the internet. For website blocks that have been de-
termined by the author, the proxy server can block
websites with the HTTP protocol, while for websites
that use the HTTPS protocol, proxies cannot block it
except all websites that use the HTTPS protocol are
also blocked. So in this study, the author only blocked
websites with the HTTP protocol, in this article, the
web was blocked http://www.youtube.com. Virtual
machines can be applied in building proxy servers and
are able to work optimally.
From the research, the test results using Wire-
shark were obtained with the density experienced
when searching so that the value determined based
on the rules using the packet loss value according to
the version TIPHON is divided into the four parts
QOS Throughput parameters of 1982k, Packet loss
of 0.0with an average of 0.0063 and total jitter of -
0.00328 with an average jitter of -0.00021. Testing
response time against sites using a squid proxy server
as a metadata cache can provide better response time
results than without using a proxy server with a vir-
tual machine.
Please note that ONLY the files required to com-
pile your paper should be submitted. Previous ver-
sions or examples MUST be removed from the com-
pilation directory before submission.
We hope you find the information in this template
useful in the preparation of your submission.
REFERENCES
Akmala, S. (2019). The Development of the Internet in the
Young Generation in Indonesia with the Relation of
the Law Applicable Ite. Cyber Security. dan Forensik
Digital vol. 1, no. 2, pp. 45–49 doi: 10.14421/csecu-
rity.2018.1.2.1371.
Amarudin, A. and Yuliansyah, A. (2018). Analisis penera-
pan mikrotik router sebagai user manager untuk men-
ciptakan internet sehat menggunakan simulasi virtual
machine. Tam, vol. 9, no. 1, pp. 62–66.
Arya, D. M. (2020). Manajemen bandwith pada mikrotik
dengan limitasi bertingkat menggunakan metode sim-
ple queue. J. Inf. Tecnol. Comput. Sci., vol. 3, no. 2,
pp. 270–280.
Ayubih, S. A. and Kuswanto, H. (2021). “implementation
of bandwidth management using queue tree at smk
cipta karya bekasi. Jurnal Mantik, vol. 5, no. 36, pp.
1237–1245.
D. Iswadi, R. A. and Munadi, R. (2019). “adaptive switch-
ing pcq-htb algorithms for bandwidth management in
routeros. In Proc. Cybern. 2019 - 2019 IEEE Int.
Conf. Cybern. Comput. Intell. Towar. a Smart Human-
Centered Cyber World, pp. 61–65, doi: 10.1109/CY-
BERNETICSCOM.2019.8875679.
Eko, A. G. F. (2017). Bandwidth management and user
management on wireless networks mesh network with
mikrotik. J. Pengemb. Teknol. Inf. dan Ilmu Komput.,
vol. 1, no. 11, p. 47.
Iqbal, M. and Tambunan, L. (2021). Samba server design
using ubuntu server and configuration network using
mikrotik routerboard (case study of pt.mesitechmitra
purnabangun). Jar. Sist. Inf. Robot., vol. 5, no. 1, pp.
1–8.
Jain, G. and Anubha (2021). Application of snort and
wireshark in network traffic analysis. IOP Conf. Ser.
Mater. Sci. Eng., vol. 1119, no. 1, p. 012007, doi:
10.1088/1757-899x/1119/1/012007.
Jang, H. C. and Lin, J. T. (2017). “sdn based qos
aware bandwidth management framework of
isp for smart homes. 2017 IEEE SmartWorld
Ubiquitous Intell. Comput. Adv. Trust. Comput.
Scalable Comput. Commun. Cloud Big Data
Comput. Internet People Smart City Innov. Smart-
World/SCALCOM/UIC/ATC/CBDCom/IOP/SCI
2017, pp. 1–6, 2018, doi:
10.1109/UICATC.2017.8397480.
Kusbandono and Syafitri, E. M. (2019). Penerapan quality
of service (qos) dengan metode pcq untuk manajemen
bandwidth internet pada wlan politeknik negeri ma-
diun. Res. Comput. Inf. Syst. Technol. Manag., vol. 2,
no. 1, p. 7, doi: 10.25273/research.v2i1.3743.
M. C. Breaban, A. Graur, A. D. P. and Balan, D. G.
(2018). Bandwidth management application in di-
rectory service environment. 14th Int. Conf. Dev.
Appl. Syst. DAS 2018 - Proc., pp. 88–92, 2018, doi:
10.1109/DAAS.2018.8396077.
Mohammad, S. (2021). a research survey on virtual ma-
chines for efficient computing. Int. J. IT Eng., vol.
Vol.2, no 2.
Mukti, A. R. and Dasmen, R. N. (2019). Prototipe mana-
jemen bandwidth pada jaringan internet hotel harvani
dengan mikrotik rb 750r2. J. Inform. J. Pengemb. IT,
vol. 4, no. 2, pp. 87–92, doi: 10.30591/jpit.v4i2.1322.
Naik, N. (2016). Migrating from virtualization to docker-
ization in the cloud: Simulation and evaluation of dis-
tributed systems. In Proc. - 2016 IEEE 10th Int. Symp.
Maint. Evol. Serv. Cloud-Based Environ. MESOCA
2016, doi: 10.1109/MESOCA.2016.9.
Nasir, J. and Andrianto, E. (2018). Implementation of
quality of service, bandwidth limit and load balanc-
ing by using dd-wrt firmware on the buffalo whr-hp-
g300n router. Simetris J. Tek. Mesin, Elektro dan
Ilmu Komput., vol. 9, no. 1, pp. 403–412, 2018, doi:
10.24176/simet.v9i1.1985.
Rifai, B. (2017). Bandwidth management in dynamic
queue using per connection method queuing. J. Ilmu
Pengetahuan Dan Teknologi Komputer, vol. 2, no. 2,
pp.73–79.
S. Sandhya, S. Purkayastha, E. J. and Deep, A. (2017).
“assessment of website security by penetration test-
ing using wireshark. 2017 4th Int. Conf. Adv. Com-
put. Commun. Syst. ICACCS 2017, pp. 4–7, doi:
10.1109/ICACCS.2017.8014711.
Sari, I. P. and Sukri, S. (2018). Analisis penerapan metode
antrian hirarchical token bucket untuk management
bandwidth jaringan internet. J. RESTI (Rekayasa Sist.
ICAISD 2023 - International Conference on Advanced Information Scientific Development
124