To see the other types of publications on this topic, follow the link: VPN.

Journal articles on the topic 'VPN'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'VPN.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kazén, Miguel. "Problemessen vs. Spaßessen." Zeitschrift für Gesundheitspsychologie 14, no. 2 (April 2006): 34–45. http://dx.doi.org/10.1026/0943-8149.14.2.34.

Full text
Abstract:
Zusammenfassung. Das Zusammenspiel von negativem Affekt und nachfolgender Affektregulation auf das Essverhalten wurde mit 70 Versuchspersonen (Vpn) experimentell untersucht. Nach einer Imaginationsinduktion von negativem Affekt wurden die Vpn in eine positive oder in eine negative Selbstaktivierungsgruppe eingeteilt. Die Diätintention der Probanden wurde durch eine “Neujahrsvorsatz-Methode“ erfasst. Es ergaben sich folgende Interaktionen zwischen Selbstaktivierung und Diätintention: (a) Vpn mit negativer Selbstaktivierung und niedriger Diätintention aßen mehr Schokolade als Vpn in allen anderen Bedingungen. (b) Vpn mit positiver Selbstaktivierung und hoher Diätintention aßen mehr Kekse als Vpn in allen anderen Bedingungen. Die Befunde sind nicht mit der Hypothese von Tice, Bratslavsky und Baumeister (2001) vereinbar, die eine einfache Beziehung zwischen negativem Affekt und nachfolgendem Verlust der Impulskontrolle beim Essen postulierten. Es gab darüber hinaus positive Korrelationen zwischen der Menge der verzehrten Schokolade und Persönlichkeitsdispositionen mit Beziehung zu Depressivität. Implikationen der Befunde für eine Diät und die Gesundheit werden diskutiert.
APA, Harvard, Vancouver, ISO, and other styles
2

Leutner, Detlev, Anke Barthel, and Beate Schreiber. "Studierende können lernen, sich selbst zum Lernen zu motivieren: Ein Trainingsexperiment." Zeitschrift für Pädagogische Psychologie 15, no. 3/4 (November 2001): 155–67. http://dx.doi.org/10.1024//1010-0652.15.34.155.

Full text
Abstract:
Zusammenfassung: Sechsundsechzig Studierende nahmen an einem computer-basierten Training motivationaler Lernstrategien teil. Gegenstand des Trainings war eine Strategie, eine Lernabsicht zu entwickeln, indem man sich den persönlichen Nutzen des zu erwerbenden Wissens verdeutlicht. Die Vpn erhielten (1) kein spezifisches Training, (2) nur ein Training der motivationalen Lernstrategie oder (3) ein kombiniertes Training der Lernstrategie und darauf bezogener Selbstregulation. Nach dem Training bearbeiteten die Vpn einen Lehrtext, den sie zuvor als weniger motivierend beurteilt hatten. Es wurde erhoben, inwieweit die Vpn die Trainingsinhalte zur Anwendung brachten, welches Motivationsniveau sie bei Anwendung der gelernten Strategie erreichten und wie viel Wissen sie aus der Bearbeitung des Textes gewannen. Die Vpn des kombinierten Trainings schnitten hinsichtlich aller drei Variablen besser ab als die Vpn des Lernstrategietrainings und die Vpn ohne Training, und die Vpn des Lernstrategietrainings schnitten ebenfalls besser ab als die Vpn ohne Training. Die Ergebnisse entsprechen aktuellen Theorien des Trainings von Lernstrategien, die davon ausgehen, dass es sinnvoll ist, neben der Vermittlung von Wissen über einzelne Lernstrategien auch den zielführenden Einsatz der jeweiligen Lernstrategie zu trainieren.
APA, Harvard, Vancouver, ISO, and other styles
3

Kempter, Guido, and Carsten Möller. "Beurteilung einzelner Stimuli des Ausdrucksverhaltens ohne ihre entsprechenden Kontext- und Begleitmerkmale." Zeitschrift für Sozialpsychologie 31, no. 2 (June 2000): 102–12. http://dx.doi.org/10.1024//0044-3514.31.2.102.

Full text
Abstract:
Zusammenfassung: Die Untersuchung galt der Frage, welche Bedeutung ausschließlich den Körper- und Gliederbewegungen des Menschen in face-to-face Situationen bei der Eigenschaftsattribution zukommt. Hierzu wurde das Verfahren der Skriptanimation eingesetzt, womit sich die entsprechenden Bewegungen von anderen normalerweise zur Verfügung stehenden Informationen isolieren und auf eine Computerpuppe übertragen lässt. Insgesamt 153 Versuchspersonen nahmen an drei Versuchsreihen teil und beurteilten nacheinander 12 verschiedene Fernsehakteure: 55 Vpn beurteilten die Originalaufzeichnung der Akteure; 33 Vpn beurteilten die originalgetreu reanimierten Körper- und Gliederbewegungen der Darsteller; 65 Vpn beurteilten die im Bewegungsablauf modifizierten Animationen. Als Beurteilungsinstrument wurden Ratingskalen eingesetzt. Die Ergebnisse veranschaulichen, dass die Eliminierung bzw. Konstanthaltung aller Begleit- und Kontextinformationen keinen systematischen Einfluss auf die Eigenschaftsattributionen ausübte. Andererseits genügten bereits kleine Modifikationen im Bewegungsablauf der Kopf- und Rumpfbewegungen, damit sich das Bild, das sich die Vpn von den dargestellten Personen machten, auf nahezu allen Urteilsskalen entweder verbesserte oder verschlechterte. Die Ergebnisse werden mit Erkenntnissen aus Multikanalanalysen nonverbalen Verhaltens in Zusammenhang gebracht.
APA, Harvard, Vancouver, ISO, and other styles
4

Anbalagan, Srivishnupriya, Elyse Cooper, Pat Klumper, Randy R. Simonson, and Ben M. Hause. "Whole genome analysis of epizootic hemorrhagic disease virus identified limited genome constellations and preferential reassortment." Journal of General Virology 95, no. 2 (February 1, 2014): 434–41. http://dx.doi.org/10.1099/vir.0.059659-0.

Full text
Abstract:
Epizootic hemorrhagic disease virus (EHDV) is a Culicoides transmitted orbivirus that causes haemorrhagic disease in wild and domestic ruminants. A collection of 44 EHDV isolated from 2008 to 2012 was fully sequenced and analysed phylogenetically. Serotype 2 viruses were the dominant serotype all years except 2012 when serotype 6 viruses represented 63 % of the isolates. High genetic similarity (>94 % identity) between serotype 1 and 2 virus VP1, VP3, VP4, VP6, NS1, NS2 and NS3 segments prevented identification of reassortment events for these segments. Additionally, there was little genetic diversity (>96 % identity) within serotypes for VP2, VP5 and VP7. Preferential reassortment within the homologous serotype was observed for VP2, VP5 and VP7 segments for type 1 and type 2 viruses. In contrast, type 6 viruses were all reassortants containing VP2 and VP5 derived from an exotic type 6 with the remaining segments most similar to type 2 viruses. These results suggest that reassortment between type 1 and type 2 viruses requires conservation of the VP2, VP5 and VP7 segment constellation while type 6 viruses only require VP2 and VP5 and are restricted to type 2-lineage VP7. As type 6 VP2 and VP5 segments were exclusively identified in viruses with type 2-derived VP7, these results suggest functional complementation between type 2 and type 6 VP7 proteins.
APA, Harvard, Vancouver, ISO, and other styles
5

Fatimah, Abdulnabi Salman. "Implementation of IPsec-VPN Tunneling using GNS3." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 855–60. https://doi.org/10.11591/ijeecs.v7.i3.pp855-860.

Full text
Abstract:
Virtual private networks (VPN) provide remotely secure connection for clients to exchange information with company networks. This paper deals with Site-to-site IPsec-VPN that connects the company intranets. IPsec-VPN network is implemented with security protocols for key management and exchange, authentication and integrity using GNS3 Network simulator. The testing and verification analyzing of data packets is done using both PING tool and Wireshark to ensure the encryption of data packets during data exchange between different sites belong to the same company.
APA, Harvard, Vancouver, ISO, and other styles
6

Fu, Chunle, Bailing Wang, Wei Wang, Ruichao Mu, Yunxiao Sun, Guodong Xin, and Yongzheng Zhang. "A Generic High-Performance Architecture for VPN Gateways." Electronics 13, no. 11 (May 23, 2024): 2031. http://dx.doi.org/10.3390/electronics13112031.

Full text
Abstract:
Virtual private network (VPN) gateways are widely applied to provide secure end-to-end remote access and to relay reliable interconnected communication in cloud computing. As network convergence nodes, the performance of VPN gateways is limited by traditional methods of packet receiving and sending, the kernel protocol stack and the virtual network interface card. This paper proposes a generic high-performance architecture (GHPA) for VPN gateways in consideration of its generality and performance. In terms of generality, we redesign a generic VPN core framework by modeling a generic VPN communication model, formulating generic VPN core technologies and presenting corresponding core algorithms. In terms of performance, we propose a three-layer GHPA for VPN gateways by designing a VPN packet processing layer based on a data plane development kit (DPDK), implementing a user space basic protocol stack and applying our proposed generic VPN core framework. On the basis of the research work above, we implement a high-performance VPN (HP-VPN) and a traditional VPN (T-VPN) that complies with GHPA and traditional methods, respectively. Experimental results prove that the performance of HP-VPN based on GHPA is superior to T-VPN and other common VPNs in RTT, system throughput, packet forwarding rate and jitter. In addition, GHPA is extensible and applicable for other VPN gateways to improve their performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Min-Seong, Jee-Tae Park, Ui-Jun Baek, Jung-Woo Choi, and Myung-Sup Kim. "Importance Analysis of Traffic Statistics Information for VPN/NoN-VPN Classification." Journal of Korean Institute of Communications and Information Sciences 47, no. 11 (November 30, 2022): 1768–75. http://dx.doi.org/10.7840/kics.2022.47.11.1768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Andini, Marisa Dika, Muhamad Amirullah, and Helitha Novianty Muchtar. "Penggunaan Aplikasi Virtual Private Network (VPN) Point To Point Tunneling Protocol (PPTP) Dalam Mengakses Situs Terblokir." Supremasi Hukum : Jurnal Penelitian Hukum 29, no. 2 (October 9, 2020): 148–66. http://dx.doi.org/10.33369/jsh.29.2.148-166.

Full text
Abstract:
The discovery of a Virtual Private Network (VPN) makes it easy to access the internet wherever and whenever. Many service providers see the advantages of VPN being commercially usable, VPNs are very vulnerable to hacker attacks, cracking that supports data or information from VPN application users, this research offers to provide information about VPN security Point to Point Tunneling protocol (PPTP) and whether the VPN security system has been licensed and is in accordance with applicable law or not. This research is normative juridical. By using analytical descriptive analysis, this research provides facts about VPN security point to point tunneling protocol (PPTP) in accessing blocked sites, discussed with the Electronic Transaction Information Act. Keywords: Virtual Private Network (VPN), point to point tunneling protocol (PPTP), Blocked Site, Penemuan Virtual Private Network (VPN) memberi kemudahan untuk mengakses internet dimanapun dan kapanpun. Banyak penyedia layanan melihat keuntungan bahwa VPN ini bisa digunakan gratis secara komersial, VPN sangat rentan dari serangan hacker, cracking yang mampu mencuri data atau informasi dari pengguna aplikasi VPN, penelitian ini bertujuan untuk memberikan informasi mengenai keamanan VPN Point to Point Tunneling protocol (PPTP) dan apakah sistem keamanan VPN tersebut sudah mendapatkan perizinan dan sesuai dengan Undang-Undang yang berlaku atau tidak. Penelitian ini bersifat yuridis normatif. Dengan menggunakan pendekatan deskriptif analitis, Penelitian ini memberikan fakta-fakta mengenai keamanan VPN point to point tunneling protocol (PPTP) dalam mengakses situs terblokir, dikaitkan dengan Undang-undang Informasi Transaksi Elektronik. Kata kunci: Virtual Private Network (VPN), point to point tunneling protocol (PPTP), Situs Terblokir.
APA, Harvard, Vancouver, ISO, and other styles
9

Kher, Bhushan, Preeti Karmore, Nutan Sonwane, Amol Gahane, Nitin Meshram, Kartik Ghagre, Himanshu Nandekar, and Sonal Borkar. "Apnavpn Project." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.

Full text
Abstract:
Abstract: A VPN is an essential tool for securing your personal data and protecting your privacy online. We’ve put together the ultimate guide to VPNs to show you what a VPN does, how VPNs work, and how they protect you. Learn how to choose the right VPN, or secure your privacy right now by downloading our own powerful and lightning-fast VPN app. A VPN works by using encryption protocols to funnel all your internet traffic through an encrypted tunnel a virtual private network between your computer and a remote VPN server. This hides your IP address and secures your data, preventing others from intercepting it. Without a VPN, all your internet traffic is potentially exposed to your internet service provider (ISP), the government, advertisers, or other people on your network. That’s why VPN connections boost your privacy and security online. VPN is virtual because it’s created digitally there isn’t a physical cable that reaches from your device directly to the VPN server.
APA, Harvard, Vancouver, ISO, and other styles
10

Mardianto, Mardianto. "Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3." Jurnal Sains dan Informatika 5, no. 2 (December 1, 2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.

Full text
Abstract:
The ever-increasing internet is an ISP challenge for the future of the expected global computer network traffic and QoS needs. To maintain competitive ISPs in Indonesia with the development of internet usage, the demand for QoS must be increased. MPLS VPN networks combine layer 2 switching technology with layer 3 routing technology. MPLS VPN networks have emerged as technologies that meet VPN requirements such as private IP, and the ability to support overlapping addresses in resolving speed and QoS problems. The method used is experimental research. From the measurement results obtained by VPN and MPLS VPN network delay has a very good delay value. For throughput on VPN networks have medium quality and MPLS VPN networks have good quality. And for the packet loss value for both types of networks is 0%. This shows that MPLS VPN network throughput has better QoS while for delay and packet loss on VPN and MPLS VPN networks have the same quality value.
APA, Harvard, Vancouver, ISO, and other styles
11

Jaafar, Fauziah Mohd, Houssam Attoui, Peter P. C. Mertens, Philippe de Micco, and Xavier de Lamballerie. "Structural organization of an encephalitic human isolate of Banna virus (genus Seadornavirus, family Reoviridae)." Journal of General Virology 86, no. 4 (April 1, 2005): 1147–57. http://dx.doi.org/10.1099/vir.0.80578-0.

Full text
Abstract:
Banna virus (BAV) is the type species of the genus Seadornavirus within the family Reoviridae. The Chinese BAV isolate (BAV-Ch), which causes encephalitis in humans, was shown to have a structural organization and particle morphology reminiscent of that of rotaviruses, with fibre proteins projecting from the surface of the particle. Intact BAV-Ch virus particles contain seven structural proteins, two of which (VP4 and VP9) form the outer coat. The inner (core) particles contain five additional proteins (VP1, VP2, VP3, VP8 and VP10) and are ‘non-turreted’, with a relatively smooth surface appearance. VP2 is the ‘T=2’ protein that forms the innermost ‘subcore’ layer, whilst VP8 is the ‘T=13’ protein forming the core-surface layer. Sequence comparisons indicate that BAV VP9 and VP10 are equivalent to the VP8* and VP5* domains, respectively, of rotavirus outer-coat protein VP4 (GenBank accession no. P12976). VP9 has also been shown to be responsible for virus attachment to the host-cell surface and may be involved in internalization. These similarities reveal a previously unreported genetic link between the genera Rotavirus and Seadornavirus, although the expression of BAV VP9 and VP10 from two separate genome segments, rather than by the proteolytic cleavage of a single gene product (as seen in rotavirus VP4), suggests a significant evolutionary jump between the members of these two genera.
APA, Harvard, Vancouver, ISO, and other styles
12

Anwar, Rian Septian, and Nani Agustina. "Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server." INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, no. 2 (June 2, 2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.

Full text
Abstract:
Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik.
 
 Kata kunci: VPN, Jaringan, Open VPN-Acces Server.
 
 Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected. 
 
 Keywords: VPN, Networking, Open VPN-Acces Server.
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Zai Ying, Ping Yang, and Li Xiao Zhang. "Research of Typical VPN Network Management Mechanisms." Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.

Full text
Abstract:
VPN based on the internet can not only make some enterprises save a large amount of costs, but also has better scalability, security and reliability. The paper introduced the concept and classifications of VPN, and described the key technologies of IPsec VPN and MPLS VPN. At last, we put the emphasis on the VPN network management mechanism, including fault management, performance management and tunnel management.
APA, Harvard, Vancouver, ISO, and other styles
14

Fu, Chunle, Bailing Wang, Hongri Liu, and Wei Wang. "Software-Defined Virtual Private Network for SD-WAN." Electronics 13, no. 13 (July 8, 2024): 2674. http://dx.doi.org/10.3390/electronics13132674.

Full text
Abstract:
Software-Defined Wide Area Networks (SD-WANs) are an emerging Software-Defined Network (SDN) technology to reinvent Wide Area Networks (WANs) for ubiquitous network interconnections in cloud computing, edge computing, and the Internet of Everything. The state-of-the-art overlay-based SD-WANs are simply conjunctions of Virtual Private Network (VPN) and SDN architecture to leverage the controllability and programmability of SDN, which are only applicable for specific platforms and do not comply with the extensibility of SDN. This paper motivates us to refactor traditional VPNs with SDN architecture by proposing an overlay-based SD-WAN solution named Software-Defined Virtual Private Network (SD-VPN). An SDN-based auto-constructed VPN model and its evaluating metrics are put forward to automatically construct overlay WANs by node placement and service orchestration of SD-VPN. Therefore, a joint placement algorithm of VPN nodes and algorithms for overlay WAN service loading and offloading are proposed for SD-VPN controllers. Finally, a three-layer SD-VPN system is implemented and deployed in actual network environments. Simulation experiments and system tests are conducted to prove the high-efficiency controllability, real-time programmability, and auto-constructed deployability of the proposed SD-VPN. Performance trade-off between SD-VPN control channels and data channels is evaluated, and SD-VPN controllers are proven to be extensible for other VPN protocols and advanced services.
APA, Harvard, Vancouver, ISO, and other styles
15

Kennedy, Okokpujie, Shobayo Olamilekan, Noma-Osaghae Etinosa, Imhade Okokpujie, and Okoyeigbo Obinna. "Performance of MPLS-based Virtual Private Networks and Classic Virtual Private Networks Using Advanced Metrics." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 5 (October 1, 2018): 2073–81. https://doi.org/10.12928/TELKOMNIKA.v16i5.7326.

Full text
Abstract:
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLSVPN network and a classic VPN network using simulation studies done on OPNET® . The performance metrics used to carry out the comparison include; End to End Delay, Voice Packet Sent/Received and Label Switched Path’s Traffic. The simulation study was carried out with Voice over Internet Protocol (VoIP) as the test bed. The result of the study showed that MPLS-based VPN networks outperform classic VPN networks.
APA, Harvard, Vancouver, ISO, and other styles
16

Mohd Fuzi, Mohd Faris, Mohamad Ridzuan Mohd Alias, Naginder Kaur, and Iman Hazwam Abd Halim. "SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 90–101. http://dx.doi.org/10.24191/jcrinn.v6i4.230.

Full text
Abstract:
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet. VPNs can be used to shield users’ browsing activity and encrypts data transmitted over the network to prevent sniffing attack. Nowadays, users can either pay a premium price for a good VPN service or risk their privacy using free browser-based VPN. Thus, SafeSearch is developed to address these issues in mind. With SafeSearch, users will not need to fork out a lot of money for premium VPN subscription services or expose themselves to targeted advertising when utilising free browser-based VPN. In this study, open VPN protocol was used to create the VPN server on a microcomputer called Raspberry Pi. The software used was mostly open-source except for the VPN client. Obfuscation technique was used to hide VPN traffic by disguising it as just another normal Internet traffic against Deep Packet Inspection when passing through firewall. After the VPN server was established, tests were carried out to evaluate the functionality and reliability of the VPN server in “real-world” environment. The tests conducted were network restriction penetration assessment, network performance and user acceptance test. Penetration assessment result showed that SafeSearch is capable of bypassing web filtering and deep packet inspection. Network performance during SafeSearch connection has slight latency and bandwidth decline, although it is not overly affected. The outcome of the user acceptance test was positive as the majority of participants of the study were confident that SafeSearch can secure their connection and protect their privacy when browsing the web. To conclude, both objectives of this project were fully achieved and the scope of study was followed thoroughly.
APA, Harvard, Vancouver, ISO, and other styles
17

Kempter, Guido. "Scriptanimation. Methode zur Beschreibung und Darstellung natürlicher menschlicher Bewegungen." Experimental Psychology 46, no. 2 (April 1999): 129–34. http://dx.doi.org/10.1026//0949-3964.46.2.129.

Full text
Abstract:
Zusammenfassung. Das Verfahren zur Scriptanimation wird als eine neue Methode zur originalgetreuen Beschreibung und Nachbildung natürlicher menschlicher Körperbewegungen vorgestellt. Es basiert auf einem Verfahren zur Erstellung von Bewegungsscripts nach biomechanischer Taxonomie und einer Rechnerschnittstelle, welche die Daten des Scripts auf die geometrischen Segmente eines Computermodells überträgt. In einem Anwendungsbeispiel wurden die gestischen Bewegungen von 59 Politikern, wie sie in Nachrichtensendungen zu sehen waren, mit diesem Verfahren reanimiert. 84 Vpn betrachteten das Original und 36 Vpn die Reanimation. Gleichzeitig wurden die psychophysiologischen Reaktionen der Probanden erfasst. Der Vergleich physiologischer Parameter zeigt eine sehr große Ähnlichkeit in der vegetativen Bewertung.
APA, Harvard, Vancouver, ISO, and other styles
18

Hyatt, A. D. "Exposure of protein VP7 on the surface of bluetongue virus." Proceedings, annual meeting, Electron Microscopy Society of America 48, no. 3 (August 12, 1990): 600–601. http://dx.doi.org/10.1017/s0424820100160558.

Full text
Abstract:
Bluetongue virus (BTV) is the type species os the genus orbivirus in the family Reoviridae. The virus has a fibrillar outer coat containing two major structural proteins VP2 and VP5 which surround an icosahedral core. The core contains two major proteins VP3 and VP7 and three minor proteins VP1, VP4 and VP6. Recent evidence has indicated that the core comprises a neucleoprotein center which is surrounded by two protein layers; VP7, a major constituent of capsomeres comprises the outer and VP3 the inner layer of the core . Antibodies to VP7 are currently used in enzyme-linked immunosorbant assays and immuno-electron microscopical (JEM) tests for the detection of BTV. The tests involve the antibody recognition of VP7 on virus particles. In an attempt to understand how complete viruses can interact with antibodies to VP7 various antibody types and methodologies were utilized to determine the physical accessibility of the core to the external environment.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu, and Bo Li. "An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN." Photonic Network Communications 7, no. 3 (May 2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zelenkina, A. S., E. A. Pavlyukevich, and A. V. Ponachugin. "VPN: USE, SECURITY, RISKS." ITNOU: Information technologies in science, education and management 1, no. 19 (December 2022): 45–48. http://dx.doi.org/10.47501/itnou.2022.1.45-48.

Full text
Abstract:
In this article, we will look at some ways to connect to the Internet, one of which is a VPN. You will learn the history of its creation, how it functions and how safe its use is. Also, the article discusses some laws concerning the use of this service and what consequences its use in everyday life may have.
APA, Harvard, Vancouver, ISO, and other styles
21

Fan, Ya Qin, Ling Lv, Mei Lin Liu, and Fei Xie. "Improvements Based on the IPSec VPN Secuirity." Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.

Full text
Abstract:
In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec VPN has improved the safety performance of data transmission, it at the same time affects the transmission efficiency. By analyzing the problems of IPSec VPN, in terms of improving safety performance, the combination of PKI and IPSec VPN program was proposed. Theoretical analysis shows that such program can indeed solve the problem of authentication imperfect, thus improving the safety performance of the network.
APA, Harvard, Vancouver, ISO, and other styles
22

Human Sukma, Ayman, Mhd Ilyasyah Drilanang, Sybil Auzi, and Dedy Kiswanto. "IMPLEMENTASI OPENVPN SERVER MENGGUNAKAN RED HAT ENTERPRISE LINUX PADA AMAZON WEB SERVICES." JATI (Jurnal Mahasiswa Teknik Informatika) 8, no. 6 (November 18, 2024): 12601–7. https://doi.org/10.36040/jati.v8i6.12010.

Full text
Abstract:
Virtual Private Network (VPN) adalah teknologi yang memungkinkan koneksi jaringan yang aman melalui internet. Pada penelitian ini, server VPN diimplementasikan menggunakan OpenVPN pada platform Amazon Web Services (AWS) dengan Red Hat Enterprise Linux (RHEL) sebagai sistem operasi server. Manajemen dan pengujian koneksi VPN dilakukan dengan menggunakan mesin Windows 11 sebagai klien. Penelitian bertujuan untuk membangun infrastruktur VPN yang aman dan dapat diakses dari berbagai lokasi pada layanan service cloud. Pengujian dilakukan untuk mengamati performansi kinerja dan hasil akan membantu untuk memungkinkan pengembangan kinerja dan keamanan jaringan setelah implementasi VPN. Hasil penelitian menunjukkan bahwa server VPN berjalan dengan stabil dengan kecepatan latensi rata-rata 48ms yang menunjukkan bahwa ini adalah koneksi yang aman dengan kinerja yang dapat diterima.
APA, Harvard, Vancouver, ISO, and other styles
23

Mahardiyanto, Muliatama Putra. "Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang." Jurnal Jartel: Jurnal Jaringan Telekomunikasi 3, no. 2 (November 7, 2016): 26–32. http://dx.doi.org/10.33795/jartel.v3i2.217.

Full text
Abstract:
Data exchange communication has developed that leads to centralized communication, and to realize this communication, a type of data communication is needed whose data is stored on a server and can be accessed by clients, such as at the Malang State Polytechnic. As an institution engaged in the world of education, the development of data communication is centralized by utilizing the established intranet network. The use of an intranet network allows for data communication that is vulnerable to eavesdropping. To overcome this, use a VPN network. PPTP VPN and L2TP/IPsec VPN have different performances, especially in the level of security provided. In this study, the performance analysis of the PPTP VPN and L2TP/IPsec VPN networks was carried out which was implemented on an FTP Server on a Raspberry Pi server and a Mikrotik router for the VPN configuration. In this study, we designed PPTP VPN and L2TP/IPsec VPN by configuring the Mikrotik RB9412nD-TC router and configuring FTP Server using the proftpd application on the Raspberry Pi server. For security analysis using hacking method to get VPN Server login data and sniffing method to get FTP Server login data, FTP data. For performance analysis using parameters delay, throughput, and packet loss.
APA, Harvard, Vancouver, ISO, and other styles
24

Rahman, Taufik, Giovanni Maria Vianney Tobia Mariatmojo, Hafis Nurdin, and Herman Kuswanto. "Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi." Teknika 11, no. 2 (July 1, 2022): 138–47. http://dx.doi.org/10.34148/teknika.v11i2.482.

Full text
Abstract:
Komunikasi jaringan internet butuh keamanan, kemudahan, dan kecepatan transfer data yang baik. Hal ini harus diperhatikan oleh setiap pengguna dalam melakukan kegiatan di dunia maya atau internet, sehingga kerahasiaan informasi bisa terjaga dengan baik dan kemudahan, kecepatan pertukaran data bisa di implementasikan sehingga dapat menjadi suatu nilai lebih. VPN dapat terjadi antara dua PC atau bisa juga antara dua atau lebih jaringan yang berbeda. VPN dapat dibentuk dengan menggunakan teknologi tunneling dan encryption. Server OpenVPN menghasilkan profil jaringan terenkripsi, kemudian semua pengguna dapat membentuk jaringan VPN dan mereka dapat menggunakan layanan organisasi seolah-olah mereka secara geografis berada di tempat yang sama, konfigurasi ini juga memungkinkan penggunaan layanan atau aplikasi eksternal apa pun tanpa memengaruhi keamanan organisasi, VPN dapat berjalan pada IPv6 dan IPv4, dengan kelebihan yang banyak OpenVPN melintasi NAT (Network Address Translation). Jaringan VPN ini dibuat untuk memudahkan pekerja yang sedang melaksanakan aktivitas WFH (Work From Home) VPN sebuah koneksi virtual yang bersifat private dan tidak semua orang bisa mengaksesnya. Implementasi VPN dapat mempermudah komunikasi data jarak jauh tanpa khawatir ada tabrakan data, karena dengan menggunakan jaringan virtual ini dapat terhubung secara bersamaan. Dengan VPN, pengguna mempunyai keamanan data yang lebih dibandingkan dengan menggunakan jaringan lokal biasa. Ketika pengguna terhubung ke jaringan VPN maka akan mempunyai IP yang berbeda dengan IP Physical dibuktikan dengan tool tracert terlihat IP dan hoop. Raspberry Pi berfungsi untuk membuat sertifikat VPN client, karena fungsi tersebut tidak digabungkan ke dalam VPS Server karena masalah keamanan jaringan.
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Jianyun, and Chunyan Li. "Research on meteorological information network security system based on VPN Technology." MATEC Web of Conferences 232 (2018): 01001. http://dx.doi.org/10.1051/matecconf/201823201001.

Full text
Abstract:
In this paper, the concept of VPN and the security technology are studied. In combination with the characteristics of the network, the security technology of the remote access VPN server and the client is discussed, the VPN security system of the meteorological special network is designed, and the VPN network security system of the meteorological network is realized.
APA, Harvard, Vancouver, ISO, and other styles
26

Fan, Ya Qin, Hao Fan, and Chao Sun. "OPNET-Based Computer Simulation of MPLS VPN Security Solutions." Applied Mechanics and Materials 40-41 (November 2010): 361–65. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.361.

Full text
Abstract:
This paper features of IPSec and MPLS technologies, proposes a suitable MPLS VPN security solutions. The program to solve the VPN using MPLS backbone network in the public transport there is a second layer of information can not automatically encrypt, or connect easily made because of errors due to the interruption of information disclosure and other issues. To verify the proposed security program, the actual MPLS VPN can be simplified, abstracestablishing a simulation system MPLS VPN, and using OPNET simulation software simulation, simulation results of VPN officers practical reference value.
APA, Harvard, Vancouver, ISO, and other styles
27

Haeruddin, Haeruddin, and Kelvin Kelvin. "Analisa Penggunaan VPN L2TP dan SSTP di Masa Pandemi Covid-19." Jurnal Ilmu Komputer dan Bisnis 13, no. 1 (May 1, 2022): 105–14. http://dx.doi.org/10.47927/jikb.v13i1.279.

Full text
Abstract:
COVID-19 merupakan sebuah virus yang telah berkembang menjadi pandemi global. Hal ini menyebabkan jutaan karyawan di seluruh dunia saat ini bekerja dari rumah. Virtual Private Network (VPN) dapat digunakan untuk memberikan karyawan akses data kantor dari rumah. Penelitian ini menganalisa perbedaan protokol VPN L2TP/IPsec dengan SSTP untuk memilih teknologi VPN yang cocok digunakan sesuai kebutuhan pengguna. Hal ini dilakukan dengan cara membangun jaringan VPN tersebut dengan parameter kebutuhan perangkat, QoS, keamanan, dan skalabilitas dengan menggunakan metode Network Development Life Cycle (NDLC). Hasil dari penelitian ini menunjukkan bahwa kedua jenis VPN tersebut memiliki kelebihan dan kekurangannya masing-masing dari segi performa, keamanan dan skalabilitas. Hasil penelitian ini diharapkan dapat memberikan gambaran kepada pengguna untuk mempertimbangkan jenis VPN yang sesuai dengan kebutuhan.
APA, Harvard, Vancouver, ISO, and other styles
28

Yessenzholov, Ulan, and Nurbol Kaliaskarov. "IMPLEMENTATION OF TRAFFIC PROTECTION BASED ON IPSEC VPN TECHNOLOGY AND NETWORK MODELING ON ENSP SOFTWARE ENVIRONMENT." Вестник КазАТК 126, no. 3 (June 19, 2023): 198–204. http://dx.doi.org/10.52167/1609-1817-2023-126-3-198-204.

Full text
Abstract:
The article is devoted to the study of such technology as IPsec VPN. The role of this technology in the field of information and communication technologies is quite significant. Firstly, IPsec VPN supports many modern encryption algorithms and authentication methods. Secondly, IPsec VPN is supported by many vendors, which allows you to deploy this technology based on equipment from different manufacturers. Thirdly, IPsec VPN does not require much performance from the hardware. Fourth, IPsec VPN is easy to use and easy to monitor. This article shows an example of IPsec VPN implementation on eNSP software environment based on Huawei equipment. As can be seen from the practical part of the article, the creation and implementation of this technology consists of only four steps.
APA, Harvard, Vancouver, ISO, and other styles
29

Domakonda, Dileep. "Secure Remote Access in CloudStack: Implementation and Performance Evaluation of an L2TP-over-IPsec VPN." Eastasouth Journal of Information System and Computer Science 1, no. 02 (December 30, 2023): 126–31. https://doi.org/10.58812/esiscs.v1i02.513.

Full text
Abstract:
This paper presents the design and deployment of a remote access VPN function in CloudStack, an open-source platform for virtualized cloud management. The Remote Access VPN offers secure connectivity for remote users to communicate with virtual machines (VMs) within guest networks. Users can safely connect to cloud-based systems from external networks by using a VPN that uses L2TP-over-IPsec as the underlying protocol. With certain routing mechanisms that guarantee that only guest network traffic is routed through the VPN, the feature supports both "Road Warrior" (dynamic IP clients) and "Site-to-Site" (pre-configured IP clients) VPN connections. In addition to discussing upcoming scalability and usability improvements, this paper covers the technical design, implementation, and testing strategies for the Remote Access VPN feature.
APA, Harvard, Vancouver, ISO, and other styles
30

Fan, Ya Qin, Sheng Sheng Qian, and Feng Shan Liang. "VPN Security Technology Theory Modeling and Simulation." Applied Mechanics and Materials 135-136 (October 2011): 1114–19. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1114.

Full text
Abstract:
In order to authenticate users and to strictly control the only authorized users can access VPN address and biling functions to provide audit expenses such problems, the paper established a theoretical model of VPN security technologies, the use of OPNET simulation tool for safety and technical performance of the VPN the simulation results of VPN security professionals with practical reference value.
APA, Harvard, Vancouver, ISO, and other styles
31

Ariyadi, Tamsir, and Muhamad Agung Prabowo. "Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security." INOVTEK Polbeng - Seri Informatika 6, no. 1 (June 15, 2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.

Full text
Abstract:
Dibutuhkannya komunikasi dalam menunjang interaksi antar perusahaan yang memiliki kaitan yang sangat erat terhadap perkembangan teknologi informasi melalui jaringan komputer. Virtual Private Network atau biasa disebut VPN memiliki peran penting dalam perkembangan sistem keamanan dalam jaringan internet, terutama dalam membatasi hak akses terhadap server, database, dan sejenisnya dalam meminimalisir terjadinya akses illegal terhadap data-data penting perusahaan. VPN memiliki beberapa tipe salah seperti VPN Tunnel dan IPSec, VPN Tunnel memiliki konsep yang lebih sederhana dibandingkan dengan IPSec karena dapat menghubungkan server dan client secara remoteaccess yang hanya membutuhkan 1 router saja yang terhubung pada sisi server. IPSec memiliki tingkat keamanan yang lebih tinggi dibandingkan dengan VPN Tunnel dengan jalur komunikasi dilengkapi dengan kriptografi. IPSec yang berjalan pada L2TP memiliki tingkat kinerja yang lebih baik dibandingkan VPN Tunnel berdasarkan hasil yang telah di dapatkan, karena konsep yang mengharuskan router terkoneksi secara point-to-point. Kata Kunci - Virtual Private Network (VPN), IPSec, Tunneling, Quality of Service, Peformance
APA, Harvard, Vancouver, ISO, and other styles
32

Supriyanto, Bambang, and Suharyanto Suharyanto. "Perancangan Jaringan VPN Menggunakan Metode Point To Point Tunneling Protocol." Jurnal Teknik Komputer 5, no. 2 (August 1, 2019): 235–40. http://dx.doi.org/10.31294/jtk.v5i2.5452.

Full text
Abstract:
PT. Hail Otis Logistics is a Forwarding and Expedition Company that provides Custom Clearence Export and Import services as well as Shipping or Delivery from Partner Companies to Tanjung Priuk Port and vice versa. Currently PT. Hail Otis Logistics is sending company data using e-mail, so the company cannot yet ensure the security of the data sent. Due to the company's problems, designing a VPN is a means of communicating and transferring data securely and maintaining data validity. In this study VPN was built using the PPTP (Point To Point Tunneling Protocol) method to build a VPN network at PT. Hail Otis Logistics. Use PPTP because this method uses a protocol that allows point to point relationships that pass through the IP network. Results obtained in VPN development at PT. Hail Otis Logistics are VPN networks that can connect between headquarters and branch offices to transfer data safely. VPN development can provide security with encryption in every data communication.Keywords: PPTP, Network, VPN
APA, Harvard, Vancouver, ISO, and other styles
33

Mohammed, Subhi Aswad. "Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study." Al-Nahrain Journal for Engineering Sciences 22, no. 4 (December 20, 2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.

Full text
Abstract:
This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON simulation results show higher response time for packet transmission due to effect of VPN tunneling. The concurrent activation of application execution is used as a solution to the delay problem of the initial timing period while the application proceeds. The results dealing with QoS are E-mail, FTP, voice services traffic and IP traffic dropped. The VPN Tunnels is in the range of (0.01 to 0.02) sec.; along with this simulator there are four VPN tunnels in the network. Also, a special server’s load balance is used to manage distribution of the server processing load across all other network servers to achieve the best response
APA, Harvard, Vancouver, ISO, and other styles
34

Juliansah, Jodi, and Yuma Akbar. "OPTIMALISASI KINERJA JARINGAN VPN DENGAN METODE DMVPN." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 4, no. 3 (September 10, 2023): 1788–98. http://dx.doi.org/10.35870/jimik.v4i3.412.

Full text
Abstract:
DMVPN (Dynamic Multipoint Virtual Private Network) is a VPN technology that can simplify the configuration process and improve network efficiency. The purpose of this research was conducted as a response to the obstacles experienced by companies in VPN network performance that did not meet expectations and reduced high operational and infrastructure costs related to the performance of the current VPN network. In addition, to determine the extent to which the use of DMVPN can improve the performance of VPN networks in companies. The method used is data collection through observation and interviews, and analysis of the data that has been collected. The results showed that the use of DMVPN can increase the efficiency of the VPN network in the company by reducing traffic load and speeding up the data transmission process. Therefore, DMVPN technology is highly recommended for companies that require complex VPN networks and need optimal network performance. The results of this research are expected to provide a better understanding of the potential and effectiveness of using DMVPN in optimizing the performance of VPN networks in companies. It is expected that the implementation of DMVPN can increase data transfer speed, reduce latency, and increase data security in VPN networks. In addition, it is also expected that the use of DMVPN can reduce the operational and infrastructure costs associated with VPN networks, so that companies can achieve higher efficiency
APA, Harvard, Vancouver, ISO, and other styles
35

Novanto, Mukhammad Rizki, Joseph Dedy Irawan, and F. X. Ariwibisono. "RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 6, no. 1 (March 12, 2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.

Full text
Abstract:
Tidak bisa dipungkiri semenjak pandemi virus Covid-19 kegiatan internet terus menjadi bertambah. Semacam halnya bekerja dari rumah memakai internet, belajar daring memakai internet, komunikasi social media memakai internet, belanja online di pasar online dengan internet, sampai mencari data lewat internet. Kebutuhan internet terus menjadi bertambah, tidak hanya harga virtual private server yang disediakan provider lokal relatif mahal serta instalasi sampai operasional membutuhkan banyak tahapan, semacam wajib menginstal script guna berjalannya protocol pada VPS sehingga dibutuhkannya sesuatu system website yang bisa jadi fasilitas buat mengakses sampai membuat akun virtual private network. Bermacam berbagai tipe VPN yang terletak pada VPS bisa dikelola via website oleh admin. User bisa melaksanakan pembuatan akun VPN pada website. Pada biasanya bila mau mengakses VPN wajib login VPS terlebih dulu buat membuat VPN. Berbentuk username & passwordsampai expired dan perinci pelayanan sampai port yang hendak digunakan pada protocol VPN semacam SSH, V2RAY, Trojan, L2TP, Shadowsocks. Perihal ini dirasa kurang efektif semacam login terminal VPS dulu buat membuat akun VPN secara manual, buat memudahkan client diperlukan panel berbasis website. Diharapkan bisa memudahkan pengguna dalam membuat VPN via website serta tidak wajib login VPS terlebih dulu. Menyederhanakan perintah dari VPS yang diimpelentasikan via website hendak memudahkan kegiatan user dalam pembuatan VPN. Berdasarkan hasil akhir, Web GUI yang telah menyediakan fitur layanan VPN sesuai yang disediakan VPS berjalan dengan normal. Masing-masing protokol atau jenis VPN memiliki karakteristik daya kinerja yang berbeda. Meliputi kecepatan dan ping pada saat diuji coba melalui alamat website speedtest.net untuk mengukur kecepatan dan ping koneksi internet.
APA, Harvard, Vancouver, ISO, and other styles
36

Rendy, Munadi, Dwi Sanjoyo Danu, Perdana Doan, and Adjie Fidar. "Performance analysis of tunnel broker through open virtual private network." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (June 1, 2019): 1185–92. https://doi.org/10.12928/TELKOMNIKA.v17i3.12231.

Full text
Abstract:
Tunnel Broker uses automatic configuration tunneling mechanism for IPv6 clients connected to IPv4 internet. Connectivity between clients and service providers in IPv6 is urgently needed. Open VPN as a provider implemented configures it by a VPN network, so IPv6 and IPv4 public IP clients can easily connect to the server. In this research focused on the performance of tunnel broker mechanism by utilizing open VPN as access to the network. IPv6 tunnel broker is developed by installing Open VPN and providing IPv6 IPs. Implementation of public IP usage in observing the performance of tunnel broker development is done in BCN Telkom Laboratory Network. The measurement results show that TCP and UDP throughput of IPv6 is slightly higher than IPv4. The research using OpenVPN as a server Tunnel Broker for client access to the server is still rarely done, especially in the field of the network based on Internet Protocol.
APA, Harvard, Vancouver, ISO, and other styles
37

Sulistiyono, Sulistiyono. "PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (September 1, 2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.

Full text
Abstract:
Perkembangan teknologi yang semakin maju mempengaruhi suatu sistem dan efisiensi dalam dunia pekerjaan. Oleh karna itu sangat di butuhkan sekali jaringan internet, selain pentingnya jaringan internet juga perusahaan sangat membutuhkan adanya jaringan pribadi (VPN) yang aman, sebagai jalur khusus untuk mengakses ke jaringan lokal perusahaan. Untuk mengatasi hal ini maka penulis akan merancang sebuah VPN IPsec dengan menggunakan Router MikroTik. VPN memungkinkan untuk mengakses jaringan lokal perusahaan menggunakan koneksi internet publik. Dari hasil riset yang penulis lakukan telah membuktikan bahwa dengan adanya VPN IPsec jalur komunikasi menggunakan jaringan publik menjadi lebih aman dengan adanya proses tunneling VPN dan enkripsi dari IPsec
APA, Harvard, Vancouver, ISO, and other styles
38

Shepherd, Frances, Diana Herrera-Ibata, Elizabeth Porter, Nitipong Homwong, Richard Hesse, Jianfa Bai, and Douglas Marthaler. "Whole Genome Classification and Phylogenetic Analyses of Rotavirus B strains from the United States." Pathogens 7, no. 2 (April 18, 2018): 44. http://dx.doi.org/10.3390/pathogens7020044.

Full text
Abstract:
Rotaviruses (RVs) are a major etiological agent of acute viral gastroenteritis in humans and young animals, with rotavirus B (RVB) often detected in suckling and weaned pigs. Group A rotavirus classification is currently based on the two outer capsid proteins, VP7 and VP4, and the middle layer protein, VP6. Using RVB strains generated in this study and reference sequences from GenBank, pairwise identity frequency graphs and phylogenetic trees were constructed for the eleven gene segments of RVB to estimate the nucleotide identity cutoff values for different genotypes and determine the genotype diversity per gene segment. Phylogenetic analysis of VP7, VP4, VP6, VP1–VP3, and NSP1–NSP5 identified 26G, 5P, 13I, 5R, 5C, 5M, 8A, 10N, 6T, 4E, and 7H genotypes, respectively. The analysis supports the previously proposed cutoff values for the VP7, VP6, NSP1, and NSP3 gene segments (80%, 81%, 76% and 78%, respectively) and suggests new cutoff values for the VP4, VP1, VP2, VP3, NSP2, NSP4, and NSP5 (80%, 78%, 79%, 77% 83%, 76%, and 79%, respectively). Reassortment events were detected between the porcine RVB strains from our study. This research describes the genome constellations for the complete genome of Group B rotaviruses in different host species.
APA, Harvard, Vancouver, ISO, and other styles
39

Damasco Jr., Loreto B., Noel Raymund F. Lacson, and Roger T. Intong. "Safeguarding Transactional Data: A Comprehensive Investigation of VPN Integration in Point-of-Sale Systems for Enhanced Security and Connectivity." Eximia 12 (December 14, 2023): 570–89. http://dx.doi.org/10.47577/eximia.v12i1.405.

Full text
Abstract:
The integration of Virtual Private Network (VPN) technology into Point-of-Sale (POS) systems has emerged as a solution for securing transactional data in businesses. This study investigates the implementation of a VPN server to address security and connectivity challenges faced by the University of St. La Salle (USLS) Bookstore. The research delves into VPN policy frameworks, assessing the scope and binding, authentication methods, and VPN credentials and security protocols. The system design employs a combination of conceptual models and activity diagrams to illustrate the process of user authentication and data encryption. Furthermore, the study evaluates the system's performance in terms of scalability, efficiency, and effectiveness in ensuring authentication and security. The deployment of the VPN infrastructure involves the installation of requisite software and hardware components, along with rigorous testing procedures to assess system performance and reliability. The findings highlight the significance of VPN in safeguarding sensitive transaction data and enhancing the efficiency of POS operations. The study's outcomes offer valuable insights into the effective implementation and management of VPN technology for securing business operations.
APA, Harvard, Vancouver, ISO, and other styles
40

E, Poerbaningtyas, and Achmad Riyan Adi. "Sistem Informasi Manajemen VPN Remote Mikrotik Berbasis Codeigniter PHP Framework Di Desa Sawo." J-INTECH 12, no. 02 (December 19, 2024): 340–52. https://doi.org/10.32664/j-intech.v12i02.1468.

Full text
Abstract:
Pengelolaan akun VPN dan konfigurasi port forwading di Mikrotik CHR (Cloud Hosted Router) menggunakan Winbox menjadi tugas yang rumit bagi pengguna awam yang tidak memiliki pengalaman dalam administrasi jaringan. Sehingga dampaknya konfigurasi seperti kesalahan dalam penentuan TCP/UDP, Firewall Rules, IP dan nomor port yang mengakibatkan port konflik. Karena VPN remote gagal dikelola dengan baik. Dari permasalahan yang ada, maka peneliti membenahi infrastruktur jaringa dan membuat sebuah Sistem Informasi Manajemen untuk kelola forwading, akun VPN, payment gateway. Sehingga akan meminimalkan human error dan lebih efektif dalam mengotomatisasi konfigurasi dengan antarmuka yang lebih intuitif. Hal ini berguna untuk mempermudah penggunaan port forwading di Mikrotik CHR. Aplikasi sistem manajemen VPN berbasis website menggunakan mikrotik API dan jenis VPN yang digunakan hanya remote access site to site protocol L2TP/IPSec. Penelitian ini dapat meningkatkan produktivitas dalam mengelola akun VPN dan port forwading.
APA, Harvard, Vancouver, ISO, and other styles
41

Qian, Xuan Yu, Shi Min Liu, Cheng Zhou, and Xiao Juan Guan. "Research of Network Testing Based on MPLS L2VPN." Advanced Materials Research 791-793 (September 2013): 1695–98. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1695.

Full text
Abstract:
MPLS (Multi-Protocol Label Switching) VPN is based on MPLS technology and construct virtual private network (VPN) on backbone network, to provide users with safe, reliable, high-quality business technology VPN. MPLS L2VPN (Layer 2 VPN) is one type of solutions of MPLS VPN. The MPLS L2VPN technology, after years of researching and practicing, is becoming mature, and many RFCs and related drafts are published to standardize it. However, there is not much research of network test method on the MPLS L2VPN technology, this paper analyzes the various MPLS L2VPN solutions and make a reach on test method based on two types solutions: Martini and Kompella.
APA, Harvard, Vancouver, ISO, and other styles
42

Kuang, Ai Nong. "Application Research of Computer Network Load Certification Constructing VPN Tunnel Technology." Advanced Materials Research 926-930 (May 2014): 2217–20. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2217.

Full text
Abstract:
Setting-up large-scale VPN network becomes an important task, VPN has been attracted extensibe attention of business subscribers. In one speak, VPN technology is very complicated, it involves in communication technology, cryptography, authentication technology, it is an interdisciplinary. Tunnel technology is a key technology to set-up VPN network. In the port of host LAN and Internet, the data is packed in a pattern that can transport in Internet , in object LAN, the data is decompression and can use it . Give a simple analysis of the tunnel technique from the development of tunnel technique, to know the security technical of the setting-up large-scale VPN.
APA, Harvard, Vancouver, ISO, and other styles
43

Rifandy, Ahmad Surya, and Salman Topiq. "Analisa dan Implementasi VPN Dinamis Menggunakan Hamachi Pada PT. Jaindo Metal Industries." Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 6, no. 2 (April 30, 2023): 178–86. http://dx.doi.org/10.32672/jnkti.v6i2.5904.

Full text
Abstract:
Abstrak - Teknologi informasi saat ini berkembang sangat cepat, dinamis dan canggih. Seiring dengan perkembangannya, PT. Jaindo Metal Industries membangun jaringan komputer berbasis VPN dinamis untuk mempermudah melakukan kegiatan operasional antar kantor cabang dan kantor pusat, seperti melakukan transaksi data atau presentasi melalui jalur publik, salah satunya penggunaan bersama aplikasi bisnis Microsoft Dynamic Axapta 4.0 pada semua cabang yang dioperasikan melalui domain pada kantor pusat. Penggunaan IP Publik non VPN memungkinkan terjadinya penyadapan oleh pihak yang tidak berkepentingan. Maka dari itu dibangunlah jaringan VPN (Virtual Private Network) dengan penerapan Hamachi agar dapat beroperasional secara private dengan koneksi yang memadai, biaya yang minim, keamanan data yang terjamin, dan dapat diakses dari manapun selama terkoneksi internet dan terhubung Hamachi VPN. Hal tersebut dapat meningkatkan efisiensi perusahaan agar dapat bersaing dalam dunia bisnis yang semakin ketat.Kata kunci: Hamachi, VPN, IP Publik Abstract - Information technology is currently developing very fast, dynamic and sophisticated. Along with its development, PT. Jaindo Metal Industries builds a VPN-based computer network to facilitate operational activities between branch offices and head office, such as conducting transactions or presentations through dynamic public channels, one of the shared uses of the Microsoft Dynamic Axapta 4.0 business application in all branches operated through the domain at the head office. The use of non-VPN Public IP allows eavesdropping by unauthorized parties. Therefore, a VPN (Virtual Private Network) network was built with the application of Hamachi so that it can operate privately with an adequate connection, minimal costs, guaranteed data security, and can be accessed from anywhere as long as it is connected to the internet and connected to Hamachi VPN. This can increase the company's efficiency so that it can compete in an increasingly tight business world.Keyword: Hamachi, VPN, IP Public
APA, Harvard, Vancouver, ISO, and other styles
44

Khan, Muhammad U. S., Syed M. A. H. Bukhari, Tahir Maqsood, Muhammad A. B. Fayyaz, Darren Dancey, and Raheel Nawaz. "SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic." Electronics 11, no. 3 (January 24, 2022): 350. http://dx.doi.org/10.3390/electronics11030350.

Full text
Abstract:
Encryption Protocols e.g., HTTPS is utilized to secure the traffic between servers and clients for YouTube and other video streaming services, and to further secure the communication, VPNs are used. However, these protocols are not sufficient to hide the identity of the videos from someone who can sniff the network traffic. The present work explores the methodologies and features to identify the videos in a VPN and non-VPN network traffic. To identify such videos, a side-channel attack using a Sequential Convolution Neural Network is proposed. The results demonstrate that a sequence of bytes per second from even one-minute sniffing of network traffic is sufficient to predict the video with high accuracy. The accuracy is increased to 90% accuracy in the non-VPN, 66% accuracy in the VPN, and 77% in the mixed VPN and non-VPN traffic, for models with two-minute sniffing.
APA, Harvard, Vancouver, ISO, and other styles
45

Haeruddin, Haeruddin, Gautama Wijaya, and Husnul Khatimah. "Sistem Keamanan Work From Anywhere Menggunakan VPN Generasi Lanjut." JITU : Journal Informatic Technology And Communication 7, no. 2 (November 30, 2023): 102–13. http://dx.doi.org/10.36596/jitu.v7i2.1086.

Full text
Abstract:

 
 
 
 Working remotely or what we know as Work From Anywhere is still a trend after the COVID-19 pandemic. Working from anywhere and anytime can increase productivity and reduce transportation costs, and is accompanied by fast internet support, good communication and collaboration platforms so this is very popular and in demand. When implementing WFA, it has its own challenges, namely data security. Not all organizations are supported by a reliable IT infrastructure that can protect employee data during WFA. One of the security system technologies that can be used during WFA is VPN. Currently there are many VPN protocols that can be used for WFA. However, in implementing a VPN network, there are several things that must be considered to ensure that the VPN network is successful and functional, such as security, choosing the right architecture, selecting technology and protocols, scalability, quality of service, management and monitoring, as well as security and privacy policies. ZeroTier is a next-generation VPN that is easy to configure, can support multiple devices, and uses an end-to-end connection, eliminating the need for a centralized VPN server. In implementing VPN ZeroTier the method used is the Network Development Life Cycle (NDLC). This methodology is used to plan, implement, and manage a VPN network with ZeroTier to function according to WFA needs.
 
 
 
APA, Harvard, Vancouver, ISO, and other styles
46

Pangestu, Sindu. "Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 2 (June 9, 2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.

Full text
Abstract:
Paper ini membahas tentang pembuatan server untuk penyimpanan data menggunakan sistem operasi Freenas, yang pengaksesan servernya melalui jaringan internet atau ip public menggunakan jalur VPN (Virtual Private Network). Akses data dari user ke server menggunakan authentikasi user Freenas dan ditambah dengan authentikasi user VPN untuk menambah keamanan jaringan dan mengatasi masalah keamanan dalam transaksi data seperti pencurian data. Hasil penelitian dari server yang dibuat, menunjukkan bahwa jalur VPN yang dibuat dapat dipakai untuk mengatasi masalah keamanan tersebut. Dari percobaan transaksi data yang sudah dilakukan pada server, menunjukkan bahwa data yang dikirim melalui jaringan internet tanpa VPN tidak terenkripsi dan masih bisa dilihat isinya, sedangkan data yang menggunakan jalur VPN, datanya telah terenkripsi dan tidak bisa dilihat isinya secara langsung.
APA, Harvard, Vancouver, ISO, and other styles
47

Sun, Yunxiao, Bailing Wang, Chao Wang, and Yuliang Wei. "On Man-in-the-Middle Attack Risks of the VPN Gate Relay System." Security and Communication Networks 2021 (October 21, 2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.

Full text
Abstract:
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer-organized public VPN relay system launched in 2013. By analyzing the security of the system, we have found that there is a man-in-the-middle attack risk because an attacker may hijack a VPN session and decrypt the traffic. According to our study, the reason of the security issues is the misuse of the SSL certificate. To mitigate the security risks, we offered a series of recommendations.
APA, Harvard, Vancouver, ISO, and other styles
48

Pangestu, Raka Nugraha, Risma Yanti, and Herlina Harahap. "Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer." Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, no. 1 (June 19, 2021): 27–33. http://dx.doi.org/10.35447/jikstra.v3i1.357.

Full text
Abstract:
Although there are many security methods that can be used to block DDoS attacks, for now these methods are arguably less effective, because many hackers have known bugs from the system or security methods. From the background of this problem, testing the security of Linux Mint servers, Linux Mint without VPN and Anti DDoS, implementing network security from hammer attacks on Linux Mint Linux servers with VPN and Anti-DDoS, and testing DDoS and VPN attacks have been successfully implemented. on linux mint. Anti-DDoS and VPN are able to prevent DDoS attacks on Linux servers by blocking unknown IPs from accessing the server and redirecting attacks to virtual IPs provided by the VPN.
APA, Harvard, Vancouver, ISO, and other styles
49

Patel, Raj Kumar, and Dr Lalan Kumar Singh. "Cloud Based VPN Using IP Tunneling for Remote Site Interface." International Journal for Research in Applied Science and Engineering Technology 11, no. 2 (February 28, 2023): 1565–70. http://dx.doi.org/10.22214/ijraset.2023.48722.

Full text
Abstract:
Abstract: A strong IP technology that builds a secure and encrypted connection tunnel over the less secure internet is required by the majority of enterprise organizations. Joint location and link connectivity issues must be resolved for distant users and branch offices to have secure access to corporate applications and other resources. This ensures security while data passes over encrypted tunnels. Despite the development of IP-based VPN, JLP and LCP for VPN customer edge devices and provider edge nodes have not yet been completely investigated. The purpose of this work is to apply cutting-edge viewpoints to VPN-IP design that may be used in IP multi-protocol label switching (MPLSVPN) infrastructure for cloud computing. The system architecture includes mathematical formulas. End-to-end delay, throughput, and resource consumption behavior for IP tunneling are seen to behave moderately for low scale workloads. While showcasing the benefits of an MPLS-based IP-based VPN architecture, the difficulties of VPN-IP tunneling are explored. This study suggests cloud-based MPLS-VPN as a workable substitute for traditional VPN-IP tunneling in order to get the best performance and service delivery
APA, Harvard, Vancouver, ISO, and other styles
50

Alqahtany, Saad Said, and Toqeer Ali Syed. "Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework." Applied Sciences 14, no. 11 (May 23, 2024): 4421. http://dx.doi.org/10.3390/app14114421.

Full text
Abstract:
In an era marked by technological advancement, the rising reliance on Virtual Private Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN traffic, especially in mobile environments. This research introduces an innovative approach utilizing Convolutional Neural Networks (CNNs) and Graph Neural Networks (GNNs) for classifying VPN traffic, aiding forensic investigators in precisely identifying applications or websites accessed via VPN connections. By leveraging the combined strengths of CNNs and GNNs, our method provides an effective solution for discerning user activities during VPN sessions. Further extending this framework, we incorporate blockchain technology to meticulously record all mobile VPN transactions, ensuring a tamper-proof and transparent ledger that significantly bolsters the integrity and admissibility of forensic evidence in legal scenarios. A specific use-case demonstrates this methodology in mobile forensics, where our integrated approach not only accurately classifies data traffic but also securely logs transactional details on the blockchain, offering an unprecedented level of detail and reliability in forensic investigations. Extensive real-world VPN dataset experiments validate our approach, highlighting its potential to achieve high accuracy and offering invaluable insights for both technological and legal domains in the context of mobile VPN usage.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography