To see the other types of publications on this topic, follow the link: Virtual Private Network (VPN).

Journal articles on the topic 'Virtual Private Network (VPN)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Virtual Private Network (VPN).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The perf
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sudipti Banerjee. and Dr. Rajni Ranjan Singh Makwana. "Virtual Private Network: Survey and Research Challenges." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 6 (2025): 211–26. https://doi.org/10.51583/ijltemas.2025.140600028.

Full text
Abstract:
Abstract: The Virtual Private Network (VPN) is a rapidly developing technology that has a crucial function in guaranteeing the secure transfer of data. A virtual linkage is created among geographically distant individuals and networks that are linked through a common or public network, such as the Internet. Despite the fact that data is transmitted via a public network, a Virtual Private Network (VPN) signifies that the data is conveyed through a secure and private connection. Virtual Private Network (VPN) technology enables secure communication between two hosts by creating virtual tunnels. U
APA, Harvard, Vancouver, ISO, and other styles
4

Fu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (2024): 2674. http://dx.doi.org/10.3390/electronics13132674.

Full text
Abstract:
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network (VPN) and SDN architecture to leverage the controllability and programmability of SDN, which are only applicable for specific platforms and do not comply with the extensibility of SDN. This paper motivates us to refactor traditional VPNs with SDN architect
APA, Harvard, Vancouver, ISO, and other styles
5

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Full text
Abstract:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for or
APA, Harvard, Vancouver, ISO, and other styles
6

Anggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.

Full text
Abstract:
Virtual Private Network (VPN) is a form of private network through a public network by focusing on the security of the encrypted data in it. This research uses Cisco Packet Tracere software as a computer network technology simulation tool. Cisco Packet Tracker is a device in network technology simulation that functions for creation and development in networks. The purpose of this research is to create a VPN simulation using a star topology with Cisco Packet Tracer software. Star topology is a star-shaped topology, where each node is to the centre. The method used is a qualitative method with d
APA, Harvard, Vancouver, ISO, and other styles
7

Sari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.

Full text
Abstract:
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN). The descriptive qualitative research used in this study was carried out at the lab of SMK Negeri 1 Ampek Angkek. Data were gathered through observation, interviews, and document analysis studies. The method of data analysis employed descriptive analysis. The results of this study indicate that the activity on the VPN network is better than the Non-VPN because the activitie
APA, Harvard, Vancouver, ISO, and other styles
8

Anwar, Rian Septian, and Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.

Full text
Abstract:
Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus dito
APA, Harvard, Vancouver, ISO, and other styles
9

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Full text
Abstract:
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Int
APA, Harvard, Vancouver, ISO, and other styles
10

Lizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.

Full text
Abstract:
Aplikasi Sistem Informasi yang ada di SMK Labor Binaan FKIP UNRI telah dapat menunjang proses keputusan yang akurat. Aplikasi Sistem Informasi tersebut bisa di akses melalui internet secara private dengan teknologi VPN ( Virtual Private Network), tetapi penggunaannya belum bisa di pantau secara spesifik oleh administrator jaringan, sehiingga perlu untuk membangunkan suatu sistem traffic monitoring dengan menggunakan Simple Network Management Protocol (SNMP) dalam mengimplementasikan aplikasi untuk melakukan pengamatan penggunaan lalu lintas data internet dari parameter yang ada pada jaringan V
APA, Harvard, Vancouver, ISO, and other styles
11

Novanto, Mukhammad Rizki, Joseph Dedy Irawan, and F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 1 (2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.

Full text
Abstract:
Tidak bisa dipungkiri semenjak pandemi virus Covid-19 kegiatan internet terus menjadi bertambah. Semacam halnya bekerja dari rumah memakai internet, belajar daring memakai internet, komunikasi social media memakai internet, belanja online di pasar online dengan internet, sampai mencari data lewat internet. Kebutuhan internet terus menjadi bertambah, tidak hanya harga virtual private server yang disediakan provider lokal relatif mahal serta instalasi sampai operasional membutuhkan banyak tahapan, semacam wajib menginstal script guna berjalannya protocol pada VPS sehingga dibutuhkannya sesuatu s
APA, Harvard, Vancouver, ISO, and other styles
12

Peng, Kai. "Construction and Exploration of Corporate Virtual Private Networks." Advanced Engineering Forum 6-7 (September 2012): 964–67. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.964.

Full text
Abstract:
With the further development of Internet, VPN technology would provide high-quality and low-cost wide-area data network, and would be safer than the majority of corporate special network. Main purpose of VPN technology is to save communication expenses for enterprises, especially replace existing special lines of enterprises and reduce communication cost. With constant mergers and acquisitions of enterprises and the occurrence of new relationship between enterprises and employees, traditional corporate network mode faces challenges. One solution is to use virtual private network when construct
APA, Harvard, Vancouver, ISO, and other styles
13

Kande, Santosh Kumar. "VPN Usage Monitoring: Investigating User Browsing Behavior While Connected to VPN to Enhance Network Security." Journal of Artificial Intelligence & Cloud Computing 2, no. 1 (2023): 1–2. https://doi.org/10.47363/jaicc/2023(2)411.

Full text
Abstract:
Virtual Private Networks (VPNs) are critical tools for maintaining secure communication and privacy. However, encrypted VPN traffic can create blind spots for network monitoring, increasing organizational vulnerability to threats such as data breaches and policy violations.
APA, Harvard, Vancouver, ISO, and other styles
14

Nourildean, Shayma W. "Virtual Private Network—Firewall Integration for Wireless Local Area Network Improvement against Jammers." International Journal of Electrical and Electronic Engineering & Telecommunications 13, no. 1 (2024): 58–66. http://dx.doi.org/10.18178/ijeetc.13.1.58-66.

Full text
Abstract:
Wireless networks are susceptible to many security problems since the wireless medium is open. Jammer (jamming attack) is the most important problems in wireless networks. It is denial-of-service attack in which attackers send malicious signals or messages on a channel that is intended for normal traffic by intentionally interfering with the network. One of the solutions is the development of tunneling technology as an attempt to secure communication networks. Virtual Private Network (VPN) tunneling technology when integrated with firewall would provide a suitable security. In this study, numb
APA, Harvard, Vancouver, ISO, and other styles
15

Maryanto, Maryanto, Maisyaroh Maisyaroh, and Budi Santoso. "Metode Internet Protocol Security (IPSec) Dengan Virtual Private Network (VPN) Untuk Komunikasi Data." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 6, no. 2 (2018): 179–88. http://dx.doi.org/10.33558/piksel.v6i2.1508.

Full text
Abstract:
Virtual Private Network (VPN) is a local communication network that is connected through a public network, with private network data security, data transfer closure from illegal access and network scalability to become the main standard in Virtual Private Network (VPN). In building a VPN at PT. Penas (Persero) conducted by the method of Internet Protocol Security (IP Sec). IP Sec works on the network layer, protects and authenticates communications on IP between hosts and functions both on IPv6 and IPv4 traffic. IP Sec is actually a feature that is owned by IPv6 but by some developers it was a
APA, Harvard, Vancouver, ISO, and other styles
16

Rendy, Munadi, Dwi Sanjoyo Danu, Perdana Doan, and Adjie Fidar. "Performance analysis of tunnel broker through open virtual private network." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1185–92. https://doi.org/10.12928/TELKOMNIKA.v17i3.12231.

Full text
Abstract:
Tunnel Broker uses automatic configuration tunneling mechanism for IPv6 clients connected to IPv4 internet. Connectivity between clients and service providers in IPv6 is urgently needed. Open VPN as a provider implemented configures it by a VPN network, so IPv6 and IPv4 public IP clients can easily connect to the server. In this research focused on the performance of tunnel broker mechanism by utilizing open VPN as access to the network. IPv6 tunnel broker is developed by installing Open VPN and providing IPv6 IPs. Implementation of public IP usage in observing the performance of tunnel broker
APA, Harvard, Vancouver, ISO, and other styles
17

Maulidi, A., M. Abdullah, and DW Handani. "Virtual private network (VPN) model for AIS real time monitoring." IOP Conference Series: Earth and Environmental Science 1081, no. 1 (2022): 012028. http://dx.doi.org/10.1088/1755-1315/1081/1/012028.

Full text
Abstract:
Abstract The need for a ship monitoring system based on Automatic Identification System (AIS) has been developed and provides many broad benefits for the maritime world in Indonesia. The system can become an early warning system (EWS) for ship operators, port operators, and even ship owners for tracking a movement of their ships. By internet connection based Virtual Private Network (VPN) can connect several remote base stations (RBS), VPN technology can integrate many RBS from several remote places into one AIS monitoring system. VPN-based internet connection is used to guarantee a secure netw
APA, Harvard, Vancouver, ISO, and other styles
18

Wardana, Mohammad Ali, Andi Zulkifli Nusri, and Juliandika Juliandika. "Jaringan Virtual Private Network (Vpn) Berbasis Mikrotik Pada Kantor Kecamatan Marioriawa Kabupaten Soppeng." Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) 5, no. 2 (2022): 107–16. http://dx.doi.org/10.57093/jisti.v5i2.135.

Full text
Abstract:
Adapun tujuan dari penelitian tentang Perancangan Jaringan Virtual Private Network (VPN) Berbasis Mikrotik pada Kantor Kecamatan Marioriawa adalah untuk merancang dan mengimplementasikan jaringan Virtual Private Network (VPN) berbasis Mikrotik pada Kantor Kecamatan Marioriawa yang belum memiliki suatu sistem jaringan internet yang private, aman dan bebas dari gangguan peretasan, karena Database didalam Server Kantor Kecamatan Marioriawa sangat penting karena berisi Data Induk Kependudukan dari seluruh warga Kecamatan Marioriawa yang tidak boleh diakses oleh yang tidak berwenang. Adapun alat ya
APA, Harvard, Vancouver, ISO, and other styles
19

Umaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.

Full text
Abstract:
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data, data reduction, data presentation and drawing conclusions. While the validity of the data was obtained through triangulation. The results showed that the use of VPN in the UNISMA Library to speed up internet connection and data privacy. UNISMA library uses a proxy server router operating system for VPN networks. To be able to make Mikrotik a V
APA, Harvard, Vancouver, ISO, and other styles
20

Dewi, Sari, and Dwi Yuni Utami. "Implementing Virtual Private Network (VPN) Network Security Using A Mikrotik Router." Journal of Information System, Informatics and Computing 8, no. 2 (2024): 220. https://doi.org/10.52362/jisicom.v8i2.1653.

Full text
Abstract:
Setiap aspek dalam perusahan membutuhkan jaringan lokal dan jaringan internet untuk mengolah data dan mempermudah pekerjaan kantor selalu membutuhkan teknologi jaringan komputer. Seiring berkembangnya teknologi, tuntutan terhadap keamanan data dan informasi pun ikut berkembang. Virtual Private Networks (VPN) adalah teknologi yang sering digunakan yang dapat menawarkan tingkat perlindungan ekstra terhadap transfer data melalui jaringan publik. Tujuan dari penelitian ini adalah menggunakan MikroTik Router OS sebagai gateway untuk menyelidiki dan mengimplementasikan keamanan jaringan VPN. PT. Tif
APA, Harvard, Vancouver, ISO, and other styles
21

Andini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.

Full text
Abstract:
The discovery of a Virtual Private Network (VPN) makes it easy to access the internet wherever and whenever. Many service providers see the advantages of VPN being commercially usable, VPNs are very vulnerable to hacker attacks, cracking that supports data or information from VPN application users, this research offers to provide information about VPN security Point to Point Tunneling protocol (PPTP) and whether the VPN security system has been licensed and is in accordance with applicable law or not. This research is normative juridical. By using analytical descriptive analysis, this research
APA, Harvard, Vancouver, ISO, and other styles
22

S, Sujatha. "Detection of Virtual Private Networks Encrypted Traffic using Machine and Ensemble Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5636–42. http://dx.doi.org/10.22214/ijraset.2024.61288.

Full text
Abstract:
Abstract: The widespread adoption of Virtual Private Networks (VPNs) for secure communication over public networks has highlighted the need for accurate detection of encrypted network traffic. This study proposes a comprehensive approach utilizing machine and ensemble learning algorithms to address this detection challenge. Leveraging the ISCX VPN dataset, the project aims to develop a robust system capable of distinguishing between VPN and non-VPN traffic with high accuracy. Key stages include data acquisition, preprocessing, feature extraction, and model training using Decision Tree, Naive B
APA, Harvard, Vancouver, ISO, and other styles
23

Fatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) provide remotely secure connection for clients to exchange information with company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity using GNS3 Network simulator. The testing and verification analyzing of data packets is done using both PING tool and Wireshark to ensure the encryption of data packets during data exchange between different sites belong to the same company.
APA, Harvard, Vancouver, ISO, and other styles
24

Miller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.

Full text
Abstract:
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the present
APA, Harvard, Vancouver, ISO, and other styles
25

Salman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator. The testing, verification analyzing of data packets of the network is done using both PING tool and Wireshark.
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Kun, Hai Feng Wang, Yu Chun Ma, and Zhuang Li. "The Status and Development Trends of Virtual Private Network Technology." Key Engineering Materials 474-476 (April 2011): 79–82. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.79.

Full text
Abstract:
Virtual Private Network (VPN) refers to rely on the ISP (Internet service providers) and other NSP (Network service provider), in the public network, to establish a dedicated data communication network technologies. In the virtual private network, between any two nodes connected no dedicated network for the traditional end-to-end physical link, but to use a public network composed of dynamic resources. VPN technology can reduce the internal network building costs, improve user network operation and management flexibility, and enable communication between computers and private circuits on compu
APA, Harvard, Vancouver, ISO, and other styles
27

Rana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.

Full text
Abstract:
In recent years, network developments and user growth have increased network security problems and techniques. The trend in network security is towards web-based networks, given Internet users' diverse origins, unpredictable persons are more likely to participate in malevolent activities. Security and privacy safeguards are implemented using many technologies. This paper proposes using a virtual private network (VPN) to secure particular communications across vast networks. VPNs restrict unauthorised connections, benefiting secured hosts. Through a VPN network, connections can be kept hidden a
APA, Harvard, Vancouver, ISO, and other styles
28

Sulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.

Full text
Abstract:
Perkembangan teknologi yang semakin maju mempengaruhi suatu sistem dan efisiensi dalam dunia pekerjaan. Oleh karna itu sangat di butuhkan sekali jaringan internet, selain pentingnya jaringan internet juga perusahaan sangat membutuhkan adanya jaringan pribadi (VPN) yang aman, sebagai jalur khusus untuk mengakses ke jaringan lokal perusahaan. Untuk mengatasi hal ini maka penulis akan merancang sebuah VPN IPsec dengan menggunakan Router MikroTik. VPN memungkinkan untuk mengakses jaringan lokal perusahaan menggunakan koneksi internet publik. Dari hasil riset yang penulis lakukan telah membuktikan
APA, Harvard, Vancouver, ISO, and other styles
29

Musril, Hari Antoni. "Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 3, no. 2 (2019): 83–88. http://dx.doi.org/10.30743/infotekjar.v3i2.1055.

Full text
Abstract:
Akses terhadap sebuah jaringan lokal yang bersifat terbatas untuk pihak tertentu dapat dilakukan dari jaringan publik dengan memanfaatkan Virtual Private Network (VPN). Akses tersebut dilakukan melalui internet dengan memanfaatkan VPN. Hal itu membuat pengguna bisa memanfaatkan semua resources jaringan lokal yang dapat diakses tanpa batasan waktu dan lokasi. OSPF routing diperlukan untuk menghubungkan semua router dalam jaringan yang menggunakan VPN. OSPF routing pada jaringan VPN bisa saling mengkoneksikan beberapa gedung di lokasi yang berbeda dengan satu jaringan. Penelitian ini menghasilka
APA, Harvard, Vancouver, ISO, and other styles
30

Kher, Bhushan, Preeti Karmore, Nutan Sonwane, et al. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.

Full text
Abstract:
Abstract: A VPN is an essential tool for securing your personal data and protecting your privacy online. We’ve put together the ultimate guide to VPNs to show you what a VPN does, how VPNs work, and how they protect you. Learn how to choose the right VPN, or secure your privacy right now by downloading our own powerful and lightning-fast VPN app. A VPN works by using encryption protocols to funnel all your internet traffic through an encrypted tunnel a virtual private network between your computer and a remote VPN server. This hides your IP address and secures your data, preventing others from
APA, Harvard, Vancouver, ISO, and other styles
31

Usanto, Usanto. "RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 2 (2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.

Full text
Abstract:
The use of wireless media such as the internet in building computer networks is so widely used. However, performance and security must also be considered. VPN (Virtual Private Network) is one of the methods in network security that works by creating a tunnel so that a trusted network can connect to networks outside via the internet. PT. Laris Manis Utama is a private company engaged in the field of fresh fruits export-import and distributor. And already has several branch offices located outside the city. Designing a VPN (Virtual Private Network) with a Site to site (OpenVPN) system at PT. Lar
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu, and Bo Li. "An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN." Photonic Network Communications 7, no. 3 (2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ariyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.

Full text
Abstract:
Dibutuhkannya komunikasi dalam menunjang interaksi antar perusahaan yang memiliki kaitan yang sangat erat terhadap perkembangan teknologi informasi melalui jaringan komputer. Virtual Private Network atau biasa disebut VPN memiliki peran penting dalam perkembangan sistem keamanan dalam jaringan internet, terutama dalam membatasi hak akses terhadap server, database, dan sejenisnya dalam meminimalisir terjadinya akses illegal terhadap data-data penting perusahaan. VPN memiliki beberapa tipe salah seperti VPN Tunnel dan IPSec, VPN Tunnel memiliki konsep yang lebih sederhana dibandingkan dengan IPS
APA, Harvard, Vancouver, ISO, and other styles
34

Sari, Linna Oktaviana, and Helena Helena. "Implementasi Virtual Private Network MenggunakanLayer 2 Tunneling Protocol Berbasis Mikrotik." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 4 (2024): 1496–504. https://doi.org/10.57152/malcom.v4i4.1651.

Full text
Abstract:
Perkembangan teknologi yang semakin pesat membuat kebutuhan akan jaringan internet semakin meningkat, termasuk di sektor pendidikan. SDS IT Sahabat Muslim Duri menggunakan jaringan internet sebagai media pembelajaran dan penyimpanan data penting secara online. Namun, pengelolaan jaringan oleh admin hanya dapat dilakukan dalam jaringan lokal sekolah. Penelitian ini bertujuan untuk mengimplementasikan jaringan VPN menggunakan protokol L2TP berbasis Mikrotik agar perangkat di sekolah dapat dikonfigurasi dan dimonitor dari jarak jauh secara aman. Metode yang digunakan meliputi identifikasi masalah
APA, Harvard, Vancouver, ISO, and other styles
35

Gustiawan, Mokhamad, and Ali Akbar Rismayadi. "Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, no. 4 (2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.

Full text
Abstract:
Abstrak - Dishub Bandung merupakan kantor dilingkungan Pemkot Bandung, kantor ini memiliki komputer yang masih terdapat user yang terpisah secara fisik dari jaringan Lan dan teknisi setiap monitoring komunikasi data dengan mengakses mikrotik dan access point untuk mengetahui kondisi jaringan, dan hanya dapat dilakukan teknisi ketika sedang berada dalam jaringan lokal. Masalahnya ketika teknisi sedang berada pada jaringan publik, maka tidak dapat mengakses mikrotik dan access point tersebut. Penelitian menggunakan metode NDLC dengan penggabungan sistem protokol VPN L2TP dan port forward yang ad
APA, Harvard, Vancouver, ISO, and other styles
36

Manouselis, Nikos, and Andreas M. Maras. "Multi-attribute Services Brokering in Agent-based Virtual Private Networks." Computing Letters 1, no. 3 (2005): 137–43. http://dx.doi.org/10.1163/1574040054861230.

Full text
Abstract:
This paper presents the development of an agent-based Virtual Private Network (VPN) system that supports multimedia service brokering. The VPN agents employ multi-attribute preference models in order to represent the end-user preferences, and a multi-criteria decision making model to evaluate available services from network providers. A prototype multi-agent system demonstrating the proposed approach has also been implemented.
APA, Harvard, Vancouver, ISO, and other styles
37

Lian, Hongbing, and András Faragó. "Optimizing Virtual Private Network Design Using a New Heuristic Optimization Method." ISRN Communications and Networking 2012 (August 23, 2012): 1–9. http://dx.doi.org/10.5402/2012/914953.

Full text
Abstract:
In virtual private network (VPN) design, the goal is to implement a logical overlay network on top of a given physical network. We model the traffic loss caused by blocking not only on isolated links, but also at the network level. A successful model that captures the considered network level phenomenon is the well-known reduced load approximation. We consider here the optimization problem of maximizing the carried traffic in the VPN. This is a hard optimization problem. To deal with it, we introduce a heuristic local search technique called landscape smoothing search (LSS). This study first d
APA, Harvard, Vancouver, ISO, and other styles
38

Hidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.

Full text
Abstract:
Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distr
APA, Harvard, Vancouver, ISO, and other styles
39

Erielle, DC. Bitbit, Anthony B. Gampoy Mark, S. Ricafort Therese, et al. "Crafting a Network Plan for a Microfinancing Establishment and Its Branch Network through Virtual Private Network (VPN) Implementation." European Journal of Theoretical and Applied Sciences 1, no. 3 (2023): 441–48. https://doi.org/10.59324/ejtas.2023.1(3).43.

Full text
Abstract:
This study successfully designed a network plan incorporating a Virtual Private Network (VPN) for Kasipag Microfinancing Incorporated (KMI). Employing a developmental research design approach and following the network development life cycle stages of planning, analysis, design, and simulation, the researchers evaluated the feasibility of the network design for implementation in KMI. The findings strongly recommend KMI to proceed with the implementation of the designed network plan that includes a VPN, as it offers significant benefits and advantages. Implementing a VPN in KMI's network inf
APA, Harvard, Vancouver, ISO, and other styles
40

Tulegenova, E. N., A. B. Adranova, and K. Abildakhan. "LIMITING EFFECT OF NETWORK RESOURCES ON VPN IMPLEMENTATION." Bulletin of the Korkyt Ata Kyzylorda University 60, no. 1 (2022): 146–51. http://dx.doi.org/10.52081/bkaku.2022.v60.i1.018.

Full text
Abstract:
In the modern conditions of developed information systems, the advantages of creating virtual private networks cannot be underestimated. But before mentioning the clearest and most useful ways to create virtual private networks, it is necessary to understand its meaning. Nowadays, the question of how to communicate with the corporate information system is important for users. Here they will need a broadband connection, regardless of whether they use a fixed network or Wi-Fi, as it is not uncommon for users to work on the road. Today, virtual technologies are becoming more popular, they occupy
APA, Harvard, Vancouver, ISO, and other styles
41

Vimal, Kumar V., and C. Abdul Majeed K. "E-resources sharing through Linux based Virtual Private Network (VPN): a case study." Annals of Library and Information Studies 65, no. 3 (2020): 156–59. https://doi.org/10.5281/zenodo.4393149.

Full text
Abstract:
Mahatma Gandhi University Central Library has established an SSH-based VPN (Virtual Private Network) service to share e-resources with off-campus libraries. The VPN service ensures seamless access to e-resources to the academic community at off-campus departments and Study Centre libraries. Extension of e-resources access to off-campus has increased the usage of electronic resources subscribed by the university. The article presents the first-hand experience of establishing Open Source based VPN service in a university environment.
APA, Harvard, Vancouver, ISO, and other styles
42

Suryantoro, Hari, Adi Sopian, and Dartono Dartono. "PENERAPAN TEKNOLOGI FORTIGATE DALAM PEMBANGUNAN JARINGAN VPN-IP BERBASIS IPSEC." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 1 (2021): 1–7. http://dx.doi.org/10.56486/jeis.vol1no1.64.

Full text
Abstract:
IPSec based VPN (Virtual Private Network) is a standard that provides data confidentiality, data integrity, and source authentication on public communication such as the internet. IPSec VPN is a secure technology and reliable (secure and reliable) which can connect private networks between campuses using internet public communications. The availability of data and services in real-time is very much needed by the main campus to ensure that operational and business activities at branch campus and main campus run smoothly. FortiGate is the best choice for system security that provides high protec
APA, Harvard, Vancouver, ISO, and other styles
43

Rosyidah, Aliyyah, and Jumadi Mabe Parenreng. "Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)." Internet of Things and Artificial Intelligence Journal 3, no. 3 (2023): 239–49. http://dx.doi.org/10.31763/iota.v3i3.613.

Full text
Abstract:
The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determ
APA, Harvard, Vancouver, ISO, and other styles
44

Ginting, Jafaruddin Gusti Amri, Bongga Arifwidodo, and Eka Wahyudi. "Virtual Privat Network: Koneksi Keamanan Pada Aplikasi Berbasis Android." Journal of Telecommunication Electronics and Control Engineering (JTECE) 7, no. 1 (2025): 32–42. https://doi.org/10.20895/jtece.v7i1.1632.

Full text
Abstract:
Kasus pencurian data informasi, seperti data pribadi, PIN, dan OTP, semakin meningkat akibat serangan dari penyerang. Serangan ini dilakukan dengan mengirimkan payload berupa skrip berbahaya yang di-inject ke dalam aplikasi Android melalui berbagai perantara, seperti email dan media sosial. Untuk mengatasi permasalahan ini, diperlukan analisis mendalam untuk memahami kemampuan malware dan memberikan langkah mitigasi yang tepat sehingga data informasi tidak dicuri oleh penyerang. Penelitian ini bertujuan menganalisis pengaruh penggunaan Virtual Private Network (VPN) terhadap aplikasi Android ya
APA, Harvard, Vancouver, ISO, and other styles
45

Arzieva, J., and N. Nukusbaev. "Network Security Issues and Effective Protection Against Network Attacks." Bulletin of Science and Practice 7, no. 9 (2021): 479–85. http://dx.doi.org/10.33619/2414-2948/70/45.

Full text
Abstract:
This article defines a VPN as a virtual private network. This technology is based on the formation of an internal network within another network to exchange all information between users in order to provide reliable protection.
APA, Harvard, Vancouver, ISO, and other styles
46

Arfind, Reza, Hendra Supendar, and Riza Fahlapi. "Perancangan Virtual Private Network Dengan Metode PPTP Menggunakan Mikrotik." Jurnal Komputer Antartika 1, no. 3 (2023): 108–16. https://doi.org/10.70052/jka.v1i3.28.

Full text
Abstract:
Perkembangan usaha tekstil sudah semakin meluas, sehingga dalam menopang efektifitas dalam pelaksanaannya membutuhkan koneksi agar saling terhubung antar satu tempat dengan cabang perusahaan lainnya, namun dalam pelaksanaannya perusahaan perlu adanya jaringan yang lebih cepat dan aman untuk saling bertukar data, untuk terciptanya jaringan yang cepat dan aman maka diusulan perancangan Virtual Private Network (VPN) dengan Metode Point to Point Tunnel Protocol (PPTP) menggunakan Mikrotik. Adapun alat yang digunakan yaitu Mikrotik CHR. Dalam pengaplikasiannya Mikrotik CHR akan di jadikan server ya
APA, Harvard, Vancouver, ISO, and other styles
47

Trihadi, Siswa, Frenky Budianto, and Wirriyanto Arifin. "PERANCANGAN VIRTUAL PRIVATE NETWORK DENGAN SERVER LINUX PADA PT. DHARMA GUNA SAKTI." CommIT (Communication and Information Technology) Journal 2, no. 1 (2008): 25. http://dx.doi.org/10.21512/commit.v2i1.488.

Full text
Abstract:
Purpose of this research is to analyze and design a network between head and branch office, andcompany mobile user, which can be used to increase performance and effectiveness of company in doingtheir business process. There were 3 main methods used in this research, which were: library study, analysis,and design method. Library study method was done by searching theoretical sources, knowledge, and otherinformation from books, articles in library, and internet pages. Analysis method was done by doing anobservation on company network, and an interview to acquire description of current business
APA, Harvard, Vancouver, ISO, and other styles
48

Putra, Dwi Prastantio. "ANALISIS KEAMANAN VOICE OVER INTERNET PROTOCOL (VOIP) OVER VIRTUAL PRIVATE NETWORK (VPN)." Jurnal Informatika dan Rekayasa Perangkat Lunak 2, no. 3 (2021): 324–33. http://dx.doi.org/10.33365/jatika.v2i3.1232.

Full text
Abstract:
This research was conducted on the basis of the influence of security systems that play a role in encrypting data on VoIP communication systems, with the security technology of PPTP VPN computer networks with the system passing data in a virtual private ip or as a tunnel for secure data transmission media. The results obtained from security analysis for the implementation of security methods on PPTP VPNs, then the data to help developers in terms of building a secure VoIP communication system. Basiclly ZRTP uses the Diffie-Hellman key exchange as a key exchange of communication between clients
APA, Harvard, Vancouver, ISO, and other styles
49

Hassan, Aslinda, Muhammad Helmi Aqmar Mat Rawi, Mohd Zaki Mas’ud, Maisarah Abu, Zahriladha Zakaria, and Fatemeh Mansourkiaie. "QoS Performance Evaluation of IoT-based Virtual Private Network for UAV Video." Journal of Physics: Conference Series 2319, no. 1 (2022): 012022. http://dx.doi.org/10.1088/1742-6596/2319/1/012022.

Full text
Abstract:
Abstract Unmanned Aerial Vehicles (UAVs) are popular and are used for surveillance and safety purposes, thus often include live video streaming. An attacker with knowledge of the flight controller’s settings can intercept the camera footage/stream. A virtual private network (VPN) connection is considered as one of the solutions in preventing unauthorised interception, but with a cost. In providing end-to-end encryption connection, the VPN connection can slow the wireless connection speed and, thus, impact the real-time streaming. This article describes the implementation of the IoT-based live
APA, Harvard, Vancouver, ISO, and other styles
50

Liu, Tao. "Application and Study of Virtual Private Network Base on L2TP-IPSec." Advanced Materials Research 1044-1045 (October 2014): 1071–74. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1071.

Full text
Abstract:
Using IPSec protocol and VPN technology can be in the open, insecure public network, build a safe and stable communication channel, ensure the safety of data transmission. The communicating peers should implement mutual ID authentication prior to the building up of IPSec channel. Traditional way of IPSec ID authentication is based on “Pre-shared keys”, it has lower security. It makes a detaied analysis on the key technologies in VPN based on IPSec. A design of the IPSec ID authentication building VPN based on certificate is proposed. Finally, in the VMWare simulation experiment has been carrie
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!