To see the other types of publications on this topic, follow the link: Virtual private networks (VPN).

Journal articles on the topic 'Virtual private networks (VPN)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Virtual private networks (VPN).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The perf
APA, Harvard, Vancouver, ISO, and other styles
2

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova, and Bulbul Ongar. "USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS." Series of Geology and Technical Sciences 447, no. 3 (2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Full text
Abstract:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for or
APA, Harvard, Vancouver, ISO, and other styles
3

Sudipti Banerjee. and Dr. Rajni Ranjan Singh Makwana. "Virtual Private Network: Survey and Research Challenges." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 6 (2025): 211–26. https://doi.org/10.51583/ijltemas.2025.140600028.

Full text
Abstract:
Abstract: The Virtual Private Network (VPN) is a rapidly developing technology that has a crucial function in guaranteeing the secure transfer of data. A virtual linkage is created among geographically distant individuals and networks that are linked through a common or public network, such as the Internet. Despite the fact that data is transmitted via a public network, a Virtual Private Network (VPN) signifies that the data is conveyed through a secure and private connection. Virtual Private Network (VPN) technology enables secure communication between two hosts by creating virtual tunnels. U
APA, Harvard, Vancouver, ISO, and other styles
4

Nay, Thaker. "Securing Virtual Private Networks Against Cyber Threats Using Feedforward Neural Networks." Babylonian Journal of Networking 2025 (July 21, 2025): 97–105. https://doi.org/10.58496/bjn/2025/008.

Full text
Abstract:
The virtual private communication channels are now commonly used over the internet and the overall trend of internet growth is also used as a server to carry the clients of VPN. Virtual Private Networks (VPN's) are central to secure and encrypted communication over both public and private networks. Nonetheless, conventional VPNs lack the ability of detecting and coping with advanced cyber-attacks. In this paper, we propose a new architecture that combines with FFNN architecture in the VPN system to improve VPN based on cyber-event real-time detection and reaction to the threat and intrusion de
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Kyung-Muk, and Hae-Sool Yang. "VPN (Virtual Private Network) SW's examination example analysis." Journal of the Korea Academia-Industrial cooperation Society 11, no. 8 (2010): 3012–20. http://dx.doi.org/10.5762/kais.2010.11.8.3012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (2024): 2674. http://dx.doi.org/10.3390/electronics13132674.

Full text
Abstract:
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network (VPN) and SDN architecture to leverage the controllability and programmability of SDN, which are only applicable for specific platforms and do not comply with the extensibility of SDN. This paper motivates us to refactor traditional VPNs with SDN architect
APA, Harvard, Vancouver, ISO, and other styles
7

Peng, Kai. "Construction and Exploration of Corporate Virtual Private Networks." Advanced Engineering Forum 6-7 (September 2012): 964–67. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.964.

Full text
Abstract:
With the further development of Internet, VPN technology would provide high-quality and low-cost wide-area data network, and would be safer than the majority of corporate special network. Main purpose of VPN technology is to save communication expenses for enterprises, especially replace existing special lines of enterprises and reduce communication cost. With constant mergers and acquisitions of enterprises and the occurrence of new relationship between enterprises and employees, traditional corporate network mode faces challenges. One solution is to use virtual private network when construct
APA, Harvard, Vancouver, ISO, and other styles
8

Mixon-Baca, Benjamin, Jeffrey Knockel, Diwen Xue, et al. "Attacking Connection Tracking Frameworks as used by Virtual Private Networks." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 109–26. http://dx.doi.org/10.56553/popets-2024-0070.

Full text
Abstract:
VPNs (Virtual Private Networks) have become an essential privacy-enhancing technology, particularly for at-risk users like dissidents, journalists, NGOs, and others vulnerable to targeted threats. While previous research investigating VPN security has focused on cryptographic strength or traffic leakages, there remains a gap in understanding how lower-level primitives fundamental to VPN operations, like connection tracking, might undermine the security and privacy that VPNs are intended to provide. In this paper, we examine the connection tracking frameworks used in common operating systems, i
APA, Harvard, Vancouver, ISO, and other styles
9

Anggie Maulia, Aldi Fadilla Ramadhan, Andi Purwanto, Apipah Apipah, and Didik Aribowo. "Simulasi Virtual Private Network Dengan Topologi Star." Jurnal Penelitian Teknologi Informasi dan Sains 2, no. 2 (2024): 54–66. http://dx.doi.org/10.54066/jptis.v2i2.1865.

Full text
Abstract:
Virtual Private Network (VPN) is a form of private network through a public network by focusing on the security of the encrypted data in it. This research uses Cisco Packet Tracere software as a computer network technology simulation tool. Cisco Packet Tracker is a device in network technology simulation that functions for creation and development in networks. The purpose of this research is to create a VPN simulation using a star topology with Cisco Packet Tracer software. Star topology is a star-shaped topology, where each node is to the centre. The method used is a qualitative method with d
APA, Harvard, Vancouver, ISO, and other styles
10

Abdulazeez, Adnan Mohsin, Baraa Wasfi Salim, Diyar Qader Zeebaree, and Dana Doghramachi. "Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 18 (2020): 157. http://dx.doi.org/10.3991/ijim.v14i18.16507.

Full text
Abstract:
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Int
APA, Harvard, Vancouver, ISO, and other styles
11

Kande, Santosh Kumar. "VPN Usage Monitoring: Investigating User Browsing Behavior While Connected to VPN to Enhance Network Security." Journal of Artificial Intelligence & Cloud Computing 2, no. 1 (2023): 1–2. https://doi.org/10.47363/jaicc/2023(2)411.

Full text
Abstract:
Virtual Private Networks (VPNs) are critical tools for maintaining secure communication and privacy. However, encrypted VPN traffic can create blind spots for network monitoring, increasing organizational vulnerability to threats such as data breaches and policy violations.
APA, Harvard, Vancouver, ISO, and other styles
12

Manouselis, Nikos, and Andreas M. Maras. "Multi-attribute Services Brokering in Agent-based Virtual Private Networks." Computing Letters 1, no. 3 (2005): 137–43. http://dx.doi.org/10.1163/1574040054861230.

Full text
Abstract:
This paper presents the development of an agent-based Virtual Private Network (VPN) system that supports multimedia service brokering. The VPN agents employ multi-attribute preference models in order to represent the end-user preferences, and a multi-criteria decision making model to evaluate available services from network providers. A prototype multi-agent system demonstrating the proposed approach has also been implemented.
APA, Harvard, Vancouver, ISO, and other styles
13

Rana Abdul Kadhim Mahdi. "Using Deep Learning Technology to Optimize VPN Networks Based on Security Performance." Journal of Electrical Systems 20, no. 4s (2024): 1894–903. http://dx.doi.org/10.52783/jes.2279.

Full text
Abstract:
In recent years, network developments and user growth have increased network security problems and techniques. The trend in network security is towards web-based networks, given Internet users' diverse origins, unpredictable persons are more likely to participate in malevolent activities. Security and privacy safeguards are implemented using many technologies. This paper proposes using a virtual private network (VPN) to secure particular communications across vast networks. VPNs restrict unauthorised connections, benefiting secured hosts. Through a VPN network, connections can be kept hidden a
APA, Harvard, Vancouver, ISO, and other styles
14

Anwar, Rian Septian, and Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.

Full text
Abstract:
Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus dito
APA, Harvard, Vancouver, ISO, and other styles
15

Nourildean, Shayma W. "Virtual Private Network—Firewall Integration for Wireless Local Area Network Improvement against Jammers." International Journal of Electrical and Electronic Engineering & Telecommunications 13, no. 1 (2024): 58–66. http://dx.doi.org/10.18178/ijeetc.13.1.58-66.

Full text
Abstract:
Wireless networks are susceptible to many security problems since the wireless medium is open. Jammer (jamming attack) is the most important problems in wireless networks. It is denial-of-service attack in which attackers send malicious signals or messages on a channel that is intended for normal traffic by intentionally interfering with the network. One of the solutions is the development of tunneling technology as an attempt to secure communication networks. Virtual Private Network (VPN) tunneling technology when integrated with firewall would provide a suitable security. In this study, numb
APA, Harvard, Vancouver, ISO, and other styles
16

Fatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) provide remotely secure connection for clients to exchange information with company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity using GNS3 Network simulator. The testing and verification analyzing of data packets is done using both PING tool and Wireshark to ensure the encryption of data packets during data exchange between different sites belong to the same company.
APA, Harvard, Vancouver, ISO, and other styles
17

Umaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.

Full text
Abstract:
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data, data reduction, data presentation and drawing conclusions. While the validity of the data was obtained through triangulation. The results showed that the use of VPN in the UNISMA Library to speed up internet connection and data privacy. UNISMA library uses a proxy server router operating system for VPN networks. To be able to make Mikrotik a V
APA, Harvard, Vancouver, ISO, and other styles
18

Dewi, Sari, and Dwi Yuni Utami. "Implementing Virtual Private Network (VPN) Network Security Using A Mikrotik Router." Journal of Information System, Informatics and Computing 8, no. 2 (2024): 220. https://doi.org/10.52362/jisicom.v8i2.1653.

Full text
Abstract:
Setiap aspek dalam perusahan membutuhkan jaringan lokal dan jaringan internet untuk mengolah data dan mempermudah pekerjaan kantor selalu membutuhkan teknologi jaringan komputer. Seiring berkembangnya teknologi, tuntutan terhadap keamanan data dan informasi pun ikut berkembang. Virtual Private Networks (VPN) adalah teknologi yang sering digunakan yang dapat menawarkan tingkat perlindungan ekstra terhadap transfer data melalui jaringan publik. Tujuan dari penelitian ini adalah menggunakan MikroTik Router OS sebagai gateway untuk menyelidiki dan mengimplementasikan keamanan jaringan VPN. PT. Tif
APA, Harvard, Vancouver, ISO, and other styles
19

Salman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator. The testing, verification analyzing of data packets of the network is done using both PING tool and Wireshark.
APA, Harvard, Vancouver, ISO, and other styles
20

Tulegenova, E. N., A. B. Adranova, and K. Abildakhan. "LIMITING EFFECT OF NETWORK RESOURCES ON VPN IMPLEMENTATION." Bulletin of the Korkyt Ata Kyzylorda University 60, no. 1 (2022): 146–51. http://dx.doi.org/10.52081/bkaku.2022.v60.i1.018.

Full text
Abstract:
In the modern conditions of developed information systems, the advantages of creating virtual private networks cannot be underestimated. But before mentioning the clearest and most useful ways to create virtual private networks, it is necessary to understand its meaning. Nowadays, the question of how to communicate with the corporate information system is important for users. Here they will need a broadband connection, regardless of whether they use a fixed network or Wi-Fi, as it is not uncommon for users to work on the road. Today, virtual technologies are becoming more popular, they occupy
APA, Harvard, Vancouver, ISO, and other styles
21

Gorre, Tejasvi. "Analyzing The Impact of Virtual Private Networks (VPNS) On Online Security Using The DEMATEL Method." Journal of Data Science and Information Technology 1, no. 1 (2024): 10–23. https://doi.org/10.55124/jdit.v1i1.239.

Full text
Abstract:
A Virtual Private Network (VPN) is a technology that enhances online privacy and security by establishing a secure, encrypted connection between a user's device and a remote server. Acting as a protective tunnel, a VPN routes the user's internet traffic through this encrypted connection, shielding their data from potential cyber threats, surveillance, and unauthorized access. VPNs serve as powerful tools for safeguarding sensitive information, especially when using public Wi-Fi networks, as they prevent hackers or malicious entities from intercepting data transmissions. Additionally, VPNs allo
APA, Harvard, Vancouver, ISO, and other styles
22

Novanto, Mukhammad Rizki, Joseph Dedy Irawan, and F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 1 (2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.

Full text
Abstract:
Tidak bisa dipungkiri semenjak pandemi virus Covid-19 kegiatan internet terus menjadi bertambah. Semacam halnya bekerja dari rumah memakai internet, belajar daring memakai internet, komunikasi social media memakai internet, belanja online di pasar online dengan internet, sampai mencari data lewat internet. Kebutuhan internet terus menjadi bertambah, tidak hanya harga virtual private server yang disediakan provider lokal relatif mahal serta instalasi sampai operasional membutuhkan banyak tahapan, semacam wajib menginstal script guna berjalannya protocol pada VPS sehingga dibutuhkannya sesuatu s
APA, Harvard, Vancouver, ISO, and other styles
23

Sari, Yosi Nofita, Dedy Irfan, and Asrul Huda. "Network Security Analysis Using Virtual Private Network in Vocational School." Jurnal Paedagogy 9, no. 3 (2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.

Full text
Abstract:
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN). The descriptive qualitative research used in this study was carried out at the lab of SMK Negeri 1 Ampek Angkek. Data were gathered through observation, interviews, and document analysis studies. The method of data analysis employed descriptive analysis. The results of this study indicate that the activity on the VPN network is better than the Non-VPN because the activitie
APA, Harvard, Vancouver, ISO, and other styles
24

S, Sujatha. "Detection of Virtual Private Networks Encrypted Traffic using Machine and Ensemble Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5636–42. http://dx.doi.org/10.22214/ijraset.2024.61288.

Full text
Abstract:
Abstract: The widespread adoption of Virtual Private Networks (VPNs) for secure communication over public networks has highlighted the need for accurate detection of encrypted network traffic. This study proposes a comprehensive approach utilizing machine and ensemble learning algorithms to address this detection challenge. Leveraging the ISCX VPN dataset, the project aims to develop a robust system capable of distinguishing between VPN and non-VPN traffic with high accuracy. Key stages include data acquisition, preprocessing, feature extraction, and model training using Decision Tree, Naive B
APA, Harvard, Vancouver, ISO, and other styles
25

Lian, Hongbing, and András Faragó. "Optimizing Virtual Private Network Design Using a New Heuristic Optimization Method." ISRN Communications and Networking 2012 (August 23, 2012): 1–9. http://dx.doi.org/10.5402/2012/914953.

Full text
Abstract:
In virtual private network (VPN) design, the goal is to implement a logical overlay network on top of a given physical network. We model the traffic loss caused by blocking not only on isolated links, but also at the network level. A successful model that captures the considered network level phenomenon is the well-known reduced load approximation. We consider here the optimization problem of maximizing the carried traffic in the VPN. This is a hard optimization problem. To deal with it, we introduce a heuristic local search technique called landscape smoothing search (LSS). This study first d
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu, and Bo Li. "An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN." Photonic Network Communications 7, no. 3 (2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Miller, Shane, Kevin Curran, and Tom Lunney. "Detection of Virtual Private Network Traffic Using Machine Learning." International Journal of Wireless Networks and Broadband Technologies 9, no. 2 (2020): 60–80. http://dx.doi.org/10.4018/ijwnbt.2020070104.

Full text
Abstract:
The detection of unauthorized users can be problematic for techniques that are available at present if the nefarious actors are using identity hiding tools such as anonymising proxies or virtual private networks (VPNs). This work presents computational models to address the limitations currently experienced in detecting VPN traffic. A model to detect usage of VPNs was developed using a multi-layered perceptron neural network that was trained using flow statistics data found in the transmission control protocol (TCP) header of captured network packets. Validation testing showed that the present
APA, Harvard, Vancouver, ISO, and other styles
28

Rendy, Munadi, Dwi Sanjoyo Danu, Perdana Doan, and Adjie Fidar. "Performance analysis of tunnel broker through open virtual private network." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1185–92. https://doi.org/10.12928/TELKOMNIKA.v17i3.12231.

Full text
Abstract:
Tunnel Broker uses automatic configuration tunneling mechanism for IPv6 clients connected to IPv4 internet. Connectivity between clients and service providers in IPv6 is urgently needed. Open VPN as a provider implemented configures it by a VPN network, so IPv6 and IPv4 public IP clients can easily connect to the server. In this research focused on the performance of tunnel broker mechanism by utilizing open VPN as access to the network. IPv6 tunnel broker is developed by installing Open VPN and providing IPv6 IPs. Implementation of public IP usage in observing the performance of tunnel broker
APA, Harvard, Vancouver, ISO, and other styles
29

Sun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.

Full text
Abstract:
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer-organized public VPN relay system launched in 2013. By analyzing the security of the system, we have found that there is a man-in-the-middle attack risk because an attacker may hijack a VPN session and decrypt the traffic. According to our study, the reason of the security issues is the misuse of the SSL certificate. To
APA, Harvard, Vancouver, ISO, and other styles
30

Fauzan Prasetyo Eka Putra, Yogi Setiawan, Samsul Arifin, and Wahyu Hidayatullah. "Peran VPN dalam Menjaga Privasi Pengguna Jaringan Publik." Jurnal Informatika Dan Tekonologi Komputer (JITEK) 5, no. 1 (2025): 27–33. https://doi.org/10.55606/jitek.v5i1.5834.

Full text
Abstract:
The use of public networks such as free Wi-Fi is increasingly widespread along with the development of information technology. However, public networks have a high level of vulnerability to security threats such as data interception attacks in the center, and session hijacking. This study aims to examine the role of Virtual Private Network (VPN) in maintaining user privacy when accessing public networks. The method used is a literature study with a descriptive qualitative approach, based on academic literature, research reports, and the latest technical documentation. The results of the study
APA, Harvard, Vancouver, ISO, and other styles
31

Andini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.

Full text
Abstract:
The discovery of a Virtual Private Network (VPN) makes it easy to access the internet wherever and whenever. Many service providers see the advantages of VPN being commercially usable, VPNs are very vulnerable to hacker attacks, cracking that supports data or information from VPN application users, this research offers to provide information about VPN security Point to Point Tunneling protocol (PPTP) and whether the VPN security system has been licensed and is in accordance with applicable law or not. This research is normative juridical. By using analytical descriptive analysis, this research
APA, Harvard, Vancouver, ISO, and other styles
32

Lizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.

Full text
Abstract:
Aplikasi Sistem Informasi yang ada di SMK Labor Binaan FKIP UNRI telah dapat menunjang proses keputusan yang akurat. Aplikasi Sistem Informasi tersebut bisa di akses melalui internet secara private dengan teknologi VPN ( Virtual Private Network), tetapi penggunaannya belum bisa di pantau secara spesifik oleh administrator jaringan, sehiingga perlu untuk membangunkan suatu sistem traffic monitoring dengan menggunakan Simple Network Management Protocol (SNMP) dalam mengimplementasikan aplikasi untuk melakukan pengamatan penggunaan lalu lintas data internet dari parameter yang ada pada jaringan V
APA, Harvard, Vancouver, ISO, and other styles
33

Usanto, Usanto. "RANCANG BANGUN JARINGAN SITE TO SITE VPN (VIRTUAL PRIVATE NETWORK) DENGAN PROTOCOL OPENVPN." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 2 (2021): 55–65. http://dx.doi.org/10.56486/jeis.vol1no2.180.

Full text
Abstract:
The use of wireless media such as the internet in building computer networks is so widely used. However, performance and security must also be considered. VPN (Virtual Private Network) is one of the methods in network security that works by creating a tunnel so that a trusted network can connect to networks outside via the internet. PT. Laris Manis Utama is a private company engaged in the field of fresh fruits export-import and distributor. And already has several branch offices located outside the city. Designing a VPN (Virtual Private Network) with a Site to site (OpenVPN) system at PT. Lar
APA, Harvard, Vancouver, ISO, and other styles
34

Maulidi, A., M. Abdullah, and DW Handani. "Virtual private network (VPN) model for AIS real time monitoring." IOP Conference Series: Earth and Environmental Science 1081, no. 1 (2022): 012028. http://dx.doi.org/10.1088/1755-1315/1081/1/012028.

Full text
Abstract:
Abstract The need for a ship monitoring system based on Automatic Identification System (AIS) has been developed and provides many broad benefits for the maritime world in Indonesia. The system can become an early warning system (EWS) for ship operators, port operators, and even ship owners for tracking a movement of their ships. By internet connection based Virtual Private Network (VPN) can connect several remote base stations (RBS), VPN technology can integrate many RBS from several remote places into one AIS monitoring system. VPN-based internet connection is used to guarantee a secure netw
APA, Harvard, Vancouver, ISO, and other styles
35

Wardana, Mohammad Ali, Andi Zulkifli Nusri, and Juliandika Juliandika. "Jaringan Virtual Private Network (Vpn) Berbasis Mikrotik Pada Kantor Kecamatan Marioriawa Kabupaten Soppeng." Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) 5, no. 2 (2022): 107–16. http://dx.doi.org/10.57093/jisti.v5i2.135.

Full text
Abstract:
Adapun tujuan dari penelitian tentang Perancangan Jaringan Virtual Private Network (VPN) Berbasis Mikrotik pada Kantor Kecamatan Marioriawa adalah untuk merancang dan mengimplementasikan jaringan Virtual Private Network (VPN) berbasis Mikrotik pada Kantor Kecamatan Marioriawa yang belum memiliki suatu sistem jaringan internet yang private, aman dan bebas dari gangguan peretasan, karena Database didalam Server Kantor Kecamatan Marioriawa sangat penting karena berisi Data Induk Kependudukan dari seluruh warga Kecamatan Marioriawa yang tidak boleh diakses oleh yang tidak berwenang. Adapun alat ya
APA, Harvard, Vancouver, ISO, and other styles
36

Michael Oladipo Akinsanya, Cynthia Chizoba Ekechi, and Chukwuekem David Okeke. "VIRTUAL PRIVATE NETWORKS (VPN): A CONCEPTUAL REVIEW OF SECURITY PROTOCOLS AND THEIR APPLICATION IN MODERN NETWORKS." Engineering Science & Technology Journal 5, no. 4 (2024): 1452–72. http://dx.doi.org/10.51594/estj.v5i4.1076.

Full text
Abstract:
Virtual Private Networks (VPNs) play a crucial role in ensuring secure communication over public networks. This concept paper provides a comprehensive review of security protocols used in VPNs and their application in modern networks. The paper begins by defining VPNs and explaining their importance in securing data transmission over untrusted networks. It then discusses the evolution of VPN technology, highlighting the transition from traditional IPSec and SSL/TLS protocols to more modern approaches such as WireGuard and QUIC. The paper also examines the security protocols used in VPNs, inclu
APA, Harvard, Vancouver, ISO, and other styles
37

Suryantoro, Hari, Adi Sopian, and Dartono Dartono. "PENERAPAN TEKNOLOGI FORTIGATE DALAM PEMBANGUNAN JARINGAN VPN-IP BERBASIS IPSEC." JEIS: JURNAL ELEKTRO DAN INFORMATIKA SWADHARMA 1, no. 1 (2021): 1–7. http://dx.doi.org/10.56486/jeis.vol1no1.64.

Full text
Abstract:
IPSec based VPN (Virtual Private Network) is a standard that provides data confidentiality, data integrity, and source authentication on public communication such as the internet. IPSec VPN is a secure technology and reliable (secure and reliable) which can connect private networks between campuses using internet public communications. The availability of data and services in real-time is very much needed by the main campus to ensure that operational and business activities at branch campus and main campus run smoothly. FortiGate is the best choice for system security that provides high protec
APA, Harvard, Vancouver, ISO, and other styles
38

Sridevi, Sridevi, and Dr Manjaiah D. H. Dr.Manjaiah D.H. "Technical Overview of Virtual Private Networks(VPNs)." International Journal of Scientific Research 2, no. 7 (2012): 93–96. http://dx.doi.org/10.15373/22778179/july2013/32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Sulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.

Full text
Abstract:
Perkembangan teknologi yang semakin maju mempengaruhi suatu sistem dan efisiensi dalam dunia pekerjaan. Oleh karna itu sangat di butuhkan sekali jaringan internet, selain pentingnya jaringan internet juga perusahaan sangat membutuhkan adanya jaringan pribadi (VPN) yang aman, sebagai jalur khusus untuk mengakses ke jaringan lokal perusahaan. Untuk mengatasi hal ini maka penulis akan merancang sebuah VPN IPsec dengan menggunakan Router MikroTik. VPN memungkinkan untuk mengakses jaringan lokal perusahaan menggunakan koneksi internet publik. Dari hasil riset yang penulis lakukan telah membuktikan
APA, Harvard, Vancouver, ISO, and other styles
40

Maryanto, Maryanto, Maisyaroh Maisyaroh, and Budi Santoso. "Metode Internet Protocol Security (IPSec) Dengan Virtual Private Network (VPN) Untuk Komunikasi Data." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 6, no. 2 (2018): 179–88. http://dx.doi.org/10.33558/piksel.v6i2.1508.

Full text
Abstract:
Virtual Private Network (VPN) is a local communication network that is connected through a public network, with private network data security, data transfer closure from illegal access and network scalability to become the main standard in Virtual Private Network (VPN). In building a VPN at PT. Penas (Persero) conducted by the method of Internet Protocol Security (IP Sec). IP Sec works on the network layer, protects and authenticates communications on IP between hosts and functions both on IPv6 and IPv4 traffic. IP Sec is actually a feature that is owned by IPv6 but by some developers it was a
APA, Harvard, Vancouver, ISO, and other styles
41

Musril, Hari Antoni. "Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF)." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 3, no. 2 (2019): 83–88. http://dx.doi.org/10.30743/infotekjar.v3i2.1055.

Full text
Abstract:
Akses terhadap sebuah jaringan lokal yang bersifat terbatas untuk pihak tertentu dapat dilakukan dari jaringan publik dengan memanfaatkan Virtual Private Network (VPN). Akses tersebut dilakukan melalui internet dengan memanfaatkan VPN. Hal itu membuat pengguna bisa memanfaatkan semua resources jaringan lokal yang dapat diakses tanpa batasan waktu dan lokasi. OSPF routing diperlukan untuk menghubungkan semua router dalam jaringan yang menggunakan VPN. OSPF routing pada jaringan VPN bisa saling mengkoneksikan beberapa gedung di lokasi yang berbeda dengan satu jaringan. Penelitian ini menghasilka
APA, Harvard, Vancouver, ISO, and other styles
42

Talib, Hasanien Ali, Raya Basil Alothman, and Mazin S. Mohammed. "Malicious attacks modelling: a prevention approach for ad hoc network security." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 3 (2023): 1856. http://dx.doi.org/10.11591/ijeecs.v30.i3.pp1856-1865.

Full text
Abstract:
As a result of the expansions that have taken place in the field of networking and the increase in the number of users of networks, there have recently been breakthroughs made in the techniques and methods used for network security. In this paper, a virtual private network (VPN) is proposed as a means of providing the necessary level of security for particular connections that span across vast networks. After the network performance metrics such as time delay and throughput have been accomplished, the suggested VPN is recommended for the purpose of assuring network security. In addition, artif
APA, Harvard, Vancouver, ISO, and other styles
43

Hasanien, Ali Talib, Basil Alothman Raya, and S. Mohammed Mazin. "Malicious attacks modelling: a prevention approach for ad hoc network security." Malicious attacks modelling: a prevention approach for ad hoc network security 30, no. 3 (2023): 1856–65. https://doi.org/10.11591/ijeecs.v30.i3.pp1856-1865.

Full text
Abstract:
As a result of the expansions that have taken place in the field of networking and the increase in the number of users of networks, there have recently been breakthroughs made in the techniques and methods used for network security. In this paper, a virtual private network (VPN) is proposed as a means of providing the necessary level of security for particular connections that span across vast networks. After the network performance metrics such as time delay and throughput have been accomplished, the suggested VPN is recommended for the purpose of assuring network security. In addition, artif
APA, Harvard, Vancouver, ISO, and other styles
44

Ariyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.

Full text
Abstract:
Dibutuhkannya komunikasi dalam menunjang interaksi antar perusahaan yang memiliki kaitan yang sangat erat terhadap perkembangan teknologi informasi melalui jaringan komputer. Virtual Private Network atau biasa disebut VPN memiliki peran penting dalam perkembangan sistem keamanan dalam jaringan internet, terutama dalam membatasi hak akses terhadap server, database, dan sejenisnya dalam meminimalisir terjadinya akses illegal terhadap data-data penting perusahaan. VPN memiliki beberapa tipe salah seperti VPN Tunnel dan IPSec, VPN Tunnel memiliki konsep yang lebih sederhana dibandingkan dengan IPS
APA, Harvard, Vancouver, ISO, and other styles
45

Putra, Dwi Prastantio. "ANALISIS KEAMANAN VOICE OVER INTERNET PROTOCOL (VOIP) OVER VIRTUAL PRIVATE NETWORK (VPN)." Jurnal Informatika dan Rekayasa Perangkat Lunak 2, no. 3 (2021): 324–33. http://dx.doi.org/10.33365/jatika.v2i3.1232.

Full text
Abstract:
This research was conducted on the basis of the influence of security systems that play a role in encrypting data on VoIP communication systems, with the security technology of PPTP VPN computer networks with the system passing data in a virtual private ip or as a tunnel for secure data transmission media. The results obtained from security analysis for the implementation of security methods on PPTP VPNs, then the data to help developers in terms of building a secure VoIP communication system. Basiclly ZRTP uses the Diffie-Hellman key exchange as a key exchange of communication between clients
APA, Harvard, Vancouver, ISO, and other styles
46

Rosyidah, Aliyyah, and Jumadi Mabe Parenreng. "Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)." Internet of Things and Artificial Intelligence Journal 3, no. 3 (2023): 239–49. http://dx.doi.org/10.31763/iota.v3i3.613.

Full text
Abstract:
The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determ
APA, Harvard, Vancouver, ISO, and other styles
47

Vimal, Kumar V., and C. Abdul Majeed K. "E-resources sharing through Linux based Virtual Private Network (VPN): a case study." Annals of Library and Information Studies 65, no. 3 (2020): 156–59. https://doi.org/10.5281/zenodo.4393149.

Full text
Abstract:
Mahatma Gandhi University Central Library has established an SSH-based VPN (Virtual Private Network) service to share e-resources with off-campus libraries. The VPN service ensures seamless access to e-resources to the academic community at off-campus departments and Study Centre libraries. Extension of e-resources access to off-campus has increased the usage of electronic resources subscribed by the university. The article presents the first-hand experience of establishing Open Source based VPN service in a university environment.
APA, Harvard, Vancouver, ISO, and other styles
48

Zhang, Guo Fang. "The Solution and Management of VPN Based IPSec Technology." Applied Mechanics and Materials 686 (October 2014): 210–19. http://dx.doi.org/10.4028/www.scientific.net/amm.686.210.

Full text
Abstract:
The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. If a secure connection is necessary then a virtual private network (VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site-to-site IPSec VPN between header and branch of ent
APA, Harvard, Vancouver, ISO, and other styles
49

Sari, Linna Oktaviana, and Helena Helena. "Implementasi Virtual Private Network MenggunakanLayer 2 Tunneling Protocol Berbasis Mikrotik." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 4 (2024): 1496–504. https://doi.org/10.57152/malcom.v4i4.1651.

Full text
Abstract:
Perkembangan teknologi yang semakin pesat membuat kebutuhan akan jaringan internet semakin meningkat, termasuk di sektor pendidikan. SDS IT Sahabat Muslim Duri menggunakan jaringan internet sebagai media pembelajaran dan penyimpanan data penting secara online. Namun, pengelolaan jaringan oleh admin hanya dapat dilakukan dalam jaringan lokal sekolah. Penelitian ini bertujuan untuk mengimplementasikan jaringan VPN menggunakan protokol L2TP berbasis Mikrotik agar perangkat di sekolah dapat dikonfigurasi dan dimonitor dari jarak jauh secara aman. Metode yang digunakan meliputi identifikasi masalah
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Kun, Hai Feng Wang, Yu Chun Ma, and Zhuang Li. "The Status and Development Trends of Virtual Private Network Technology." Key Engineering Materials 474-476 (April 2011): 79–82. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.79.

Full text
Abstract:
Virtual Private Network (VPN) refers to rely on the ISP (Internet service providers) and other NSP (Network service provider), in the public network, to establish a dedicated data communication network technologies. In the virtual private network, between any two nodes connected no dedicated network for the traditional end-to-end physical link, but to use a public network composed of dynamic resources. VPN technology can reduce the internal network building costs, improve user network operation and management flexibility, and enable communication between computers and private circuits on compu
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!