To see the other types of publications on this topic, follow the link: VPN management.

Journal articles on the topic 'VPN management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'VPN management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Zai Ying, Ping Yang, and Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms." Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.

Full text
Abstract:
VPN based on the internet can not only make some enterprises save a large amount of costs, but also has better scalability, security and reliability. The paper introduced the concept and classifications of VPN, and described the key technologies of IPsec VPN and MPLS VPN. At last, we put the emphasis on the VPN network management mechanism, including fault management, performance management and tunnel management.
APA, Harvard, Vancouver, ISO, and other styles
2

Hudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (July 1, 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.

Full text
Abstract:
The VPN technology is used to connect client devices securely over unsecured public networks. The Connection handover and Dead Peer Detection (DPD) are the most challenging and important tasks in VPN. In this present article, a solution for connection handover is proposed which covers the pre-authentication with new credentials for a mobile device prior to connection handover. In VPN, a case where such connection handover is failed due to incomplete connection handover or several unusual events which make a VPN client to become offline or dead. To address DPD issues a solution is proposed which includes a Keep Alive Timer (KAT) server at the VPN server side. This proposed solution for DPD is far better than an already existing solution that uses a DNS server for DPD since the DNS server faces several attacks consistently. Thus, the proposed solution for DPD is more secure against such vulnerable attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

Hidayat, Arif. "ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG." IJISCS (International Journal of Information System and Computer Science) 3, no. 2 (December 7, 2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.

Full text
Abstract:
Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distribution for connections between branches using VPN, c) the creation of a VPN account management function for connection between branch BMT office. Mentari East Lampung, d) has successfully tested the VPN account login from the Client side.
APA, Harvard, Vancouver, ISO, and other styles
4

Alashi, Shahad A., and Hanaa A. Aldahawi. "Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia." Journal of Information Security and Cybercrimes Research 3, no. 1 (December 20, 2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.

Full text
Abstract:
By using the research process, this study addresses the attitudes of the members of Saudi society towards using Virtual Private Network (VPN) applications and the former’s perceptions of the latter’s concept, security, and privacy, in addition to monitoring their risks to cybersecurity. The main objective of the study is to present a proposed framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia to strengthen cybersecurity management. To achieve the objectives of the study, the researchers used two methods: the social survey method and the content analysis method. The researchers also relied on the questionnaire tool to collect information from the 455 individuals in the study sample. The study yielded a set of findings, the most important of which are as follows: The use of free VPN applications represents 91% of the sample of the study. Also, the study revealed confusion in perceptions of the actual concept of VPN applications, which may be common among users, and showed a diversity of attitudes and motives for using VPN applications, most of which are related to entertainment. Moreover, the study showed that the study sample individuals had some knowledge about the risks of VPN applications to cybersecurity, although most of them did not use cyber protection means. The study recommended the need to organize and manage the use of VPN applications, conduct an evaluation of VPN applications available on Saudi smartphone stores, and prohibit those which contain security vulnerabilities and malware. The study proposed a framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia, which comprised three dimensions: legal, organizational and awareness-based dimensions.
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Qiang, and Hua Long Liu. "RFID Network and its Application in Management of Aviation Maintenance." Applied Mechanics and Materials 475-476 (December 2013): 920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.920.

Full text
Abstract:
According to the existing status of civil aviation enterprises office network, this paper brings up a project to combined RFID and the VPN network which have been provided by the original system, by adding a RFID server. It bases on VPN technology to form a RFID intelligent aviation material management information system, without affecting the function of the original office network. The system is able to locate the material position in the warehouse and improve the level of the management on civil aviation material information.
APA, Harvard, Vancouver, ISO, and other styles
6

Salman, Fatimah A. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 855. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) are used by remote clients to securely connect to company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity which implemented using GNS3 Network simulator. The testing, verification analyzing of data packets of the network is done using both PING tool and Wireshark.
APA, Harvard, Vancouver, ISO, and other styles
7

Gaspoz, Jean-Paul, Jean-Pierre Hubaux, and Simon Znaty. "A generic architecture for VPN configuration management." Journal of Network and Systems Management 4, no. 4 (December 1996): 375–95. http://dx.doi.org/10.1007/bf02283161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 2 (June 9, 2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.

Full text
Abstract:
Paper ini membahas tentang pembuatan server untuk penyimpanan data menggunakan sistem operasi Freenas, yang pengaksesan servernya melalui jaringan internet atau ip public menggunakan jalur VPN (Virtual Private Network). Akses data dari user ke server menggunakan authentikasi user Freenas dan ditambah dengan authentikasi user VPN untuk menambah keamanan jaringan dan mengatasi masalah keamanan dalam transaksi data seperti pencurian data. Hasil penelitian dari server yang dibuat, menunjukkan bahwa jalur VPN yang dibuat dapat dipakai untuk mengatasi masalah keamanan tersebut. Dari percobaan transaksi data yang sudah dilakukan pada server, menunjukkan bahwa data yang dikirim melalui jaringan internet tanpa VPN tidak terenkripsi dan masih bisa dilihat isinya, sedangkan data yang menggunakan jalur VPN, datanya telah terenkripsi dan tidak bisa dilihat isinya secara langsung.
APA, Harvard, Vancouver, ISO, and other styles
9

Damasco Jr., Loreto B., Noel Raymund F. Lacson, and Roger T. Intong. "Safeguarding Transactional Data: A Comprehensive Investigation of VPN Integration in Point-of-Sale Systems for Enhanced Security and Connectivity." Eximia 12 (December 14, 2023): 570–89. http://dx.doi.org/10.47577/eximia.v12i1.405.

Full text
Abstract:
The integration of Virtual Private Network (VPN) technology into Point-of-Sale (POS) systems has emerged as a solution for securing transactional data in businesses. This study investigates the implementation of a VPN server to address security and connectivity challenges faced by the University of St. La Salle (USLS) Bookstore. The research delves into VPN policy frameworks, assessing the scope and binding, authentication methods, and VPN credentials and security protocols. The system design employs a combination of conceptual models and activity diagrams to illustrate the process of user authentication and data encryption. Furthermore, the study evaluates the system's performance in terms of scalability, efficiency, and effectiveness in ensuring authentication and security. The deployment of the VPN infrastructure involves the installation of requisite software and hardware components, along with rigorous testing procedures to assess system performance and reliability. The findings highlight the significance of VPN in safeguarding sensitive transaction data and enhancing the efficiency of POS operations. The study's outcomes offer valuable insights into the effective implementation and management of VPN technology for securing business operations.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Guo Fang. "The Solution and Management of VPN Based IPSec Technology." Applied Mechanics and Materials 686 (October 2014): 210–19. http://dx.doi.org/10.4028/www.scientific.net/amm.686.210.

Full text
Abstract:
The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. If a secure connection is necessary then a virtual private network (VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site-to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.
APA, Harvard, Vancouver, ISO, and other styles
11

Lizarti, Nora, and Wirta Agustin. "Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)." SATIN - Sains dan Teknologi Informasi 1, no. 1 (June 23, 2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.

Full text
Abstract:
Aplikasi Sistem Informasi yang ada di SMK Labor Binaan FKIP UNRI telah dapat menunjang proses keputusan yang akurat. Aplikasi Sistem Informasi tersebut bisa di akses melalui internet secara private dengan teknologi VPN ( Virtual Private Network), tetapi penggunaannya belum bisa di pantau secara spesifik oleh administrator jaringan, sehiingga perlu untuk membangunkan suatu sistem traffic monitoring dengan menggunakan Simple Network Management Protocol (SNMP) dalam mengimplementasikan aplikasi untuk melakukan pengamatan penggunaan lalu lintas data internet dari parameter yang ada pada jaringan VPN (Virtual Private Network) berbasis web, yang menjadi salah satu solusi dalam menyelesaikan masalah yang ada. VPN (Virtual Private Network) merupakan suatu cara memanfaatkan jaringan public sebagai jaringan private secara aman melalui internet yang menggunakan perpaduan teknologi tunneling dan enkapsulasi. SNMP merupakan sebuah protokol yang didesain untuk memberikan kemampuan pengumpulan data manajemen perangkat jaringan dan pengkonfigurasian perangkat jaringan secara jarak jauh (remotely). Sistem operasi yang digunakan pada server administator adalah Linux Ubuntu 12.04. Linux Ubuntu merupakan distro linux yang stabil dan cukup handal. Dengan adanya aplikasi network traffic monitoring pada jaringan VPN dapat membantu pihak administrator untuk memantau lalu lintas data sehingga penggunaan internet lebih optimal.
APA, Harvard, Vancouver, ISO, and other styles
12

Haeruddin, Haeruddin, Gautama Wijaya, and Husnul Khatimah. "Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut." JITU : Journal Informatic Technology And Communication 7, no. 2 (November 30, 2023): 102–13. http://dx.doi.org/10.36596/jitu.v7i2.1086.

Full text
Abstract:
Working remotely or what we know as Work From Anywhere is still a trend after the COVID-19 pandemic. Working from anywhere and anytime can increase productivity and reduce transportation costs, and is accompanied by fast internet support, good communication and collaboration platforms so this is very popular and in demand. When implementing WFA, it has its own challenges, namely data security. Not all organizations are supported by a reliable IT infrastructure that can protect employee data during WFA. One of the security system technologies that can be used during WFA is VPN. Currently there are many VPN protocols that can be used for WFA. However, in implementing a VPN network, there are several things that must be considered to ensure that the VPN network is successful and functional, such as security, choosing the right architecture, selecting technology and protocols, scalability, quality of service, management and monitoring, as well as security and privacy policies. ZeroTier is a next-generation VPN that is easy to configure, can support multiple devices, and uses an end-to-end connection, eliminating the need for a centralized VPN server. In implementing VPN ZeroTier the method used is the Network Development Life Cycle (NDLC). This methodology is used to plan, implement, and manage a VPN network with ZeroTier to function according to WFA needs.
APA, Harvard, Vancouver, ISO, and other styles
13

Chu, Jie. "Designing and Implementation of High Concurrent SSL VPN Server." Applied Mechanics and Materials 241-244 (December 2012): 2424–29. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2424.

Full text
Abstract:
This paper focuses on improving concurrent performance of a practical SSL VPN server program. Several common technologies were been used to achieve this, including processing network flow effectively by using readiness notification mechanism, using appropriate data structure to deal with I/O buffers, and implementing timers management module by priority queue. Through combining these technologies properly, the performance of the SSL VPN server program has been improved dramatically.
APA, Harvard, Vancouver, ISO, and other styles
14

S, Sujatha. "Detection of Virtual Private Networks Encrypted Traffic using Machine and Ensemble Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 5636–42. http://dx.doi.org/10.22214/ijraset.2024.61288.

Full text
Abstract:
Abstract: The widespread adoption of Virtual Private Networks (VPNs) for secure communication over public networks has highlighted the need for accurate detection of encrypted network traffic. This study proposes a comprehensive approach utilizing machine and ensemble learning algorithms to address this detection challenge. Leveraging the ISCX VPN dataset, the project aims to develop a robust system capable of distinguishing between VPN and non-VPN traffic with high accuracy. Key stages include data acquisition, preprocessing, feature extraction, and model training using Decision Tree, Naive Bayes, Random Forest, and Adaboost algorithms. Through rigorous experimentation, the most effective algorithmic approach is identified. The project also offers insights into the diverse nature of encrypted network communication and its implications for network security. The anticipated outcomes include improved understanding and management of VPN traffic, enhancing overall network security and performance. This research contributes to advancing network security practices by offering practical solutions for encrypted traffic detection in real-world settings.
APA, Harvard, Vancouver, ISO, and other styles
15

Fathurrahmad, Fathurrahmad, and Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (June 30, 2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.

Full text
Abstract:
The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implementation, MPLS network performance will be tested and compared to performance without MPLS using the model planned by the researcher. The specific purpose of this study is to show how routing protocols play an important role in strengthening data communication traffic management that supports MPLS capabilities of VPN networks and is applied to the AMIK Indonesia network architecture. This research will use the literature study method which is intended to obtain and study data contained in computers connected to networks in the AMIK Indonesia computer network laboratory. The conclusion obtained from this study is that MPLS VPN provides bandwidth efficiency in the backbone, MPLS VPN network applications have functioned functionally according to the initial plan of the study and the authors have also managed to configure different networks and obtain stable bandwidth.Keywords:Implementation; VPN; Multi Protocol Label Switching
APA, Harvard, Vancouver, ISO, and other styles
16

Rahman, Fakhri Fakhlur, Sahari, and Riska Robianto. "Building Lptp Vpn Network and User Management Using Fuzzy Logic Based on Age and Utilization of The Dude for Network Monitoring." Jurnal KomtekInfo 7, no. 1 (January 14, 2020): 22–31. http://dx.doi.org/10.35134/komtekinfo.v7i1.62.

Full text
Abstract:
This study aims to build a VPN network, develop the use of The Dude as network monitoring and user management of bandwidth sharing using fuzzy logic and using MICROTIC ROUTERBOARD as process controller. The benefit of developing this tool is to facilitate the admin or business owner in the process of monitoring and monitoring on hotspots. This research was conducted by designing, making and implementing system components which include routerboard as process controller, access point as 2.4Ghz signal transmitter, The Dude application as network monitoring and user management as well as VPN as connecting media from public network to local hotspot network. The results of this study indicate that the tools made can function well and are developed on a larger scale.
APA, Harvard, Vancouver, ISO, and other styles
17

Zhang, Kun, Hai Feng Wang, Yu Chun Ma, and Zhuang Li. "The Status and Development Trends of Virtual Private Network Technology." Key Engineering Materials 474-476 (April 2011): 79–82. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.79.

Full text
Abstract:
Virtual Private Network (VPN) refers to rely on the ISP (Internet service providers) and other NSP (Network service provider), in the public network, to establish a dedicated data communication network technologies. In the virtual private network, between any two nodes connected no dedicated network for the traditional end-to-end physical link, but to use a public network composed of dynamic resources. VPN technology can reduce the internal network building costs, improve user network operation and management flexibility, and enable communication between computers and private circuits on computer communications with the same security.
APA, Harvard, Vancouver, ISO, and other styles
18

Agrawal, Vani, Nilesh Dubey, Virendra Singh, Nepali Singla, Sarvesh Kumar, and Dinesh Goyal. "Authenticated key exchange protocol security of cloud services management using machine learning." Journal of Discrete Mathematical Sciences and Cryptography 26, no. 5 (2023): 1381–91. http://dx.doi.org/10.47974/jdmsc-1761.

Full text
Abstract:
The reason for cloud-based confirmation is to shield organizations from programmers attempting to take classified data. Cloud validation permits approved clients across organizations and landmasses to safely get to data put away in the cloud with verification given through cloud-based administrations. Artificial intelligent (AI) permits organizations to empower the information to show the framework how to tackle the central issue with AI calculations and how to get better after some time. The present undertakings are assaulted with information. To drive better business decisions, they need to sort out it. Distributed computing is a huge term for all Data Science and Machine Learning Enthusiasts. It is far-fetched that you probably won’t have run over it, even as a juvenile. The most important issue is that this type of security is needed for the cloud services. A clear explanation for this is that as the dataset develops, i.e., more models and features are added, the AI model ends up being more multifaceted. Internet Key Exchange (IKE) is a standard convention used to set up a safe and confirmed correspondence channel between two gatherings through a virtual private network (VPN). The convention guarantees security for VPN exchange, remote host and organization access.
APA, Harvard, Vancouver, ISO, and other styles
19

Choi, Mi-Jung, and James Won-Ki Hong. "A secure web-based global management system for firewall/VPN devices." Journal of Communications and Networks 4, no. 1 (March 2002): 71–78. http://dx.doi.org/10.1109/jcn.2002.6596935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Bahnasse, Ayoub, Mohamed Talea, Abdelmajid Badri, Fatima Ezzahraa Louhab, and Sara Laafar. "Smart hybrid SDN approach for MPLS VPN management on digital environment." Telecommunication Systems 73, no. 2 (August 6, 2019): 155–69. http://dx.doi.org/10.1007/s11235-019-00603-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Gengler, Barbara. "Check point outlines VPN strategy." Network Security 1999, no. 6 (June 1999): 6–7. http://dx.doi.org/10.1016/s1353-4858(99)90059-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Rowan, Tom. "VPN technology: IPSEC vs SSL." Network Security 2007, no. 12 (December 2007): 13–17. http://dx.doi.org/10.1016/s1353-4858(07)70104-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Scribbins, Alban, and Kevin Curran. "Automation of Detection and Fault Management Response of Common Last-Mile Loss-Of-Connectivity Outages Within the Access Network." International Journal of Wireless Networks and Broadband Technologies 9, no. 1 (January 2020): 1–26. http://dx.doi.org/10.4018/ijwnbt.2020010101.

Full text
Abstract:
The article to assesses whether it may be possible to recommend a solution to enable automation of the process of detection and fault management of common conclusive loss-of-connectivity last-mile outages, within the access network. To ascertain the utility of the research, UK based MPLS VPN managed service providers, their fault management staff and their business customers, were surveyed using online questionnaires for their views. UK public Internet users were additionally surveyed via five UK Internet forums. UK communication providers offering MPLS VPN solutions were characterised. Access network connectivity technologies and fault management functions were compared, contrasted and analysed. An aspiration for the solution to be beneficial to the largest potential population, meant that current non-proprietary Internet Standard technologies were selected, justified and identified which could be recommended for use. It was found that of the participating survey respondents, two-thirds were in favour of automation. Many current communication provider processes were found to be mostly automated. The article concludes with recommendations of how an automated solution could potentially be enabled. This involves further use of business-to-business interfacing between communication providers, automation of their Fault Management Systems and introducing Bi-Directional forwarding for detection between last-mile active network elements.
APA, Harvard, Vancouver, ISO, and other styles
24

Ndichu, Samuel, Sylvester McOyowo, Henry Okoyo, and Cyrus Wekesa. "A Remote Access Security Model based on Vulnerability Management." International Journal of Information Technology and Computer Science 12, no. 5 (October 8, 2020): 38–51. http://dx.doi.org/10.5815/ijitcs.2020.05.03.

Full text
Abstract:
Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or resources being accessed. These threats differ depending on the type of device used to procure remote access. One kind of these remote access devices can be considered as safe as the organization probably issues it to provide for remote access. The other type is risky and unsafe, as they are beyond the organization’s control and monitoring. The myriad of devices is, however, a necessary evil, be it employees on public networks like cyber cafes, wireless networks, vendors support, or telecommuting. Virtual Private Network (VPN) securely connects a remote user or device to an internal or private network using the internet and other public networks. However, this conventional remote access security approach has several vulnerabilities, which can take advantage of encryption. The significant threats are malware, botnets, and Distributed Denial of Service (DDoS). Because of the nature of a VPN, encryption will prevent traditional security devices such as a firewall, Intrusion Detection System (IDS), and antivirus software from detecting compromised traffic. These vulnerabilities have been exploited over time by attackers using evasive techniques to avoid detection leading to costly security breaches and compromises. We highlight numerous shortcomings for several conventional approaches to remote access security. We then adopt network tiers to facilitate vulnerability management (VM) in remote access domains. We perform regular traffic simulation using Network Security Simulator (NeSSi2) to set bandwidth baseline and use this as a benchmark to investigate malware spreading capabilities and DDoS attacks by continuous flooding in remote access. Finally, we propose a novel approach to remote access security by passive learning of packet capture file features using machine learning and classification using a classifier model.
APA, Harvard, Vancouver, ISO, and other styles
25

Nugroho, Fauyhi, and Ricki Herianto. "ANALISIS DAN PERANCANGAN WIDE AREA NETWORK (WAN) BERBASIS IP VPN PADA PT. AUTOCOMP SYSTEMS INDONESIA." Jurnal Dinamika UMT 7, no. 1 (March 16, 2022): 8. http://dx.doi.org/10.31000/dinamika.v7i1.6748.

Full text
Abstract:
The purpose of this research is to analyze and design an IP VPN-based Wide Area Network (WAN) at PT. Autocomp Systems Indonesia to facilitate employees in accessing a centralized information system quickly, stably and securely. The company currently uses a Leased Line-based WAN network, but there are many disadvantages such as high costs and low bandwidth capacity. so the authors try to solve this problem. The methodology used in this research is NDLC (Network Development Life Cycle). The NDLC method consists of Analysis, Design, Simulation Prototyping, Implementation, Monitoring and Management. To design this network the author uses GNS3 simulation software (Graphical Network Simulator-3).The conclusion obtained from this study is that IP VPN-based WAN networks can reduce costs and provide higher network speeds than Leased Line-based WAN networks.
APA, Harvard, Vancouver, ISO, and other styles
26

Gold, Steve. "Pirate Bay develops anonymous VPN user protection." Infosecurity 6, no. 3 (April 2009): 8. http://dx.doi.org/10.1016/s1754-4548(09)70045-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Gaspoz, Jean-Paul, and Pierre-Alain Etique. "Applying an object-oriented method to design a VPN bandwidth management system." Annales Des Télécommunications 50, no. 7-8 (July 1995): 676–85. http://dx.doi.org/10.1007/bf02997872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Zhang, Kai. "Research of Remote Access System to the Digital Resources Based on Cloud Computing." Applied Mechanics and Materials 543-547 (March 2014): 3606–9. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3606.

Full text
Abstract:
This paper introduces the working principle of remote access system based on SSL VPN in cloud computing. Meanwhile, it focuses on the operation principle of the SSL protocol and resource management. In addition, it analyses system characteristics such as https login, hardware signature certification and so on. At last, it puts forward some problems and solutions in actual use.
APA, Harvard, Vancouver, ISO, and other styles
29

Park, Jee-Tae, Chang-Yui Shin, Ui-Jun Baek, and Myung-Sup Kim. "Fast and Accurate Multi-Task Learning for Encrypted Network Traffic Classification." Applied Sciences 14, no. 7 (April 5, 2024): 3073. http://dx.doi.org/10.3390/app14073073.

Full text
Abstract:
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive analytical approaches. Our proposed method introduces a novel approach to network traffic classification, utilizing multi-task learning to simultaneously train multiple tasks within a single model. To validate the proposed method, we conducted experiments using the ISCX 2016 VPN/Non-VPN dataset, consisting of three tasks. The proposed method outperformed the majority of existing methods in classification with 99.29%, 97.38%, and 96.89% accuracy in three tasks (i.e., encapsulation, category, and application classification, respectively). The efficiency of the proposed method also demonstrated outstanding performance when compared to methods excluding lightweight models. The proposed approach demonstrates accurate and efficient multi-task classification on encrypted traffic.
APA, Harvard, Vancouver, ISO, and other styles
30

Грибков, В. А. "Основные протоколы безопасности, используемые в VPN, и их роль в защите информации." ТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ 102, no. 5 (2023): 17–19. http://dx.doi.org/10.18411/trnio-10-2023-241.

Full text
Abstract:
В данной статье рассматривается важный аспект в области информационной безопасности - (VPN). Виртуальные частные сети являются мощным инструментом для обеспечения безопасности и конфиденциальности данных при передаче через открытые сети, такие как интернет. Статья охватывает основные протоколы безопасности, используемые в VPN, и их роль в защите информации от несанкционированного доступа и атак
APA, Harvard, Vancouver, ISO, and other styles
31

Fan, Ya Qin, Ge Zhang, Fei Fei Li, and Xin Zhang. "Design of SSL VPN System Based on RBAC Access." Advanced Materials Research 765-767 (September 2013): 1299–302. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1299.

Full text
Abstract:
Abstract: in order to solve the access control system loopholes, can appear the problem of chaotic management, security failure and conflict of competence, this paper studies the access control model, on the basis of the design of a SSL VPN oriented access control system, the authentication module, access control module, role access module and security detection module design. The realization technology of system user identity. This has practical reference significance to the personnel security technology research network.
APA, Harvard, Vancouver, ISO, and other styles
32

Zhang, Rong Hua. "Management System of Computer Laboratory in Liberal College." Applied Mechanics and Materials 411-414 (September 2013): 712–15. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.712.

Full text
Abstract:
The university network is very popular, the use of computer networks for laboratory management has become a necessity. We proposed the construction of the building room memorandum ideas and some strategies that can be implemented, the better solution normative room management issues. According to the actual use of university computer room design possible combination of VLAN and VPN solutions. We used a more mature support for multiple operating systems and supports SNMP network devices Mrtg tools to help us achieve traffic monitoring, reducing the need for repeat open, traffic monitoring can be a good solution to the problem. Use of virtual LANs, the use of wireless network technology, the use of remote monitoring technology, the use of Web sites and remote access, have made these physical room on the formation of a relatively independent logical connections to facilitate the reunification of management and maintenance.
APA, Harvard, Vancouver, ISO, and other styles
33

Bahnasse, Ayoub, Fatima Ezzahraa Louhab, Azeddine Khiat, Abdelmajid Badri, Mohamed Talea, and Bishwajeet Pandey. "Smart Hybrid SDN Approach for MPLS VPN Management and Adaptive Multipath Optimal Routing." Wireless Personal Communications 114, no. 2 (April 29, 2020): 1107–31. http://dx.doi.org/10.1007/s11277-020-07411-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Wu, Xiao Yong, Yu Hua Ni, Ying Kai Sun, and Hui He. "Framework of Virtual Private Supply Chain Management." Materials Science Forum 532-533 (December 2006): 1064–67. http://dx.doi.org/10.4028/www.scientific.net/msf.532-533.1064.

Full text
Abstract:
In the process of global economy development and competition, how to strengthen the cooperation of enterprises in the supply chain environment plays a very important role to the success of enterprises. As well known, the IT technology is one of the quite essential factors to provide quicker and more accurate information for the enterprises, and therefore enhance the enterprises’ operation efficiency. In order to adapt to the supply chain (SC) environment and support for other enterprises’ common development in SC, we have to develop more powerful and unified IT technology. What is elaborated in this paper is the framework of the information cooperation system which is SC oriented. It does not deny or overthrow the legacy applications of enterprises, but to put forward a framework based on the old applications in SC. It also unifies the Web Service and references the principles of VPN. We call it the framework of Virtual Private Supply Chain Management (VPSCM). The principle, the model and the use of VPSCM as well as some other related issues are going to be explained in this paper.
APA, Harvard, Vancouver, ISO, and other styles
35

Sun, Weishi, Yaning Zhang, Jie Li, Chenxing Sun, and Shuzhuang Zhang. "A Deep Learning-Based Encrypted VPN Traffic Classification Method Using Packet Block Image." Electronics 12, no. 1 (December 27, 2022): 115. http://dx.doi.org/10.3390/electronics12010115.

Full text
Abstract:
Network traffic classification has great significance for network security, network management and other fields. However, in recent years, the use of VPN and TLS encryption had presented network traffic classification with new challenges. Due to the great performances of deep learning in image recognition, many solutions have focused on the deep learning-based method and achieved positive results. A traffic classification method based on deep learning is provided in this paper, where the concept of Packet Block is proposed, which is the aggregation of continuous packets in the same direction. The features of Packet Block are extracted from network traffic, and then transformed into images. Finally, convolutional neural networks are used to identify the application type of network traffic. The experiment is conducted using captured OpenVPN dataset and public ISCX-Tor dataset. The results shows that the accuracy is 97.20% in OpenVPN dataset and 93.31% in ISCX-Tor dataset, which is higher than the state-of-the-art methods. This suggests that our approach has the ability to meet the challenges of VPN and TLS encryption.
APA, Harvard, Vancouver, ISO, and other styles
36

Xiang, Hao, and Ming Li. "The Research of Network Security Mechanism Based Collaborative Design." Advanced Materials Research 421 (December 2011): 406–9. http://dx.doi.org/10.4028/www.scientific.net/amr.421.406.

Full text
Abstract:
Network Security serves as a guarantee for achieving collaborative design and enabling network to be highly efficient. The hidden security lapses in the frame of traditional collaborative design system are analyzed in this paper. The author also points out that as for a sound network collaborative design, a security mechanism must be established to secure the system in terms of data transmission and personnel action. A comprehensive security mechanism involving VPN encoded transmission, identification based on projects and authority management according to different roles.
APA, Harvard, Vancouver, ISO, and other styles
37

Muhammad Arifin, Fikri, Giva Andriana Mutiara, and Ismail Ismail. "Implementation of Management and Network Security Using Endian UTM Firewall." IJAIT (International Journal of Applied Information Technology) 1, no. 02 (August 14, 2017): 43–51. http://dx.doi.org/10.25124/ijait.v1i02.874.

Full text
Abstract:
Internet is a source of information which is widely used today. However, the mode of internet abused becomes more various and unavoidable. The internet abused can be done from external or internal networks. Unified Threat Management (UTM) is one of a good solution to secure the networks, because it has several security features such as firewall, proxy, Intrusion Prevention System (IPS) and several other security features in one package. Endian is an UTM distro which is an open source in large community. Besides having some security features, Endian also has some network management features such as DHCP, routing, and VPN. This research put Endian as the center of a network topology that connected to the internal network/LAN, DMZ Server, and Internet Network/WAN. The tests are conducted in the form of implementation of DHCP feature, content filtering, port restrictions on interzone, and the response of the IPS features that exist on the Endian while receiving the attack. The results showed that Endian UTM is quite well in maintaining the security of the networks.
APA, Harvard, Vancouver, ISO, and other styles
38

Forbacha, Suh Charles, and Mbuya Josiah Anyam Agwu. "Design and Implementation of a Secure Virtual Private Network Over an Open Network (Internet)." American Journal of Technology 2, no. 1 (April 1, 2023): 1–36. http://dx.doi.org/10.58425/ajt.v2i1.134.

Full text
Abstract:
Aim: The main objective of this research project is to design and implement a functional secure virtual private network over the internet considering that use of traditional fixed telephones lines is not cost effective and it is unsecured especially in the context of Cameroon. Methods: In the VPN, internet is used as the data pipelined replacing the traditional data lines. This approach was deployed through simulation with CISCO Packet Tracer. Results: Simulation results showed that the system can provide a secured, reliable and cost effective transmission system over the Internet for organizations in Cameroon. As such, VPNs form an integral part of remote business communications across the internet due to the inherent risks that exist when sending private information over a public network. Conclusion: VPNs not only prevent unethical use of private business correspondence by unauthorized parties but they also play an important role in reducing the environmental impact of business travel. Recommendations: This study recommend an organization which considers security as its top priority to embrace the rather expensive solution of implementing an email/Web/DNS/FTP server at each site rather than using only a single email/web/DNS/FTP server for the entire intranet. This will reduce the amount of information that organization sends across the Internet and increase information access speeds. Home users or small office can equally be installed with an email/web/DNS/FTP server. Also, in the remote access case, a company can outsource the installation and management of their remote access VPN server to the ISP. Moreover, just using IPSec for remote access users is not enough. Remote access IPSec VPN implementation should always be associated with a tunneling protocol such as PPTP.
APA, Harvard, Vancouver, ISO, and other styles
39

Dev, Kankan. "A Great Approach for Medium Size Hospital Network Infrastructure Architecture." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 1440–43. http://dx.doi.org/10.22214/ijraset.2021.38207.

Full text
Abstract:
Abstract: To get first-hand experience for setting up a network infrastructure in a medium size hospital to manage the patient’s services, check-ups, follow-up plans from different parts of the hospital primes and store the data into the secured and safe manner in the database and use the data whenever required from the management team for their references. The network architecture based on the concept of the Three- layer network architecture combination of Mesh topology & Bus topology taking into the consideration of the primary data security, remote access to the network, size of the hospital organization, cost-effective, user-friendly and most importantly scalability required in the network architecture for future changes based on the size of the database, utilization of applications remotely, and for security of the data, changing technology etc. The goal of any network architecture is to protect the DATA from any attacks both internally and externally. For internal DATA security it is protected through various user permissions in different layers in the network for the end users. For Outside threat VPN tunnel, Policies, traffic filtering configured at the firewall level. Keywords: HIS-Hospital Information System, VPN- virtual private network tunnel, VLAN- Virtual LAN, HL7- Health Level Seven International, L3- Layer 3, ISP- Internet service provider
APA, Harvard, Vancouver, ISO, and other styles
40

Forte, Dario. "SSL VPN and return on investment: A possible combination." Network Security 2009, no. 10 (October 2009): 17–19. http://dx.doi.org/10.1016/s1353-4858(09)70112-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Radchenko, V. D., A. Alekseenko, A. Rusnak, and S. I. Fomin. "Overcoming challenges in deep inspect of vpn and proxy by deep learning." Journal of Physics: Conference Series 2701, no. 1 (February 1, 2024): 012106. http://dx.doi.org/10.1088/1742-6596/2701/1/012106.

Full text
Abstract:
Abstract The rapid growth of proxying and VPN techniques has presented formidable challenges for internet operators in classifying network traffic. These methods not only hinder effective traffic policing and resource restriction but also introduce complexities by allowing VPNs to masquerade under application protocols. Furthermore, the increasing popularity of applications like Voice over IP (VoIP) and peer-to-peer (P2P) technologies further exacerbates the difficulty in controlling and classifying such traffic. Conventional techniques like Server Name Indication (SNI) analysis are witnessing diminishing effectiveness over time. Network providers now face the critical task of acquiring detailed knowledge about the specific applications and protocols utilised by their customers, enabling them to accurately allocate resources and ensure robust traffic management in this challenging landscape.
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Xinlei. "Identification of Encrypted Traffic Using Advanced Mathematical Modeling and Computational Intelligence." Mathematical Problems in Engineering 2022 (August 22, 2022): 1–10. http://dx.doi.org/10.1155/2022/1419804.

Full text
Abstract:
This paper proposed a hybrid approach for the identification of encrypted traffic based on advanced mathematical modeling and computational intelligence. Network traffic identification is the premise and foundation of improving network management, service quality, and application security. It is also the focus of network behavior analysis, network planning and construction, network anomaly detection, and network traffic model research. With the increase in user and service requirements, many applications use encryption algorithms to encrypt traffic during data transmission. As a result, traditional traffic classification methods classify encrypted traffic on the network, which brings great difficulties and challenges to network monitoring and data mining. In our article, a nonlinear modified DBN method is proposed and applied to encrypted traffic identification. Firstly, based on Deep Belief Networks (DBN), this paper introduces the proposed Eodified Elliott (ME)-DBN model, analyzes the function image, and presents the ME-DBN learning algorithm. Secondly, this article designs an encrypted traffic recognition model based on the ME-DBN model. Feature extraction is carried out by training the ME-DBN model, and finally, classification and recognition are carried out by the classifier. The experimental results on the ISCX VPN-non-VPN database show that the MEDBN method proposed in this article can enhance the classification and recognition rate and has better robustness to encrypt traffic recognition from different software.
APA, Harvard, Vancouver, ISO, and other styles
43

Veronika Asri Tandirerung and Riana T. Mangesa. "Pengembangan E-learning Berbasis Edukati Pada Sekolah Menengah Atas." Information Technology Education Journal 1, no. 3 (September 8, 2022): 46–49. http://dx.doi.org/10.59562/intec.v1i3.252.

Full text
Abstract:
Lahirnya era Internet of Things (IoT) karena perkembangan teknologi yang semakin canggih. Perkembangan dari sisi hardware, software dan keberadaan internet yang sangat mempengaruhi sistem kerja manusia. Hampir semua piranti disebut sebagai smart device.Data yang diperoleh melalui website VPN Mentor (www.vpnmentor.go.id) tahun 2018 menunjukkan data persentasi Tren Internet 2018, Statistik & Fakta di AS dan Seluruh Dunia bahwa persentase lalu lintas internet web seluler di Indonesia adalah 72 %, dan tertinggi dunia adalah negara Kenya dengan angka 83 %. Di Amerika Serikat, segmen dengan perkembangan paling cepat untuk kepemilian perangkat adalah ponsel dan tablet. Penetrasi tablet telah meningkat perlahan selama beberapa tahun terakhir. Pada tahun 2020, tablet akan digunakan oleh 35 % dari semua pengguna internet. Di Inggris Raya, jumlah orang yang menggunakan desktop menurun dari 54% hingga menjadi 51% hampir dalam setahun. penggunaan VPN dan privasi data memiliki korelasi yang kuat.. Jenis penelitian yang digunakan adalah penelitian R & D (research & development) yang mengikuti tahapan ADDIE. Hasil penelitian menunjukkan Learning Management system yang dikembangkan dapat diakses melalui alamat website spcmks.edukati.com. LMS yang dikembangkan berbasis moodle dengan hosting dan domain yang digunakan adalah melalui platform edukati.com. Hasil tanggapan siswa pada LMS yang dikembangkan adalah menunjukkan LMS berada pada kategori praktis dan efektif digunakan dalam pembelajaran di era Internet of things saat ini dengan tidak terbatasnya sumber belajar yang dapat diakses.
APA, Harvard, Vancouver, ISO, and other styles
44

Jiang, Xiao Nuo, and Kai Leung Yung. "MMAP: An Intelligent Object Paradigm for the Monitoring and Control of Mobile-Enterprise." Materials Science Forum 532-533 (December 2006): 1168–71. http://dx.doi.org/10.4028/www.scientific.net/msf.532-533.1168.

Full text
Abstract:
The advances of wireless networking technologies and mobile devices has prompted many modern enterprises to look for management information systems to remotely monitor and control of their company operations in order to increase their flexibility and competitiveness in the market. Multi-agent modeling has emerged as a powerful technology for dealing with cooperation and decision-making processes in distributed information system applications. In this paper, we proposed a Mobile-enterprise Multi-Agent Paradigm (MMAP) which is an intelligent multiagent-based system combined with wireless VPN technology to provide various management operations to senior executives by PDA (Personal Digital Assistant) with wireless data networks. To demonstrate how the architecture can be built, the data collection agent, one of the primary component-ts of the proposed paradigm, is developed into a prototype implementation for part of the MMAP.
APA, Harvard, Vancouver, ISO, and other styles
45

Roşu, Marius, and George Drăgoi. "VPN solutions and network monitoring to support virtual teams work in virtual enterprises." Computer Science and Information Systems 8, no. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.

Full text
Abstract:
In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).
APA, Harvard, Vancouver, ISO, and other styles
46

Yao, Wei Wei, Liang Gong, and Xia Xu. "Design and Implementation of Security Network Optimization." Advanced Materials Research 977 (June 2014): 507–10. http://dx.doi.org/10.4028/www.scientific.net/amr.977.507.

Full text
Abstract:
Optimization of computer network security technology shift in the relationship is constantly updated. Any computer network security solutions can not be designed once and for all. How seamless integration of network security technology and network security management together to make the network security implementation strategy is very important, this paper proposes a reasonable solution to improve overall network design and optimization of the security system, to develop scientific, reliable, dynamic network security optimization design, the design of enterprise network security solutions, combined with the current firewall, intrusion detection / intrusion prevention technology, VPN technology to achieve rapid escalation of the enterprise information construction in the network security system, thus the basic realization of computer network security optimization design goal.
APA, Harvard, Vancouver, ISO, and other styles
47

Sidik, Sidik, Ade Sudaryana, and Rame Santoso. "Implementasi Virtual Interface Menggunakan Metode EOIP Tunnel Pada Jaringan WAN PT. Indo Matra Lestari." Jurnal Teknik Komputer 6, no. 1 (January 10, 2020): 103–10. http://dx.doi.org/10.31294/jtk.v6i1.6830.

Full text
Abstract:
Computer networks have become an important point in companies that have many branch offices to coordinate the transfer of data. PT Indo Matra Lestari's connection uses a VPN system using the PPTP method. Data Center is used as a VPN server, the client is the Head Office and Citereup Branch Offices. Between the Head Office and the Citereup Branch Office there is no direct connection so access to data made between the Head Office and the Citereup Branch Office is slow, because the data must pass through the Data Center before reaching its destination. Moreover, the data accessed is private to the company and only accessed on the local network. The solution used to create a direct and secure network path between the Head Office and Branch Offices is to use the EoIP Tunnel on the proxy router. Tunneling method in EoIP can make network bridging between proxy devices, EoIP Tunnel will change to Virtual Interface on the proxy router so that it is as if the proxy router is connected locally. Tunnel ID on the EoIP Tunnel functions as a tunneling path security. The application of the EoIP Tunnel makes the point to point connection point between Mikrotik devices faster in data access because the data access is directed to the destination. In order for this EoIP Tunnel connection to run optimally and well, a network management is needed in managing internet bandwidth usage
APA, Harvard, Vancouver, ISO, and other styles
48

Cui, Jun, Longkun Bai, Guangxu Li, Zhigui Lin, and Penggao Zeng. "Semi-2DCAE: a semi-supervision 2D-CNN AutoEncoder model for feature representation and classification of encrypted traffic." PeerJ Computer Science 9 (November 9, 2023): e1635. http://dx.doi.org/10.7717/peerj-cs.1635.

Full text
Abstract:
Traffic classification is essential in network-related areas such as network management, monitoring, and security. As the proportion of encrypted internet traffic rises, the accuracy of port-based and DPI-based traffic classification methods has declined. The methods based on machine learning and deep learning have effectively improved the accuracy of traffic classification, but they still suffer from inadequate extraction of traffic structure features and poor feature representativeness. This article proposes a model called Semi-supervision 2-Dimensional Convolution AutoEncoder (Semi-2DCAE). The model extracts the spatial structure features in the original network traffic by 2-dimensional convolution neural network (2D-CNN) and uses the autoencoder structure to downscale the data so that different traffic features are represented as spectral lines in different intervals of a one-dimensional standard coordinate system, which we call FlowSpectrum. In this article, the PRuLe activation function is added to the model to ensure the stability of the training process. We use the ISCX-VPN2016 dataset to test the classification effect of FlowSpectrum model. The experimental results show that the proposed model can characterize the encrypted traffic features in a one-dimensional coordinate system and classify Non-VPN encrypted traffic with an accuracy of up to 99.2%, which is about 7% better than the state-of-the-art solution, and VPN encrypted traffic with an accuracy of 98.3%, which is about 2% better than the state-of-the-art solution.
APA, Harvard, Vancouver, ISO, and other styles
49

Wu, Nancy, Anne-Sophie Brazeau, Meranda Nakhla, Deborah Chan, Deborah Da Costa, Geetha Mukerji, Sonia Butalia, et al. "Type 1 Diabetes Mellitus Virtual Patient Network as a Peer Support Community: Protocol for Social Network Analysis and Content Analysis." JMIR Research Protocols 9, no. 8 (August 31, 2020): e18714. http://dx.doi.org/10.2196/18714.

Full text
Abstract:
Background Type 1 Diabetes Mellitus Virtual Patient Network (T1DM-VPN) is a private Facebook group for youths with type 1 diabetes mellitus (T1DM) in Canada intended to facilitate peer-to-peer support. It was built on the finding that stigma is prevalent among youth with T1DM and impedes self-management. Objective We aim to determine if T1DM-VPN provides support as intended and to ascertain what type of members provide support. Specifically, we will (1) identify text consistent with any one of 5 social support categories, (2) describe the network by visualizing its structure and reporting basic engagement statistics, and (3) determine whether being a designated peer leader is related to a member’s centrality (ie, importance in the network) and how frequently they offer social support. Methods We will manually extract interaction data from the Facebook group (posts, comments, likes/reactions, seen) generated from June 21, 2017 (addition of first member), to March 1, 2020. Two researchers will independently code posts and comments according to an existing framework of 5 social support categories—informational, emotional, esteem, network, and tangible—with an additional framework for nonsocial support categories. We will calculate how frequently each code is used. We will also report basic engagement statistics (eg, number of posts made per person-month) and generate a visualization of the network. We will identify stable time intervals in the history of T1DM-VPN by modeling monthly membership growth as a Poisson process. Within each interval, each member’s centrality will be calculated and standardized to that of the most central member. We will use a centrality formula that considers both breadth and depth of connections (centrality = 0.8 × total No. of connections + 0.2 × total No. of interactions). Finally, we will construct multivariate linear regression models to assess whether peer leader status predicts member centrality and the frequency of offering social support. Other variables considered for inclusion in the models are gender and age at diagnosis. Results T1DM-VPN was launched in June 2017. As of March 1, 2020, it has 196 patient-members. This research protocol received ethics approval from the McGill University Health Centre Research Ethics Board on May 20, 2020. Baseline information about each group member was collected upon addition into the group, and collection of interaction data is ongoing as of May 2020. Conclusions This content analysis and social network analysis study of a virtual patient network applies epidemiological methods to account for dynamic growth and activity. The results will allow for an understanding of the topics of importance to youth with T1DM and how a virtual patient network evolves over time. This work is intended to serve as a foundation for future action to help youth improve their experience of living with diabetes. International Registered Report Identifier (IRRID) PRR1-10.2196/18714
APA, Harvard, Vancouver, ISO, and other styles
50

Chen, Yi Ping. "Enterprise Computer Network Security System Design & Realization." Applied Mechanics and Materials 543-547 (March 2014): 3195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3195.

Full text
Abstract:
The idea and method of multi hiberarchy design for security is proposed in this paper with the basic theory of security for modern network. A detailed analysis on hiberarchy is done to figure out the potential security risk under various internal levels of an enterprise by deeply study on a dummy enterprise network. According to the principle of integrity, balance, combination of technology and management, a network security target which is fit for the requirement of enterprise is issued. And based on it, a total network security solution is proposed. This article focuses on the setup of firewall, design and setup of inbreak detection system, implementation of VPN and application of access control program. It also discusses the selection, setup and management system of the network hardware. This solution has a lot of advantages, such as high practicability, strong security, good performance-to-price ratio, easily exercisable, advanced setup and well extensibility.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography