To see the other types of publications on this topic, follow the link: VPN.

Journal articles on the topic 'VPN'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'VPN.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kazén, Miguel. "Problemessen vs. Spaßessen." Zeitschrift für Gesundheitspsychologie 14, no. 2 (2006): 34–45. http://dx.doi.org/10.1026/0943-8149.14.2.34.

Full text
Abstract:
Zusammenfassung. Das Zusammenspiel von negativem Affekt und nachfolgender Affektregulation auf das Essverhalten wurde mit 70 Versuchspersonen (Vpn) experimentell untersucht. Nach einer Imaginationsinduktion von negativem Affekt wurden die Vpn in eine positive oder in eine negative Selbstaktivierungsgruppe eingeteilt. Die Diätintention der Probanden wurde durch eine “Neujahrsvorsatz-Methode“ erfasst. Es ergaben sich folgende Interaktionen zwischen Selbstaktivierung und Diätintention: (a) Vpn mit negativer Selbstaktivierung und niedriger Diätintention aßen mehr Schokolade als Vpn in allen andere
APA, Harvard, Vancouver, ISO, and other styles
2

Leutner, Detlev, Anke Barthel, and Beate Schreiber. "Studierende können lernen, sich selbst zum Lernen zu motivieren: Ein Trainingsexperiment." Zeitschrift für Pädagogische Psychologie 15, no. 3/4 (2001): 155–67. http://dx.doi.org/10.1024//1010-0652.15.34.155.

Full text
Abstract:
Zusammenfassung: Sechsundsechzig Studierende nahmen an einem computer-basierten Training motivationaler Lernstrategien teil. Gegenstand des Trainings war eine Strategie, eine Lernabsicht zu entwickeln, indem man sich den persönlichen Nutzen des zu erwerbenden Wissens verdeutlicht. Die Vpn erhielten (1) kein spezifisches Training, (2) nur ein Training der motivationalen Lernstrategie oder (3) ein kombiniertes Training der Lernstrategie und darauf bezogener Selbstregulation. Nach dem Training bearbeiteten die Vpn einen Lehrtext, den sie zuvor als weniger motivierend beurteilt hatten. Es wurde er
APA, Harvard, Vancouver, ISO, and other styles
3

Kempter, Guido, and Carsten Möller. "Beurteilung einzelner Stimuli des Ausdrucksverhaltens ohne ihre entsprechenden Kontext- und Begleitmerkmale." Zeitschrift für Sozialpsychologie 31, no. 2 (2000): 102–12. http://dx.doi.org/10.1024//0044-3514.31.2.102.

Full text
Abstract:
Zusammenfassung: Die Untersuchung galt der Frage, welche Bedeutung ausschließlich den Körper- und Gliederbewegungen des Menschen in face-to-face Situationen bei der Eigenschaftsattribution zukommt. Hierzu wurde das Verfahren der Skriptanimation eingesetzt, womit sich die entsprechenden Bewegungen von anderen normalerweise zur Verfügung stehenden Informationen isolieren und auf eine Computerpuppe übertragen lässt. Insgesamt 153 Versuchspersonen nahmen an drei Versuchsreihen teil und beurteilten nacheinander 12 verschiedene Fernsehakteure: 55 Vpn beurteilten die Originalaufzeichnung der Akteure;
APA, Harvard, Vancouver, ISO, and other styles
4

Anbalagan, Srivishnupriya, Elyse Cooper, Pat Klumper, Randy R. Simonson, and Ben M. Hause. "Whole genome analysis of epizootic hemorrhagic disease virus identified limited genome constellations and preferential reassortment." Journal of General Virology 95, no. 2 (2014): 434–41. http://dx.doi.org/10.1099/vir.0.059659-0.

Full text
Abstract:
Epizootic hemorrhagic disease virus (EHDV) is a Culicoides transmitted orbivirus that causes haemorrhagic disease in wild and domestic ruminants. A collection of 44 EHDV isolated from 2008 to 2012 was fully sequenced and analysed phylogenetically. Serotype 2 viruses were the dominant serotype all years except 2012 when serotype 6 viruses represented 63 % of the isolates. High genetic similarity (>94 % identity) between serotype 1 and 2 virus VP1, VP3, VP4, VP6, NS1, NS2 and NS3 segments prevented identification of reassortment events for these segments. Additionally, there was little geneti
APA, Harvard, Vancouver, ISO, and other styles
5

Fatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) provide remotely secure connection for clients to exchange information with company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity using GNS3 Network simulator. The testing and verification analyzing of data packets is done using both PING tool and Wireshark to ensure the encryption of data packets during data exchange between different sites belong to the same company.
APA, Harvard, Vancouver, ISO, and other styles
6

Fu, Chunle, Bailing Wang, Wei Wang, et al. "A Generic High-Performance Architecture for VPN Gateways." Electronics 13, no. 11 (2024): 2031. http://dx.doi.org/10.3390/electronics13112031.

Full text
Abstract:
Virtual private network (VPN) gateways are widely applied to provide secure end-to-end remote access and to relay reliable interconnected communication in cloud computing. As network convergence nodes, the performance of VPN gateways is limited by traditional methods of packet receiving and sending, the kernel protocol stack and the virtual network interface card. This paper proposes a generic high-performance architecture (GHPA) for VPN gateways in consideration of its generality and performance. In terms of generality, we redesign a generic VPN core framework by modeling a generic VPN commun
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Min-Seong, Jee-Tae Park, Ui-Jun Baek, Jung-Woo Choi, and Myung-Sup Kim. "Importance Analysis of Traffic Statistics Information for VPN/NoN-VPN Classification." Journal of Korean Institute of Communications and Information Sciences 47, no. 11 (2022): 1768–75. http://dx.doi.org/10.7840/kics.2022.47.11.1768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Andini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.

Full text
Abstract:
The discovery of a Virtual Private Network (VPN) makes it easy to access the internet wherever and whenever. Many service providers see the advantages of VPN being commercially usable, VPNs are very vulnerable to hacker attacks, cracking that supports data or information from VPN application users, this research offers to provide information about VPN security Point to Point Tunneling protocol (PPTP) and whether the VPN security system has been licensed and is in accordance with applicable law or not. This research is normative juridical. By using analytical descriptive analysis, this research
APA, Harvard, Vancouver, ISO, and other styles
9

Kher, Bhushan, Preeti Karmore, Nutan Sonwane, et al. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.

Full text
Abstract:
Abstract: A VPN is an essential tool for securing your personal data and protecting your privacy online. We’ve put together the ultimate guide to VPNs to show you what a VPN does, how VPNs work, and how they protect you. Learn how to choose the right VPN, or secure your privacy right now by downloading our own powerful and lightning-fast VPN app. A VPN works by using encryption protocols to funnel all your internet traffic through an encrypted tunnel a virtual private network between your computer and a remote VPN server. This hides your IP address and secures your data, preventing others from
APA, Harvard, Vancouver, ISO, and other styles
10

Mardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3." Jurnal Sains dan Informatika 5, no. 2 (2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.

Full text
Abstract:
The ever-increasing internet is an ISP challenge for the future of the expected global computer network traffic and QoS needs. To maintain competitive ISPs in Indonesia with the development of internet usage, the demand for QoS must be increased. MPLS VPN networks combine layer 2 switching technology with layer 3 routing technology. MPLS VPN networks have emerged as technologies that meet VPN requirements such as private IP, and the ability to support overlapping addresses in resolving speed and QoS problems. The method used is experimental research. From the measurement results obtained by VP
APA, Harvard, Vancouver, ISO, and other styles
11

Jaafar, Fauziah Mohd, Houssam Attoui, Peter P. C. Mertens, Philippe de Micco, and Xavier de Lamballerie. "Structural organization of an encephalitic human isolate of Banna virus (genus Seadornavirus, family Reoviridae)." Journal of General Virology 86, no. 4 (2005): 1147–57. http://dx.doi.org/10.1099/vir.0.80578-0.

Full text
Abstract:
Banna virus (BAV) is the type species of the genus Seadornavirus within the family Reoviridae. The Chinese BAV isolate (BAV-Ch), which causes encephalitis in humans, was shown to have a structural organization and particle morphology reminiscent of that of rotaviruses, with fibre proteins projecting from the surface of the particle. Intact BAV-Ch virus particles contain seven structural proteins, two of which (VP4 and VP9) form the outer coat. The inner (core) particles contain five additional proteins (VP1, VP2, VP3, VP8 and VP10) and are ‘non-turreted’, with a relatively smooth surface appea
APA, Harvard, Vancouver, ISO, and other styles
12

Anwar, Rian Septian, and Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.

Full text
Abstract:
Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus dito
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Zai Ying, Ping Yang, and Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms." Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.

Full text
Abstract:
VPN based on the internet can not only make some enterprises save a large amount of costs, but also has better scalability, security and reliability. The paper introduced the concept and classifications of VPN, and described the key technologies of IPsec VPN and MPLS VPN. At last, we put the emphasis on the VPN network management mechanism, including fault management, performance management and tunnel management.
APA, Harvard, Vancouver, ISO, and other styles
14

Fu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (2024): 2674. http://dx.doi.org/10.3390/electronics13132674.

Full text
Abstract:
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network (VPN) and SDN architecture to leverage the controllability and programmability of SDN, which are only applicable for specific platforms and do not comply with the extensibility of SDN. This paper motivates us to refactor traditional VPNs with SDN architect
APA, Harvard, Vancouver, ISO, and other styles
15

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The perf
APA, Harvard, Vancouver, ISO, and other styles
16

Mohd Fuzi, Mohd Faris, Mohamad Ridzuan Mohd Alias, Naginder Kaur, and Iman Hazwam Abd Halim. "SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network." Journal of Computing Research and Innovation 6, no. 4 (2021): 90–101. http://dx.doi.org/10.24191/jcrinn.v6i4.230.

Full text
Abstract:
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet. VPNs can be used to shield users’ browsing activity and encrypts data transmitted over the network to prevent sniffing attack. Nowadays, users can either pay a premium price for a good VPN service or risk their privacy using free browser-based VPN. Thus, SafeSearch is developed to address these issues in mind. With SafeSearch, users will not need to fork out a lot o
APA, Harvard, Vancouver, ISO, and other styles
17

Hyatt, A. D. "Exposure of protein VP7 on the surface of bluetongue virus." Proceedings, annual meeting, Electron Microscopy Society of America 48, no. 3 (1990): 600–601. http://dx.doi.org/10.1017/s0424820100160558.

Full text
Abstract:
Bluetongue virus (BTV) is the type species os the genus orbivirus in the family Reoviridae. The virus has a fibrillar outer coat containing two major structural proteins VP2 and VP5 which surround an icosahedral core. The core contains two major proteins VP3 and VP7 and three minor proteins VP1, VP4 and VP6. Recent evidence has indicated that the core comprises a neucleoprotein center which is surrounded by two protein layers; VP7, a major constituent of capsomeres comprises the outer and VP3 the inner layer of the core . Antibodies to VP7 are currently used in enzyme-linked immunosorbant assa
APA, Harvard, Vancouver, ISO, and other styles
18

Kempter, Guido. "Scriptanimation. Methode zur Beschreibung und Darstellung natürlicher menschlicher Bewegungen." Experimental Psychology 46, no. 2 (1999): 129–34. http://dx.doi.org/10.1026//0949-3964.46.2.129.

Full text
Abstract:
Zusammenfassung. Das Verfahren zur Scriptanimation wird als eine neue Methode zur originalgetreuen Beschreibung und Nachbildung natürlicher menschlicher Körperbewegungen vorgestellt. Es basiert auf einem Verfahren zur Erstellung von Bewegungsscripts nach biomechanischer Taxonomie und einer Rechnerschnittstelle, welche die Daten des Scripts auf die geometrischen Segmente eines Computermodells überträgt. In einem Anwendungsbeispiel wurden die gestischen Bewegungen von 59 Politikern, wie sie in Nachrichtensendungen zu sehen waren, mit diesem Verfahren reanimiert. 84 Vpn betrachteten das Original
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu, and Bo Li. "An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN." Photonic Network Communications 7, no. 3 (2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zelenkina, A. S., E. A. Pavlyukevich, and A. V. Ponachugin. "VPN: USE, SECURITY, RISKS." ITNOU: Information technologies in science, education and management 1, no. 19 (2022): 45–48. http://dx.doi.org/10.47501/itnou.2022.1.45-48.

Full text
Abstract:
In this article, we will look at some ways to connect to the Internet, one of which is a VPN. You will learn the history of its creation, how it functions and how safe its use is. Also, the article discusses some laws concerning the use of this service and what consequences its use in everyday life may have.
APA, Harvard, Vancouver, ISO, and other styles
21

Fan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.

Full text
Abstract:
In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec VPN has improved the safety performance of data transmission, it at the same time affects the transmission efficiency. By analyzing the problems of IPSec VPN, in terms of improving safety performance, the combination of PKI and IPSec VPN program was proposed. Theoretical analysis shows that su
APA, Harvard, Vancouver, ISO, and other styles
22

Human Sukma, Ayman, Mhd Ilyasyah Drilanang, Sybil Auzi, and Dedy Kiswanto. "IMPLEMENTASI OPENVPN SERVER MENGGUNAKAN RED HAT ENTERPRISE LINUX PADA AMAZON WEB SERVICES." JATI (Jurnal Mahasiswa Teknik Informatika) 8, no. 6 (2024): 12601–7. https://doi.org/10.36040/jati.v8i6.12010.

Full text
Abstract:
Virtual Private Network (VPN) adalah teknologi yang memungkinkan koneksi jaringan yang aman melalui internet. Pada penelitian ini, server VPN diimplementasikan menggunakan OpenVPN pada platform Amazon Web Services (AWS) dengan Red Hat Enterprise Linux (RHEL) sebagai sistem operasi server. Manajemen dan pengujian koneksi VPN dilakukan dengan menggunakan mesin Windows 11 sebagai klien. Penelitian bertujuan untuk membangun infrastruktur VPN yang aman dan dapat diakses dari berbagai lokasi pada layanan service cloud. Pengujian dilakukan untuk mengamati performansi kinerja dan hasil akan membantu u
APA, Harvard, Vancouver, ISO, and other styles
23

Mahardiyanto, Muliatama Putra. "Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 3, no. 2 (2016): 26–32. http://dx.doi.org/10.33795/jartel.v3i2.217.

Full text
Abstract:
Data exchange communication has developed that leads to centralized communication, and to realize this communication, a type of data communication is needed whose data is stored on a server and can be accessed by clients, such as at the Malang State Polytechnic. As an institution engaged in the world of education, the development of data communication is centralized by utilizing the established intranet network. The use of an intranet network allows for data communication that is vulnerable to eavesdropping. To overcome this, use a VPN network. PPTP VPN and L2TP/IPsec VPN have different perfor
APA, Harvard, Vancouver, ISO, and other styles
24

Rahman, Taufik, Giovanni Maria Vianney Tobia Mariatmojo, Hafis Nurdin, and Herman Kuswanto. "Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi." Teknika 11, no. 2 (2022): 138–47. http://dx.doi.org/10.34148/teknika.v11i2.482.

Full text
Abstract:
Komunikasi jaringan internet butuh keamanan, kemudahan, dan kecepatan transfer data yang baik. Hal ini harus diperhatikan oleh setiap pengguna dalam melakukan kegiatan di dunia maya atau internet, sehingga kerahasiaan informasi bisa terjaga dengan baik dan kemudahan, kecepatan pertukaran data bisa di implementasikan sehingga dapat menjadi suatu nilai lebih. VPN dapat terjadi antara dua PC atau bisa juga antara dua atau lebih jaringan yang berbeda. VPN dapat dibentuk dengan menggunakan teknologi tunneling dan encryption. Server OpenVPN menghasilkan profil jaringan terenkripsi, kemudian semua pe
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Jianyun, and Chunyan Li. "Research on meteorological information network security system based on VPN Technology." MATEC Web of Conferences 232 (2018): 01001. http://dx.doi.org/10.1051/matecconf/201823201001.

Full text
Abstract:
In this paper, the concept of VPN and the security technology are studied. In combination with the characteristics of the network, the security technology of the remote access VPN server and the client is discussed, the VPN security system of the meteorological special network is designed, and the VPN network security system of the meteorological network is realized.
APA, Harvard, Vancouver, ISO, and other styles
26

Fan, Ya Qin, Hao Fan, and Chao Sun. "OPNET-Based Computer Simulation of MPLS VPN Security Solutions." Applied Mechanics and Materials 40-41 (November 2010): 361–65. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.361.

Full text
Abstract:
This paper features of IPSec and MPLS technologies, proposes a suitable MPLS VPN security solutions. The program to solve the VPN using MPLS backbone network in the public transport there is a second layer of information can not automatically encrypt, or connect easily made because of errors due to the interruption of information disclosure and other issues. To verify the proposed security program, the actual MPLS VPN can be simplified, abstracestablishing a simulation system MPLS VPN, and using OPNET simulation software simulation, simulation results of VPN officers practical reference value.
APA, Harvard, Vancouver, ISO, and other styles
27

Haeruddin, Haeruddin, and Kelvin Kelvin. "Analisa Penggunaan VPN L2TP dan SSTP di Masa Pandemi Covid-19." Jurnal Ilmu Komputer dan Bisnis 13, no. 1 (2022): 105–14. http://dx.doi.org/10.47927/jikb.v13i1.279.

Full text
Abstract:
COVID-19 merupakan sebuah virus yang telah berkembang menjadi pandemi global. Hal ini menyebabkan jutaan karyawan di seluruh dunia saat ini bekerja dari rumah. Virtual Private Network (VPN) dapat digunakan untuk memberikan karyawan akses data kantor dari rumah. Penelitian ini menganalisa perbedaan protokol VPN L2TP/IPsec dengan SSTP untuk memilih teknologi VPN yang cocok digunakan sesuai kebutuhan pengguna. Hal ini dilakukan dengan cara membangun jaringan VPN tersebut dengan parameter kebutuhan perangkat, QoS, keamanan, dan skalabilitas dengan menggunakan metode Network Development Life Cycle
APA, Harvard, Vancouver, ISO, and other styles
28

Yessenzholov, Ulan, and Nurbol Kaliaskarov. "IMPLEMENTATION OF TRAFFIC PROTECTION BASED ON IPSEC VPN TECHNOLOGY AND NETWORK MODELING ON ENSP SOFTWARE ENVIRONMENT." Вестник КазАТК 126, no. 3 (2023): 198–204. http://dx.doi.org/10.52167/1609-1817-2023-126-3-198-204.

Full text
Abstract:
The article is devoted to the study of such technology as IPsec VPN. The role of this technology in the field of information and communication technologies is quite significant. Firstly, IPsec VPN supports many modern encryption algorithms and authentication methods. Secondly, IPsec VPN is supported by many vendors, which allows you to deploy this technology based on equipment from different manufacturers. Thirdly, IPsec VPN does not require much performance from the hardware. Fourth, IPsec VPN is easy to use and easy to monitor. This article shows an example of IPsec VPN implementation on eNS
APA, Harvard, Vancouver, ISO, and other styles
29

Domakonda, Dileep. "Secure Remote Access in CloudStack: Implementation and Performance Evaluation of an L2TP-over-IPsec VPN." Eastasouth Journal of Information System and Computer Science 1, no. 02 (2023): 126–31. https://doi.org/10.58812/esiscs.v1i02.513.

Full text
Abstract:
This paper presents the design and deployment of a remote access VPN function in CloudStack, an open-source platform for virtualized cloud management. The Remote Access VPN offers secure connectivity for remote users to communicate with virtual machines (VMs) within guest networks. Users can safely connect to cloud-based systems from external networks by using a VPN that uses L2TP-over-IPsec as the underlying protocol. With certain routing mechanisms that guarantee that only guest network traffic is routed through the VPN, the feature supports both "Road Warrior" (dynamic IP clients) and "Site
APA, Harvard, Vancouver, ISO, and other styles
30

Fan, Ya Qin, Sheng Sheng Qian, and Feng Shan Liang. "VPN Security Technology Theory Modeling and Simulation." Applied Mechanics and Materials 135-136 (October 2011): 1114–19. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1114.

Full text
Abstract:
In order to authenticate users and to strictly control the only authorized users can access VPN address and biling functions to provide audit expenses such problems, the paper established a theoretical model of VPN security technologies, the use of OPNET simulation tool for safety and technical performance of the VPN the simulation results of VPN security professionals with practical reference value.
APA, Harvard, Vancouver, ISO, and other styles
31

Ariyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.

Full text
Abstract:
Dibutuhkannya komunikasi dalam menunjang interaksi antar perusahaan yang memiliki kaitan yang sangat erat terhadap perkembangan teknologi informasi melalui jaringan komputer. Virtual Private Network atau biasa disebut VPN memiliki peran penting dalam perkembangan sistem keamanan dalam jaringan internet, terutama dalam membatasi hak akses terhadap server, database, dan sejenisnya dalam meminimalisir terjadinya akses illegal terhadap data-data penting perusahaan. VPN memiliki beberapa tipe salah seperti VPN Tunnel dan IPSec, VPN Tunnel memiliki konsep yang lebih sederhana dibandingkan dengan IPS
APA, Harvard, Vancouver, ISO, and other styles
32

Supriyanto, Bambang, and Suharyanto Suharyanto. "Perancangan Jaringan VPN Menggunakan Metode Point To Point Tunneling Protocol." Jurnal Teknik Komputer 5, no. 2 (2019): 235–40. http://dx.doi.org/10.31294/jtk.v5i2.5452.

Full text
Abstract:
PT. Hail Otis Logistics is a Forwarding and Expedition Company that provides Custom Clearence Export and Import services as well as Shipping or Delivery from Partner Companies to Tanjung Priuk Port and vice versa. Currently PT. Hail Otis Logistics is sending company data using e-mail, so the company cannot yet ensure the security of the data sent. Due to the company's problems, designing a VPN is a means of communicating and transferring data securely and maintaining data validity. In this study VPN was built using the PPTP (Point To Point Tunneling Protocol) method to build a VPN network at P
APA, Harvard, Vancouver, ISO, and other styles
33

Mohammed, Subhi Aswad. "Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study." Al-Nahrain Journal for Engineering Sciences 22, no. 4 (2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.

Full text
Abstract:
This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON si
APA, Harvard, Vancouver, ISO, and other styles
34

Juliansah, Jodi, and Yuma Akbar. "OPTIMALISASI KINERJA JARINGAN VPN DENGAN METODE DMVPN." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, no. 3 (2023): 1788–98. http://dx.doi.org/10.35870/jimik.v4i3.412.

Full text
Abstract:
DMVPN (Dynamic Multipoint Virtual Private Network) is a VPN technology that can simplify the configuration process and improve network efficiency. The purpose of this research was conducted as a response to the obstacles experienced by companies in VPN network performance that did not meet expectations and reduced high operational and infrastructure costs related to the performance of the current VPN network. In addition, to determine the extent to which the use of DMVPN can improve the performance of VPN networks in companies. The method used is data collection through observation and intervi
APA, Harvard, Vancouver, ISO, and other styles
35

Novanto, Mukhammad Rizki, Joseph Dedy Irawan, and F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 1 (2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.

Full text
Abstract:
Tidak bisa dipungkiri semenjak pandemi virus Covid-19 kegiatan internet terus menjadi bertambah. Semacam halnya bekerja dari rumah memakai internet, belajar daring memakai internet, komunikasi social media memakai internet, belanja online di pasar online dengan internet, sampai mencari data lewat internet. Kebutuhan internet terus menjadi bertambah, tidak hanya harga virtual private server yang disediakan provider lokal relatif mahal serta instalasi sampai operasional membutuhkan banyak tahapan, semacam wajib menginstal script guna berjalannya protocol pada VPS sehingga dibutuhkannya sesuatu s
APA, Harvard, Vancouver, ISO, and other styles
36

Shepherd, Frances, Diana Herrera-Ibata, Elizabeth Porter, et al. "Whole Genome Classification and Phylogenetic Analyses of Rotavirus B strains from the United States." Pathogens 7, no. 2 (2018): 44. http://dx.doi.org/10.3390/pathogens7020044.

Full text
Abstract:
Rotaviruses (RVs) are a major etiological agent of acute viral gastroenteritis in humans and young animals, with rotavirus B (RVB) often detected in suckling and weaned pigs. Group A rotavirus classification is currently based on the two outer capsid proteins, VP7 and VP4, and the middle layer protein, VP6. Using RVB strains generated in this study and reference sequences from GenBank, pairwise identity frequency graphs and phylogenetic trees were constructed for the eleven gene segments of RVB to estimate the nucleotide identity cutoff values for different genotypes and determine the genotype
APA, Harvard, Vancouver, ISO, and other styles
37

Sulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.

Full text
Abstract:
Perkembangan teknologi yang semakin maju mempengaruhi suatu sistem dan efisiensi dalam dunia pekerjaan. Oleh karna itu sangat di butuhkan sekali jaringan internet, selain pentingnya jaringan internet juga perusahaan sangat membutuhkan adanya jaringan pribadi (VPN) yang aman, sebagai jalur khusus untuk mengakses ke jaringan lokal perusahaan. Untuk mengatasi hal ini maka penulis akan merancang sebuah VPN IPsec dengan menggunakan Router MikroTik. VPN memungkinkan untuk mengakses jaringan lokal perusahaan menggunakan koneksi internet publik. Dari hasil riset yang penulis lakukan telah membuktikan
APA, Harvard, Vancouver, ISO, and other styles
38

Rendy, Munadi, Dwi Sanjoyo Danu, Perdana Doan, and Adjie Fidar. "Performance analysis of tunnel broker through open virtual private network." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1185–92. https://doi.org/10.12928/TELKOMNIKA.v17i3.12231.

Full text
Abstract:
Tunnel Broker uses automatic configuration tunneling mechanism for IPv6 clients connected to IPv4 internet. Connectivity between clients and service providers in IPv6 is urgently needed. Open VPN as a provider implemented configures it by a VPN network, so IPv6 and IPv4 public IP clients can easily connect to the server. In this research focused on the performance of tunnel broker mechanism by utilizing open VPN as access to the network. IPv6 tunnel broker is developed by installing Open VPN and providing IPv6 IPs. Implementation of public IP usage in observing the performance of tunnel broker
APA, Harvard, Vancouver, ISO, and other styles
39

Damasco Jr., Loreto B., Noel Raymund F. Lacson, and Roger T. Intong. "Safeguarding Transactional Data: A Comprehensive Investigation of VPN Integration in Point-of-Sale Systems for Enhanced Security and Connectivity." Eximia 12 (December 14, 2023): 570–89. http://dx.doi.org/10.47577/eximia.v12i1.405.

Full text
Abstract:
The integration of Virtual Private Network (VPN) technology into Point-of-Sale (POS) systems has emerged as a solution for securing transactional data in businesses. This study investigates the implementation of a VPN server to address security and connectivity challenges faced by the University of St. La Salle (USLS) Bookstore. The research delves into VPN policy frameworks, assessing the scope and binding, authentication methods, and VPN credentials and security protocols. The system design employs a combination of conceptual models and activity diagrams to illustrate the process of user aut
APA, Harvard, Vancouver, ISO, and other styles
40

E, Poerbaningtyas, and Achmad Riyan Adi. "Sistem Informasi Manajemen VPN Remote Mikrotik Berbasis Codeigniter PHP Framework Di Desa Sawo." J-INTECH 12, no. 02 (2024): 340–52. https://doi.org/10.32664/j-intech.v12i02.1468.

Full text
Abstract:
Pengelolaan akun VPN dan konfigurasi port forwading di Mikrotik CHR (Cloud Hosted Router) menggunakan Winbox menjadi tugas yang rumit bagi pengguna awam yang tidak memiliki pengalaman dalam administrasi jaringan. Sehingga dampaknya konfigurasi seperti kesalahan dalam penentuan TCP/UDP, Firewall Rules, IP dan nomor port yang mengakibatkan port konflik. Karena VPN remote gagal dikelola dengan baik. Dari permasalahan yang ada, maka peneliti membenahi infrastruktur jaringa dan membuat sebuah Sistem Informasi Manajemen untuk kelola forwading, akun VPN, payment gateway. Sehingga akan meminimalkan hu
APA, Harvard, Vancouver, ISO, and other styles
41

Qian, Xuan Yu, Shi Min Liu, Cheng Zhou, and Xiao Juan Guan. "Research of Network Testing Based on MPLS L2VPN." Advanced Materials Research 791-793 (September 2013): 1695–98. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1695.

Full text
Abstract:
MPLS (Multi-Protocol Label Switching) VPN is based on MPLS technology and construct virtual private network (VPN) on backbone network, to provide users with safe, reliable, high-quality business technology VPN. MPLS L2VPN (Layer 2 VPN) is one type of solutions of MPLS VPN. The MPLS L2VPN technology, after years of researching and practicing, is becoming mature, and many RFCs and related drafts are published to standardize it. However, there is not much research of network test method on the MPLS L2VPN technology, this paper analyzes the various MPLS L2VPN solutions and make a reach on test met
APA, Harvard, Vancouver, ISO, and other styles
42

Kuang, Ai Nong. "Application Research of Computer Network Load Certification Constructing VPN Tunnel Technology." Advanced Materials Research 926-930 (May 2014): 2217–20. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2217.

Full text
Abstract:
Setting-up large-scale VPN network becomes an important task, VPN has been attracted extensibe attention of business subscribers. In one speak, VPN technology is very complicated, it involves in communication technology, cryptography, authentication technology, it is an interdisciplinary. Tunnel technology is a key technology to set-up VPN network. In the port of host LAN and Internet, the data is packed in a pattern that can transport in Internet , in object LAN, the data is decompression and can use it . Give a simple analysis of the tunnel technique from the development of tunnel technique,
APA, Harvard, Vancouver, ISO, and other styles
43

Rifandy, Ahmad Surya, and Salman Topiq. "Analisa dan Implementasi VPN Dinamis Menggunakan Hamachi Pada PT. Jaindo Metal Industries." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 6, no. 2 (2023): 178–86. http://dx.doi.org/10.32672/jnkti.v6i2.5904.

Full text
Abstract:
Abstrak - Teknologi informasi saat ini berkembang sangat cepat, dinamis dan canggih. Seiring dengan perkembangannya, PT. Jaindo Metal Industries membangun jaringan komputer berbasis VPN dinamis untuk mempermudah melakukan kegiatan operasional antar kantor cabang dan kantor pusat, seperti melakukan transaksi data atau presentasi melalui jalur publik, salah satunya penggunaan bersama aplikasi bisnis Microsoft Dynamic Axapta 4.0 pada semua cabang yang dioperasikan melalui domain pada kantor pusat. Penggunaan IP Publik non VPN memungkinkan terjadinya penyadapan oleh pihak yang tidak berkepentingan
APA, Harvard, Vancouver, ISO, and other styles
44

Khan, Muhammad U. S., Syed M. A. H. Bukhari, Tahir Maqsood, Muhammad A. B. Fayyaz, Darren Dancey, and Raheel Nawaz. "SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic." Electronics 11, no. 3 (2022): 350. http://dx.doi.org/10.3390/electronics11030350.

Full text
Abstract:
Encryption Protocols e.g., HTTPS is utilized to secure the traffic between servers and clients for YouTube and other video streaming services, and to further secure the communication, VPNs are used. However, these protocols are not sufficient to hide the identity of the videos from someone who can sniff the network traffic. The present work explores the methodologies and features to identify the videos in a VPN and non-VPN network traffic. To identify such videos, a side-channel attack using a Sequential Convolution Neural Network is proposed. The results demonstrate that a sequence of bytes p
APA, Harvard, Vancouver, ISO, and other styles
45

Haeruddin, Haeruddin, Gautama Wijaya, and Husnul Khatimah. "Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut." JITU : Journal Informatic Technology And Communication 7, no. 2 (2023): 102–13. http://dx.doi.org/10.36596/jitu.v7i2.1086.

Full text
Abstract:

 
 
 
 Working remotely or what we know as Work From Anywhere is still a trend after the COVID-19 pandemic. Working from anywhere and anytime can increase productivity and reduce transportation costs, and is accompanied by fast internet support, good communication and collaboration platforms so this is very popular and in demand. When implementing WFA, it has its own challenges, namely data security. Not all organizations are supported by a reliable IT infrastructure that can protect employee data during WFA. One of the security system technologies that can be used during
APA, Harvard, Vancouver, ISO, and other styles
46

Pangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 2 (2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.

Full text
Abstract:
Paper ini membahas tentang pembuatan server untuk penyimpanan data menggunakan sistem operasi Freenas, yang pengaksesan servernya melalui jaringan internet atau ip public menggunakan jalur VPN (Virtual Private Network). Akses data dari user ke server menggunakan authentikasi user Freenas dan ditambah dengan authentikasi user VPN untuk menambah keamanan jaringan dan mengatasi masalah keamanan dalam transaksi data seperti pencurian data. Hasil penelitian dari server yang dibuat, menunjukkan bahwa jalur VPN yang dibuat dapat dipakai untuk mengatasi masalah keamanan tersebut. Dari percobaan transa
APA, Harvard, Vancouver, ISO, and other styles
47

Sun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.

Full text
Abstract:
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer-organized public VPN relay system launched in 2013. By analyzing the security of the system, we have found that there is a man-in-the-middle attack risk because an attacker may hijack a VPN session and decrypt the traffic. According to our study, the reason of the security issues is the misuse of the SSL certificate. To
APA, Harvard, Vancouver, ISO, and other styles
48

Pangestu, Raka Nugraha, Risma Yanti, and Herlina Harahap. "Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (2021): 27–33. http://dx.doi.org/10.35447/jikstra.v3i1.357.

Full text
Abstract:
Although there are many security methods that can be used to block DDoS attacks, for now these methods are arguably less effective, because many hackers have known bugs from the system or security methods. From the background of this problem, testing the security of Linux Mint servers, Linux Mint without VPN and Anti DDoS, implementing network security from hammer attacks on Linux Mint Linux servers with VPN and Anti-DDoS, and testing DDoS and VPN attacks have been successfully implemented. on linux mint. Anti-DDoS and VPN are able to prevent DDoS attacks on Linux servers by blocking unknown I
APA, Harvard, Vancouver, ISO, and other styles
49

Patel, Raj Kumar, and Dr Lalan Kumar Singh. "Cloud Based VPN Using IP Tunneling for Remote Site Interface." International Journal for Research in Applied Science and Engineering Technology 11, no. 2 (2023): 1565–70. http://dx.doi.org/10.22214/ijraset.2023.48722.

Full text
Abstract:
Abstract: A strong IP technology that builds a secure and encrypted connection tunnel over the less secure internet is required by the majority of enterprise organizations. Joint location and link connectivity issues must be resolved for distant users and branch offices to have secure access to corporate applications and other resources. This ensures security while data passes over encrypted tunnels. Despite the development of IP-based VPN, JLP and LCP for VPN customer edge devices and provider edge nodes have not yet been completely investigated. The purpose of this work is to apply cutting-e
APA, Harvard, Vancouver, ISO, and other styles
50

Alqahtany, Saad Said, and Toqeer Ali Syed. "Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework." Applied Sciences 14, no. 11 (2024): 4421. http://dx.doi.org/10.3390/app14114421.

Full text
Abstract:
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments. This research introduces an innovative approach utilizing Convolutional Neural Networks (CNNs) and Graph Neural Networks (GNNs) for classifying VPN traffic, aiding forensic investigators in precisely identifying applications or websites accessed via VPN connections. By leveraging the combined strengths of CNNs and GNNs, our method provides an effective solution for discerning
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!