi.org/10.31294/evolusi.v6i2.4427
-
-
Ramanda, B. D., Irawan, D., & Hidayat, A. (2024). Rancang bangun manajemen bandwidth menggunakan metode simple queue mikrotik router pada SMK N 1 Trimurjo. Jurnal Mahasiswa Ilmu Komputer, 5(1), 86-95. https://doi.org/10.24127/ilmukomputer.v5i1.4690
-
-
Permadi, F. A. (2019). Optimalisasi jaringan internet hotspot menggunakan user manajemen pada Pusat Pengembangan SDM Asuransi Indonesia. Jurnal Infortech, 1(2), 59-67. https://doi.org/10.31294/infortech.v1i2.7083
-
-
Leksono, I. N., & Sandi, T. A. A. (2019). Optimalisasi jaringan WAN berbasis Mikrotik (Studi kasus: Robotic Laboratory Bogor). Jusikom: Jurnal Sistem Komputer Musirawas, 4(2), 100-110. https://doi.org/10.32767/jusikom.v4i2.628
-
Aminah, S. (2022). Manajemen bandwidth dalam mengoptimalkan penggunaan router Mikrotik terhadap pelayanan koneksi jaringan. Jurnal Informatika Ekonomi Bisnis, 4(3), 102-106. https://doi.org/10.37034/infeb.v4i3.144
-
Saepul Anam, Y., & Nurdiana, N. (2019). Optimalisasi manajemen bandwidth jaringan komputer dengan metode PCQ (peer connection queue) menggunakan simple queue. Seminar Teknologi Majalengka (STIMA), 4(1), 53-57. https://prosiding.unma.ac.id/index.php/stima/article/view/277
-
Sari, L. O., Safrianti, E., & Wahyuningtias, D. (2024). Analisis keamanan jaringan berbasis point to point protocol over ethernet (PPPoE) menggunakan Mikrotik. MALCOM: Indonesian Journal of Machine Learning and Computer Science, 4(3), 943-954. https://doi.org/10.57152/malcom.v4i3.1301
-
Rustanto, Herianto, & Yulisman. (2021). Analisa implementasi sistem jaringan berbasis PPPoE oleh ISP PT. Java Digital Nusantara Cabang Bengkalis. RJOCS (Riau Journal of Computer Science), 7(1), 18–31. https://doi.org/10.30606/rjocs.v7i1.1818
-
Slameto, A. A., & Hidayat, R. (2019). Comparative analysis of PPPoE and SSTP performance in Mikrotik (Analisis perbandingan kinerja PPPoE dan SSTP pada Mikrotik). Jurnal KomtekInfo, 6(2), 107-116. https://doi.org/10.35134/komtekinfo.v6i2.49
-
Andesa, K. (2021). Penerapan manajemen bandwidth berdasarkan PPPoE pada Pondok Pesantren Miftahul Huda. SATIN-Sains dan Teknologi Informasi, 7(2), 121-128. https://doi.org/10.33372/stn.v7i2.778
-
-
Prabowo, W. A., Fauziah, K., Nahrowi, A. S., Faiz, M. N., & Muhammad, A. W. (2023). Strengthening network security: Evaluation of intrusion detection and prevention systems tools in networking systems. International Journal of Advanced Computer Science and Applications, 14(9). https://doi.org/10.14569/ijacsa.2023.0140934
-
Hae, Y. (2021). Analisis keamanan jaringan pada web dari serangan sniffing dengan metode eksperimen. JATISI (Jurnal Teknik Informatika dan Sistem Informasi), 8(4), 2095–2105. https://doi.org/10.35957/jatisi.v8i4.1196
-
Mustofa, D., Mahendra, D. A., Saputra, D. I. S., & Amin, M. S. (2022). Implementasi point-to-point protocol over ethernet pada jaringan RT/RW Net menggunakan Mikrotik RB750 GR3. Jurnal Ilmiah IT CIDA, 8(2), 124-139. https://doi.org/10.55635/jic.v8i2.169
-
Putra, P. D., & Gunanto, S. (2023). Implementasi infrastruktur hotspot berbasis PPPoE dan WebProxy dengan Mikrotik. Jurnal Sienna, 5(2). https://doi.org/10.47637/sienna.v5i2.1394
-
-
-
-
Wijaya, A., & Purwanto, T. D. (2019). Implementasi metode rekayasa sistem jaringan komputer untuk pengembangan jaringan komputer. Jurnal Edukasi dan Penelitian Informatika (JEPIN), 5(3), 294. https://doi.org/10.26418/jp.v5i3.29925

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright and Licensing Agreement
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
- Authors retain full copyright of their work
- Authors grant the journal right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0)
- This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.