To see the other types of publications on this topic, follow the link: Virtual Private Network.

Journal articles on the topic 'Virtual Private Network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Virtual Private Network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Knapp, Laura. "Virtual Private Network Performance." EDPACS 28, no. 7 (2001): 1. http://dx.doi.org/10.1201/1079/43264.28.7.20010101/30378.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wright, Marie A. "Virtual Private Network Security." Network Security 2000, no. 7 (2000): 11–14. http://dx.doi.org/10.1016/s1353-4858(00)07018-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sudipti Banerjee. and Dr. Rajni Ranjan Singh Makwana. "Virtual Private Network: Survey and Research Challenges." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 6 (2025): 211–26. https://doi.org/10.51583/ijltemas.2025.140600028.

Full text
Abstract:
Abstract: The Virtual Private Network (VPN) is a rapidly developing technology that has a crucial function in guaranteeing the secure transfer of data. A virtual linkage is created among geographically distant individuals and networks that are linked through a common or public network, such as the Internet. Despite the fact that data is transmitted via a public network, a Virtual Private Network (VPN) signifies that the data is conveyed through a secure and private connection. Virtual Private Network (VPN) technology enables secure communication between two hosts by creating virtual tunnels. U
APA, Harvard, Vancouver, ISO, and other styles
5

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The perf
APA, Harvard, Vancouver, ISO, and other styles
6

Scott, Charlie, Paul Wolfe, and Mike Erwin. "Virtual Private Networks: Turning the Internet into Your Private Network." EDPACS 27, no. 2 (1999): 16. http://dx.doi.org/10.1201/1079/43248.27.2.19990801/30263.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Anggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.

Full text
Abstract:
Virtual Private Network (VPN) is a form of private network through a public network by focusing on the security of the encrypted data in it. This research uses Cisco Packet Tracere software as a computer network technology simulation tool. Cisco Packet Tracker is a device in network technology simulation that functions for creation and development in networks. The purpose of this research is to create a VPN simulation using a star topology with Cisco Packet Tracer software. Star topology is a star-shaped topology, where each node is to the centre. The method used is a qualitative method with d
APA, Harvard, Vancouver, ISO, and other styles
8

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Full text
Abstract:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for or
APA, Harvard, Vancouver, ISO, and other styles
9

TAKEDA, T., R. MATSUZAKI, I. INOUE, and S. URUSHIDANI. "Network Design Scheme for Virtual Private Network Services." IEICE Transactions on Communications E89-B, no. 11 (2006): 3046–54. http://dx.doi.org/10.1093/ietcom/e89-b.11.3046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sobh, Tarek S., and Yasser Aly. "Effective and Extensive Virtual Private Network." Journal of Information Security 02, no. 01 (2011): 39–49. http://dx.doi.org/10.4236/jis.2011.21004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Crocetti, P., S. Fotedar, L. Fratta, G. Gallassi, and M. Gerla. "ATM virtual private network design alternatives." Computer Communications 18, no. 1 (1995): 24–31. http://dx.doi.org/10.1016/0140-3664(94)00748-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Su, Y., Y. Tian, E. Wong, N. Nadarajah, and C. C. K. Chan. "All-optical virtual private network in passive optical networks." Laser & Photonics Review 2, no. 6 (2008): 460–79. http://dx.doi.org/10.1002/lpor.200810021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Fu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (2024): 2674. http://dx.doi.org/10.3390/electronics13132674.

Full text
Abstract:
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network (VPN) and SDN architecture to leverage the controllability and programmability of SDN, which are only applicable for specific platforms and do not comply with the extensibility of SDN. This paper motivates us to refactor traditional VPNs with SDN architect
APA, Harvard, Vancouver, ISO, and other styles
14

., Ekwe O. A. "VIRTUAL PRIVATE NETWORK: A VERITABLE TOOL FOR NETWORK SECURITY." International Journal of Research in Engineering and Technology 03, no. 05 (2014): 319–22. http://dx.doi.org/10.15623/ijret.2014.0305060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Khan, Yusera Farooq. "Cisco Secured Virtual Private Networks: A Review." Asian Journal of Computer Science and Technology 7, no. 2 (2018): 30–33. http://dx.doi.org/10.51983/ajcst-2018.7.2.1886.

Full text
Abstract:
Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private networ
APA, Harvard, Vancouver, ISO, and other styles
16

Lizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.

Full text
Abstract:
Aplikasi Sistem Informasi yang ada di SMK Labor Binaan FKIP UNRI telah dapat menunjang proses keputusan yang akurat. Aplikasi Sistem Informasi tersebut bisa di akses melalui internet secara private dengan teknologi VPN ( Virtual Private Network), tetapi penggunaannya belum bisa di pantau secara spesifik oleh administrator jaringan, sehiingga perlu untuk membangunkan suatu sistem traffic monitoring dengan menggunakan Simple Network Management Protocol (SNMP) dalam mengimplementasikan aplikasi untuk melakukan pengamatan penggunaan lalu lintas data internet dari parameter yang ada pada jaringan V
APA, Harvard, Vancouver, ISO, and other styles
17

Faizal, Faizal, and Andi Irmayana. "Sistem Persuratan Digital Berbasis Virtual Private Network." DoubleClick: Journal of Computer and Information Technology 5, no. 1 (2021): 33. http://dx.doi.org/10.25273/doubleclick.v5i1.9121.

Full text
Abstract:
<span>Persoalan mengenai persuratan yang dialami oleh instansi pemerintah, organisasi dan perusahaan swasta yang terkendala dalam proses database surat masuk dan surat keluar yang dilakukan secara manual. Ada berbagai kendala seperti pendistribusian surat yang tidak efekif, surat tercecer, dan pengarsipan yang tidak rapi sehingga manajemen arsip persuratan tidak terkontrol. Penelitian ini bertujuan merancang sebuah digital proses untuk memperbaharui sistem persuratan pada Karang Taruna Provinsi Sulawesi Selatan agar dokumen verifikasi, persuratan organisasi dan pertukaran Informasi antar
APA, Harvard, Vancouver, ISO, and other styles
18

Chou, David C., David C. Yen, and Amy Y. Chou. "Adopting virtual private network for electronic commerce." Industrial Management & Data Systems 105, no. 2 (2005): 223–36. http://dx.doi.org/10.1108/02635570510583343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Keng Lim, L., Jun Gao, T. S. Eugene Ng, Prashant R. Chandra, Peter Steenkiste, and Hui Zhang. "Customizable virtual private network service with QoS." Computer Networks 36, no. 2-3 (2001): 137–51. http://dx.doi.org/10.1016/s1389-1286(01)00173-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Eisenbrand, Friedrich, Fabrizio Grandoni, Gianpaolo Oriolo, and Martin Skutella. "New Approaches for Virtual Private Network Design." SIAM Journal on Computing 37, no. 3 (2007): 706–21. http://dx.doi.org/10.1137/060654827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Altın, A., E. Amaldi, P. Belotti, and M. Ç. Pınar. "Virtual Private Network Design Under Traffic Uncertainty." Electronic Notes in Discrete Mathematics 17 (October 2004): 19–22. http://dx.doi.org/10.1016/j.endm.2004.03.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kang, Sunyoung, Hyuncheol Kim, and Seungae Kang. "Virtual private network for wellness sports information." Multimedia Tools and Applications 74, no. 16 (2014): 6497–507. http://dx.doi.org/10.1007/s11042-014-2096-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Yu, Wei, and Jian Wang. "Scalable network resource management for large scale Virtual Private Networks." Simulation Modelling Practice and Theory 12, no. 3-4 (2004): 263–85. http://dx.doi.org/10.1016/j.simpat.2004.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Kande, Santosh Kumar. "VPN Usage Monitoring: Investigating User Browsing Behavior While Connected to VPN to Enhance Network Security." Journal of Artificial Intelligence & Cloud Computing 2, no. 1 (2023): 1–2. https://doi.org/10.47363/jaicc/2023(2)411.

Full text
Abstract:
Virtual Private Networks (VPNs) are critical tools for maintaining secure communication and privacy. However, encrypted VPN traffic can create blind spots for network monitoring, increasing organizational vulnerability to threats such as data breaches and policy violations.
APA, Harvard, Vancouver, ISO, and other styles
25

Marzuki, Khairan, Muhammad Idham Kholid, I. Putu Hariyadi, and Lalu Zazuli Azhar Mardedi. "Automation of Open VSwitch-Based Virtual Network Configuration Using Ansible on Proxmox Virtual Environment." International Journal of Electronics and Communications Systems 3, no. 1 (2023): 11. http://dx.doi.org/10.24042/ijecs.v3i1.16524.

Full text
Abstract:
Proxmox has a feature that can build a private network in it. Each host on a private network on Proxmox generally shares physical resources, including network connections using a virtual network, one of which is a VLAN. The Proxmox server supports Open VSwitch as a virtual switch. Open virtual switch, an alternative virtual switch quite popular among cloud developers, can be a solution for managing traffic between Virtual Machins and external communications. The method used in this study is the Network Development Life Cycle (NDLC). After applying the automation engine using Ansible, it overca
APA, Harvard, Vancouver, ISO, and other styles
26

Ekawati, Inna, and Dadan Irwan. "Implementasi Virtual Private Network Menggunakan PPTP Berbasis Mikrotik." JREC (Journal of Electrical and Electronics) 9, no. 1 (2021): 41–48. http://dx.doi.org/10.33558/jrec.v9i1.3110.

Full text
Abstract:
Pemanfaatan teknologi komunikasi dan informasi perlu diterapkan pada instansi yang saat ini masih menggunakan sistem manual dan mengharuskan administrator untuk mengakses router dan memantau traffic internet secara langsung pada server. Virtual private network bersifat private dimana pada dasarnya jaringan ini tidak ada secara fisik, namun hanya berupa jaringan virtual, sehingga tidak semua orang dapat mengaksesnya. Selain jaringan internet, virtual private network juga diperlukan oleh perusahaan sebagai jaringan pribadi dengan jalur khusus yang bersifat lebih aman untuk mengakses jaringan lok
APA, Harvard, Vancouver, ISO, and other styles
27

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Full text
Abstract:
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Int
APA, Harvard, Vancouver, ISO, and other styles
28

Immidisetti, Venkata Raman. "Azure private DNS zones: Architecture, Implementation Best Practices, And Organizational Use Cases." International Journal of Multidisciplinary Research and Growth Evaluation. 2, no. 6 (2021): 446–49. https://doi.org/10.54660/.ijmrge.2021.2.6.446-449.

Full text
Abstract:
As enterprises transition to cloud-based infrastructures, efficient and secure domain name resolution becomes critical for ensuring seamless network operations. Azure Private DNS Zones offer a robust solution by enabling private domain name resolution within virtual networks (VNets) without exposing DNS records to the public internet. This study examines the architecture of Azure Private DNS Zones, including key concepts such as virtual network links, private DNS records, and integration with Azure services. It also presents practical use cases, such as hybrid cloud deployments, multi-VNet arc
APA, Harvard, Vancouver, ISO, and other styles
29

Spiekermann, Daniel, Tobias Eggendorfer, and Jörg Keller. "Deep Learning for Network Intrusion Detection in Virtual Networks." Electronics 13, no. 18 (2024): 3617. http://dx.doi.org/10.3390/electronics13183617.

Full text
Abstract:
As organizations increasingly adopt virtualized environments for enhanced flexibility and scalability, securing virtual networks has become a critical part of current infrastructures. This research paper addresses the challenges related to intrusion detection in virtual networks, with a focus on various deep learning techniques. Since physical networks do not use encapsulation, but virtual networks do, packet analysis based on rules or machine learning outcomes for physical networks cannot be transferred directly to virtual environments. Encapsulation methods in current virtual networks includ
APA, Harvard, Vancouver, ISO, and other styles
30

Nagaraj, Rathod, Akkala Abhilasha, and seekoli Avinash. "Amazon virtual private cloud experimental and application." IJRSET MAY Volume 10 Issue 5 10, no. 5 (2023): 10–18. https://doi.org/10.5281/zenodo.8382910.

Full text
Abstract:
Amazon Virtual Private Cloud  lets you create a secure, private network utilising Amazon VPC. Using AWS' scalable architecture, this virtual network is almost identical to one you would find in your own data centre. To create, access, and manage VPCs, you may make use of any of the following APIs: Using the AWS Management Console, you may manage your virtual private networks . Using the CLI, you may access all of AWS's services, including VPC. Many of the complexities of a connection, such as calculating signatures, retrying requests, and fixing issues, are handled by the AWS
APA, Harvard, Vancouver, ISO, and other styles
31

Patibandla, Kondala Rao. "Design and Create VPC in AWS." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 1, no. 1 (2024): 273–82. http://dx.doi.org/10.60087/jaigs.v1i1.208.

Full text
Abstract:
This article describes the design and creation of Amazon Virtual Private Network (VPC) using the VPC Designer tool and Cloud Formation templates. It also provides details of VPC Components such as Subnets, Route tables, Security Groups, Internet Gateway, NAT Gateway, VPC endpoints, Network Interfaces, Network Access Control Lists (ACLs), and VPC Peering. Amazon Virtual Private Cloud (VPC) enables you to create your own dedicated, logically isolated virtual private network in your AWS account. This virtual network closely resembles a traditional network that you operate in your data center (on-
APA, Harvard, Vancouver, ISO, and other styles
32

Lota, Stanislaw, and Marcin Markowski. "Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000V in a Private Cloud Environment." Journal of Applied Computer Science Methods 7, no. 2 (2015): 117–32. http://dx.doi.org/10.1515/jacsm-2015-0013.

Full text
Abstract:
Abstract Virtualization of physical network devices is a relatively new technology, that allows to improve the network organization and gives new possibilities for Software Defined Networking (SDN). Network virtualization is also commonly used for testing and debugging environments, before implementing new designs in production networks. Important aspect of network virtualization is selecting virtual platform and technology, that offer maximal performance with minimal physical resource utilization. This article presents a comparative analysis of performance of the virtual network created by th
APA, Harvard, Vancouver, ISO, and other styles
33

Qu, Liang Dong, Xin Yu Cui, and Xiao Nan Liu. "A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network." Applied Mechanics and Materials 475-476 (December 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.

Full text
Abstract:
Vehicle information system is the data center of vehicle communication networks, and the vehicle gateway is the core of the vehicle information system, in order to support the vehicle information system both WLAN and CDMA interfaces, a virtual network device (VND) in Linux embedded System is designed and implemented as a mid-layer module between the real device driver and internet protocol stack called driver middleware. The VND can establish a virtual private network between the vehicle information device and agent server. The virtual network interface is designed to catch the packets both in
APA, Harvard, Vancouver, ISO, and other styles
34

Krile, Srecko, and Martin Medvecky. "Virtual Network Construction Technique, Treating All VPNs Simultaneously." Elektronika ir Elektrotechnika 26, no. 2 (2020): 77–84. http://dx.doi.org/10.5755/j01.eie.26.2.22981.

Full text
Abstract:
In the paper, a new construction technique for virtual network (e.g., Virtual Private Network (VPN)) based on flow permutation algorithm is proposed. In existing methods for creating virtual networks, whereby virtual networks are constructed one by one in time and the new virtual network can use only the remaining resources, it could be non-optimal. Our approach treats all traffic flows simultaneously and is capable of balancing the network much better than other existing techniques. As we show, the proposed new construction technique work well, even in the condition of hard loaded networks op
APA, Harvard, Vancouver, ISO, and other styles
35

Sari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.

Full text
Abstract:
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN). The descriptive qualitative research used in this study was carried out at the lab of SMK Negeri 1 Ampek Angkek. Data were gathered through observation, interviews, and document analysis studies. The method of data analysis employed descriptive analysis. The results of this study indicate that the activity on the VPN network is better than the Non-VPN because the activitie
APA, Harvard, Vancouver, ISO, and other styles
36

Shi, Baohui. "Computer Network Information Security Protection Based on Virtual Private Network." Journal of Physics: Conference Series 1646 (September 2020): 012121. http://dx.doi.org/10.1088/1742-6596/1646/1/012121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Makhija, Deven. "5G Communication Systems: Network Slicing and Virtual Private Network Architecture." ITM Web of Conferences 54 (2023): 02001. http://dx.doi.org/10.1051/itmconf/20235402001.

Full text
Abstract:
5G communication systems are being rolled out with multiple technological solutions and applications being fielded on existing as well as enhanced infrastructure. The utilization of 5G systems and infrastructure by verticals over different platforms as well as industries is achieved with slicing. Slicing in 5G provides guaranteed resources for end users of vertical industries and applications over varied platforms, architecture, and infrastructure. Standards for network slicing in 5G have been formulated by 3GPP and further specifications are being released. Implementation of slicing at variou
APA, Harvard, Vancouver, ISO, and other styles
38

Timberg, Chris, Leah Liebovitz, and Ben Miller. "The Private Virtual Network Operator Model for Field Area Network." Climate and Energy 40, no. 6 (2023): 8–16. http://dx.doi.org/10.1002/gas.22381.

Full text
Abstract:
Uninterrupted grid edge connectivity is essential for distribution utilities driving towards a future where efficient, secure, and reliable field area network (FAN) operation is not just preferable but required. Communications and network connectivity have been rapidly evolving over the last several years and will continue to do so—including in the areas of spectrum options, carrier solutions, device manufacturers, core manufacturers, and network management options. Utilities have a greater choice of options to deploy, while needing to remain prudent in their investments. One of the options ga
APA, Harvard, Vancouver, ISO, and other styles
39

Dayana, D. S. "An Efficient Approach for Network Mobility Based on AES Algorithm." Advanced Materials Research 984-985 (July 2014): 1269–75. http://dx.doi.org/10.4028/www.scientific.net/amr.984-985.1269.

Full text
Abstract:
Users interested to use the Internet from anywhere and at any time. For this purpose, the Internet Engineering Task Force proposed the concept of network mobility. But the IETF’s mobile Virtual Private Network does not support for real time applications. In this paper, the user’s communication between public networks and the private networks can be secured by using Virtual Private Network gateway. This secured user’s communication is based on Session Initiation Protocol and AES algorithm. The security impact is computed analytically and the performance is simulated. The signaling cost can also
APA, Harvard, Vancouver, ISO, and other styles
40

Miller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.

Full text
Abstract:
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the present
APA, Harvard, Vancouver, ISO, and other styles
41

Bhat, Anjum Zameer, and Imran Ahmed. "A Simulation Environment for enhancing the student experience in advanced networking concepts." SHS Web of Conferences 156 (2023): 07003. http://dx.doi.org/10.1051/shsconf/202315607003.

Full text
Abstract:
Several subjects in Computer science necessitate practical and realistic classes in addition to supporting the theoretical underpinning taught to the students. In various subjects’ practical exposure & skill is imperative to meet the industry requirements. However, educational establishments can't provide an out-and-out environment for every student to practice. Providing an appropriate Lab for apprentices that bestows desired exposure and feel of a real Network has been a challenging task for every educational establishment. Virtual Labs have been a major milestone and are effectively imp
APA, Harvard, Vancouver, ISO, and other styles
42

Rana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.

Full text
Abstract:
In recent years, network developments and user growth have increased network security problems and techniques. The trend in network security is towards web-based networks, given Internet users' diverse origins, unpredictable persons are more likely to participate in malevolent activities. Security and privacy safeguards are implemented using many technologies. This paper proposes using a virtual private network (VPN) to secure particular communications across vast networks. VPNs restrict unauthorised connections, benefiting secured hosts. Through a VPN network, connections can be kept hidden a
APA, Harvard, Vancouver, ISO, and other styles
43

Usanto, Usanto. "RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 2 (2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.

Full text
Abstract:
The use of wireless media such as the internet in building computer networks is so widely used. However, performance and security must also be considered. VPN (Virtual Private Network) is one of the methods in network security that works by creating a tunnel so that a trusted network can connect to networks outside via the internet. PT. Laris Manis Utama is a private company engaged in the field of fresh fruits export-import and distributor. And already has several branch offices located outside the city. Designing a VPN (Virtual Private Network) with a Site to site (OpenVPN) system at PT. Lar
APA, Harvard, Vancouver, ISO, and other styles
44

Álvarez, David, Pelayo Nuño, Carlos T. González, Francisco G. Bulnes, Juan C. Granda, and Dan García-Carrillo. "Performance Analysis of Software-Defined Networks to Mitigate Private VLAN Attacks." Sensors 23, no. 4 (2023): 1747. http://dx.doi.org/10.3390/s23041747.

Full text
Abstract:
The defence-in-depth (DiD) methodology is a defensive approach usually performed by network administrators to implement secure networks by layering and segmenting them. Typically, segmentation is implemented in the second layer using the standard virtual local area networks (VLANs) or private virtual local area networks (PVLANs). Although defence in depth is usually manageable in small networks, it is not easily scalable to larger environments. Software-defined networks (SDNs) are emerging technologies that can be very helpful when performing network segmentation in such environments. In this
APA, Harvard, Vancouver, ISO, and other styles
45

Roşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.

Full text
Abstract:
In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enter
APA, Harvard, Vancouver, ISO, and other styles
46

Sobh, Tarek S., and Awad H. Khalil. "Securing Wargames System Using Effective Virtual Private Network." Recent Patents on Computer Science 11, no. 4 (2018): 289–301. http://dx.doi.org/10.2174/2213275911666181002140451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Iryani, Nanda, and Dyas Dendi Andika. "Implementasi Dynamic Multipoint Virtual Private Network Dual Hub." Jurnal Telekomunikasi dan Komputer 11, no. 2 (2021): 118. http://dx.doi.org/10.22441/incomtech.v11i2.10839.

Full text
Abstract:
Pesatnya perkembangan internet berdampak ke semua elemen orang yang memunculkan kebutuhan baru bagaimana menggunakan internet dengan cepat dan aman terutama bagi suatu perusahaan yang ingin terhubung dengan cabangnya. DMVPN menghadirkan sebuah solusi bagaimana menhubungkan beberapa perusahaan secara dinamis, fleksibel,cepat dan aman. Penelitian ini berusaha untuk mengimplementasikan DMVPN dengan routing IGP link state dan distance vector. Model pada penelitian akan menerapkan juga konsep bernama high availability yang akan menghasilkan ketersediaan yang tetap tinggi bahkan ketika salah satu pe
APA, Harvard, Vancouver, ISO, and other styles
48

Ben-Yacoub, Leila Lamti. "On managing traffic over virtual private network links." Journal of Communications and Networks 2, no. 2 (2000): 138–46. http://dx.doi.org/10.1109/jcn.2000.6596734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Suryani, Erma, and Syamsu Nur Row Honey. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK - WAN DALAM DUNIA BISNIS." JUTI: Jurnal Ilmiah Teknologi Informasi 6, no. 1 (2007): 31. http://dx.doi.org/10.12962/j24068535.v6i1.a185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Cui, Wei, and Mostafa A. Bassiouni. "Virtual private network bandwidth management with traffic prediction." Computer Networks 42, no. 6 (2003): 765–78. http://dx.doi.org/10.1016/s1389-1286(03)00217-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!