Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Virtual private network servers.

Zeitschriftenartikel zum Thema „Virtual private network servers“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Virtual private network servers" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Mohammed, Subhi Aswad. „Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study“. Al-Nahrain Journal for Engineering Sciences 22, Nr. 4 (20.12.2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.

Der volle Inhalt der Quelle
Annotation:
This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON simulation results show higher response time for packet transmission due to effect of VPN tunneling. The concurrent activation of application execution is used as a solution to the delay problem of the initial timing period while the application proceeds. The results dealing with QoS are E-mail, FTP, voice services traffic and IP traffic dropped. The VPN Tunnels is in the range of (0.01 to 0.02) sec.; along with this simulator there are four VPN tunnels in the network. Also, a special server’s load balance is used to manage distribution of the server processing load across all other network servers to achieve the best response
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Roşu, Marius, und George Drăgoi. „VPN solutions and network monitoring to support virtual teams work in virtual enterprises“. Computer Science and Information Systems 8, Nr. 1 (2011): 1–26. http://dx.doi.org/10.2298/csis100127033r.

Der volle Inhalt der Quelle
Annotation:
In order to be competitive enterprises continuously implement ICT strategies & architectures to improve manufacture, research, products quality, sales, services and costs control. All large enterprises have a local area network, a virtual private network, an Intranet and Internet, servers and workstations for operations, administration and management working together for the same objective: profits. The virtual enterprise and the virtual team?s concepts are discussed in this article. This work analyzes the network architecture for geographically dispersed enterprises (seen as virtual enterprises) as support for virtual project development by virtual teams work. In addition, the paper presents an enterprise networks monitoring solution using open source software (OSS).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hariyadi, I. Putu, und Akbar Juliansyah. „Analisa Penerapan Private Cloud Computing Berbasis Proxmox Virtual Environment Sebagai Media Pembelajaran Praktikum Manajemen Jaringan“. MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, Nr. 1 (29.11.2018): 1–12. http://dx.doi.org/10.30812/matrik.v18i1.329.

Der volle Inhalt der Quelle
Annotation:
STMIK Bumigora Mataram strives to develop a curriculum that adopts the needs of the industrial world. In the past 2 years, Network Management lecturers have experienced problems related to practicum implementation. During this time the learning process uses virtualization installed on each laboratory computer. However, the system has various weaknesses, especially related to the freedom of access and availability. The implementation of Private Cloud Computing based on Proxmox Virtual Environment (PVE) which in the cluster can be a solution to the problems faced. PVE cluster which is made using four servers and integrated with one storage server can be used as a learning media for network management practicum and support high availability so that live migration can be done. Users can manage Virtual Private Servers using Linux Container (LXC) independently with a login and limited access permission account and the configuration can be done through the console and SSH. All practicum materials were successfully tested on LXC. An FTP-based local repository built on a storage server can minimize the bandwidth usage of an Internet connection and speed up the package installation. In addition port forwarding on the gateway router can facilitate the remote access needs on LXC from the Internet.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Khizirova, M. A., Katipa Chezhimbayeva, Almira Mukhamejanova, Zhanat Manbetova und Bulbul Ongar. „USING OF VIRTUAL PRIVATE NETWORK TECHNOLOGY FOR SIGNAL TRANSMISSION IN CORPORATE NETWORKS“. Series of Geology and Technical Sciences 447, Nr. 3 (15.06.2021): 100–103. http://dx.doi.org/10.32014/2021.2518-170x.69.

Der volle Inhalt der Quelle
Annotation:
This paper discusses some modes of signal transmission for corporate systems using the technology of virtual private networks VPN. A very important property of tunnels is the ability to differentiate different types of traffic and assign them the necessary service priorities. In this work, research has been carried out and comparative characteristics of signal transmission modes using virtual networks have been obtained to identify the effectiveness of the network in various modes of organizing a virtual network, and to optimize a virtual network in order to identify an effective method for organizing a VPN. Also, the work analyzes the specifics of the work of corporate information systems and networks intended for their maintenance, showed that for building a corporate network it is advisable to use virtual private network (VPN) technology, which makes it possible to ensure the fulfillment of the basic requirements for the security and quality of customer service and applications and the current state and direction of development of VPN technology when creating new generation corporate networks, while highlighting the main tasks that need to be addressed when creating a network. Some features of setting up an IPSec VPN server for corporate networks are considered.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Salim, Mikail Mohammed, Inyeung Kim, Umarov Doniyor, Changhoon Lee und Jong Hyuk Park. „Homomorphic Encryption Based Privacy-Preservation for IoMT“. Applied Sciences 11, Nr. 18 (20.09.2021): 8757. http://dx.doi.org/10.3390/app11188757.

Der volle Inhalt der Quelle
Annotation:
Healthcare applications store private user data on cloud servers and perform computation operations that support several patient diagnoses. Growing cyber-attacks on hospital systems result in user data being held at ransom. Furthermore, mathematical operations on data stored in the Cloud are exposed to untrusted external entities that sell private data for financial gain. In this paper, we propose a privacy-preserving scheme using homomorphic encryption to secure medical plaintext data from being accessed by attackers. Secret sharing distributes computations to several virtual nodes on the edge and masks all arithmetic operations, preventing untrusted cloud servers from learning the tasks performed on the encrypted patient data. Virtual edge nodes benefit from cloud computing resources to accomplish computing-intensive mathematical functions and reduce latency in device–edge node data transmission. A comparative analysis with existing studies demonstrates that homomorphically encrypted data stored at the edge preserves data privacy and integrity. Furthermore, secret sharing-based multi-node computation using virtual nodes ensures data confidentiality from untrusted cloud networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Qu, Liang Dong, Xin Yu Cui und Xiao Nan Liu. „IPv6 in IPv4 Virtual Private Network Based on Virtual Devices in Vehicle Information System“. Applied Mechanics and Materials 321-324 (Juni 2013): 2910–13. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2910.

Der volle Inhalt der Quelle
Annotation:
Vehicle information system is the data center of vehicle communication networks, for the sake of connecting the IPv6 host through IPv4 network area, a virtual network device (VND) in Linux embedded System is designed and implemented as a mid-layer module between the real device driver and internet protocol stack. The VND can establish a virtual tunnel between the vehicle information device and agent server. Both vehicle information device and agent server can support IPv4 and IPv6.Through the virtual tunnel, the agent server picked up the IPv6 packet which was built in IPv4 UDP data area, and transmit the IPv6 packets to the IPv6 remote server. So it works like a VPN device. The hardware platform of the vehicle gateway is based on ARM9, and the software is based on ARM-Linux. The instruction of hardware and software are as well as put forward.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Sano, Albert Verasius Dian. „Simulasi Saham Berbasis Web dengan Teknologi Virtual Private Network di Portal Www.Kontan.Co.Id“. ComTech: Computer, Mathematics and Engineering Applications 2, Nr. 2 (01.12.2011): 946. http://dx.doi.org/10.21512/comtech.v2i2.2845.

Der volle Inhalt der Quelle
Annotation:
The objective of this research is to develop a web-based-online-stock-simulation application applying Virtual Private Network (VPN) technology. The web-based application is prefered for user’s convenience and comfort since it does not require any software to be installed on the client side and is also accessable anywhere and anytime with internet connection availability. The application is developed by means of analysis and design towards the technology needed to establish the connectivity between servers through internet as well as database analysis and design. The data are real time derived from the Indonesia Stock Exchange (IDX) and forwarded through an official data vendor PT XYZ. Data from the IDX will be captured by a middleware application at PT XYZ and forwarded to www.kontan.co.id. This application has been tested and succesfully run by around 700 users. This tool is expected to provide a kind of education and motivation to beginner-level investors who want to be engaged with the stock-trading activities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Qu, Liang Dong, Xin Yu Cui und Xiao Nan Liu. „A Route Handoff Method Based on Virtual Private Network in Vehicle Information Network“. Applied Mechanics and Materials 475-476 (Dezember 2013): 699–702. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.699.

Der volle Inhalt der Quelle
Annotation:
Vehicle information system is the data center of vehicle communication networks, and the vehicle gateway is the core of the vehicle information system, in order to support the vehicle information system both WLAN and CDMA interfaces, a virtual network device (VND) in Linux embedded System is designed and implemented as a mid-layer module between the real device driver and internet protocol stack called driver middleware. The VND can establish a virtual private network between the vehicle information device and agent server. The virtual network interface is designed to catch the packets both input and output processing for the sake of checking the route before the packets transmission. Both the terminal and the agent have the driver middleware to ensure smooth flow routing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Lizarti, Nora, und Wirta Agustin. „Aplikasi Network Traffic Monitoring Menggunakan Simple Network Management Protocol (SNMP) pada Jaringan Virtual Private Network (VPN)“. SATIN - Sains dan Teknologi Informasi 1, Nr. 1 (23.06.2015): 27. http://dx.doi.org/10.33372/stn.v1i1.17.

Der volle Inhalt der Quelle
Annotation:
Aplikasi Sistem Informasi yang ada di SMK Labor Binaan FKIP UNRI telah dapat menunjang proses keputusan yang akurat. Aplikasi Sistem Informasi tersebut bisa di akses melalui internet secara private dengan teknologi VPN ( Virtual Private Network), tetapi penggunaannya belum bisa di pantau secara spesifik oleh administrator jaringan, sehiingga perlu untuk membangunkan suatu sistem traffic monitoring dengan menggunakan Simple Network Management Protocol (SNMP) dalam mengimplementasikan aplikasi untuk melakukan pengamatan penggunaan lalu lintas data internet dari parameter yang ada pada jaringan VPN (Virtual Private Network) berbasis web, yang menjadi salah satu solusi dalam menyelesaikan masalah yang ada. VPN (Virtual Private Network) merupakan suatu cara memanfaatkan jaringan public sebagai jaringan private secara aman melalui internet yang menggunakan perpaduan teknologi tunneling dan enkapsulasi. SNMP merupakan sebuah protokol yang didesain untuk memberikan kemampuan pengumpulan data manajemen perangkat jaringan dan pengkonfigurasian perangkat jaringan secara jarak jauh (remotely). Sistem operasi yang digunakan pada server administator adalah Linux Ubuntu 12.04. Linux Ubuntu merupakan distro linux yang stabil dan cukup handal. Dengan adanya aplikasi network traffic monitoring pada jaringan VPN dapat membantu pihak administrator untuk memantau lalu lintas data sehingga penggunaan internet lebih optimal.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Umaroh, Lia, und Machsun Rifauddin. „IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG“. BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, Nr. 2 (11.12.2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.

Der volle Inhalt der Quelle
Annotation:
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data, data reduction, data presentation and drawing conclusions. While the validity of the data was obtained through triangulation. The results showed that the use of VPN in the UNISMA Library to speed up internet connection and data privacy. UNISMA library uses a proxy server router operating system for VPN networks. To be able to make Mikrotik a VPN server, configuration is required which includes IP pool configuration, IP router configuration, PPP configuration, DHCP server configuration, NAT by pass firewall configuration and IP security configuration. The library selection of VPN products considers the aspects of strong authentication, encryption that is strong enough, meets standards, integration with other field network services.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Lota, Stanislaw, und Marcin Markowski. „Performance Analysis of Virtual Computer Network Based on Cisco Cloud Services Router 1000V in a Private Cloud Environment“. Journal of Applied Computer Science Methods 7, Nr. 2 (01.11.2015): 117–32. http://dx.doi.org/10.1515/jacsm-2015-0013.

Der volle Inhalt der Quelle
Annotation:
Abstract Virtualization of physical network devices is a relatively new technology, that allows to improve the network organization and gives new possibilities for Software Defined Networking (SDN). Network virtualization is also commonly used for testing and debugging environments, before implementing new designs in production networks. Important aspect of network virtualization is selecting virtual platform and technology, that offer maximal performance with minimal physical resource utilization. This article presents a comparative analysis of performance of the virtual network created by the virtual CSR1000v and virtual machines running Windows 8.1 on two different virtual private cloud platforms: VMware vSphere 5.5 and Microsoft Hyper-V Server 2012 R2. In such prepared testbed we study the response time (delay) and throughput of virtual network devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Hidayatulloh, Syarif, und Wahyudin Wahyudin. „Perancangan Wide Area Network (WAN) Dengan Teknologi Virtual Private Network (VPN)“. Jurnal Teknik Komputer 5, Nr. 1 (06.02.2019): 7–14. http://dx.doi.org/10.31294/jtk.v5i1.4552.

Der volle Inhalt der Quelle
Annotation:
The use of information technology and its use in collecting and processing data into information that is useful in decision making will play a role in determining the success of an organization or company in the future. This happened to PT. Jasa Cendekia Indonesia, the computer network that is owned has not met the needs of its employees. A good computer network is one that can serve sharing resources, data security, resources more efficiently and up-to-date information. Basically if a company can hold a computer network that serves the above for employees, of course it will make it easier for employees to do the work and improve the standards of the company itself. The proposed network built by the author for PT. Indonesian Scholar Services is a computer network built with Virtual Private Network technology. Because companies that have communication between the head office and branches that are good and safe, will be the capital for their companies in facing challenges in the era of globalization. Communication that is connected to a fast and secure computer network will make it easier for a company to supervise the activities of its company.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Hariyadi, I. Putu, und Khairan Marzuki. „Implementation Of Configuration Management Virtual Private Server Using Ansible“. MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 19, Nr. 2 (30.05.2020): 347–57. http://dx.doi.org/10.30812/matrik.v19i2.724.

Der volle Inhalt der Quelle
Annotation:
Virtualization technology has been applied to universities with computer study programs to support practicum in Network Management courses. Each user gets a Virtual Private Server (VPS) with container technology. VPS system that is prepared manually requires a long time, especially when the number of users is increasing. The activity repeats every semester so it becomes ineffective and inefficient. Application of automation using Ansible can help to manage VPS objects in the Promox Virtual Environment (PVE) Cluster dynamically. Network Development Life Cycle (NDLC) was used as a method in this study. The design of the VPS management automation system created supports the grouping of container, user and permission resource management for users. The design is implemented in Ansible Playbook. The test results show the average time of making VPS objects per student with an automation system 2 (two) times faster, that is 26.25 seconds compared to the old system which takes 2 minutes 15 seconds. Besides that, the Playbook that was created succeeded in automating the start and stop containers per group of students based on the practicum schedule dynamically so as to maintain the availability of services from the PVE Cluster.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Tovar, Benjamin, Brian Bockelman, Michael Hildreth, Kevin Lannon und Douglas Thain. „Harnessing HPC resources for CMS jobs using a Virtual Private Network“. EPJ Web of Conferences 251 (2021): 02032. http://dx.doi.org/10.1051/epjconf/202125102032.

Der volle Inhalt der Quelle
Annotation:
The processing needs for the High Luminosity (HL) upgrade for the LHC require the CMS collaboration to harness the computational power available on non-CMS resources, such as High-Performance Computing centers (HPCs). These sites often limit the external network connectivity of their computational nodes. In this paper we describe a strategy in which all network connections of CMS jobs inside a facility are routed to a single point of external network connectivity using a Virtual Private Network (VPN) server by creating virtual network interfaces in the computational nodes. We show that when the computational nodes and the host running the VPN server have the namespaces capability enabled, the setup can run entirely on user space with no other root permissions required. The VPN server host may be a privileged node inside the facility configured for outside network access, or an external service that the nodes are allowed to contact. When namespaces are not enabled at the client side, then the setup falls back to using a SOCKS server instead of virtual network interfaces. We demonstrate the strategy by executing CMS Monte Carlo production requests on opportunistic non-CMS resources at the University of Notre Dame. For these jobs, cvmfs support is tested via fusermount (cvmfsexec), and the native fuse module.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Trihadi, Siswa, Frenky Budianto und Wirriyanto Arifin. „PERANCANGAN VIRTUAL PRIVATE NETWORK DENGAN SERVER LINUX PADA PT. DHARMA GUNA SAKTI“. CommIT (Communication and Information Technology) Journal 2, Nr. 1 (31.05.2008): 25. http://dx.doi.org/10.21512/commit.v2i1.488.

Der volle Inhalt der Quelle
Annotation:
Purpose of this research is to analyze and design a network between head and branch office, andcompany mobile user, which can be used to increase performance and effectiveness of company in doingtheir business process. There were 3 main methods used in this research, which were: library study, analysis,and design method. Library study method was done by searching theoretical sources, knowledge, and otherinformation from books, articles in library, and internet pages. Analysis method was done by doing anobservation on company network, and an interview to acquire description of current business process andidentify problems which can be solved by using a network technology. Meanwhile, the design method wasdone by making a topology network diagram, and determining elements needed to design a VPN technology,then suggesting a configuration system, and testing to know whether the suggested system could run well ornot. The result is that network between the head and branch office, and the mobile user can be connectedsuccessfully using a VPN technology. In conclusion, with the connected network between the head andbranch office can create a centralization of company database, and a suggested VPN network has run well byencapsulating data packages had been sent.Keywords: network, Virtual Private Network (VPN), library study, analysis, design
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Satwika, I. Kadek Susila. „ANALISIS QUALITY OF SERVICE JARINGAN VIRTUAL PRIVATE NETWORK (VPN) DI STMIK STIKOM INDONESIA“. JURNAL ILMIAH INFORMATIKA 7, Nr. 01 (22.03.2019): 60. http://dx.doi.org/10.33884/jif.v7i01.1016.

Der volle Inhalt der Quelle
Annotation:
The need to access data remotely is a person's need to be more efficient in doing a job. Currently there are many remote access application programs, one of which is TeamViewer by utilizing the internet public network. By installing a TeamViewer program on a client and server computer someone can do data work and repair remotely as long as it is connected to the internet. To be able to do remote access, of course, a client must already know the user and password from the server computer. The disadvantage of TeamViewer is that other people will easily remote access data simply by entering the user and password that the computer has on the server. To overcome this problem, VPN technology is used with the PPTP protocol where only the IP address of the client that has been registered on the proxy device can access data on the server. VPN allows clients to connect to the server privately through public networks. To find out the performance of the VPN network that is built, QoS (Quality of Service) parameter analysis is needed which includes delay, jitter, throughput and packet loss. From the results of the tests carried out, the results of QOS with an index of 3.75, which if converted to the standard TIPHON, VPN network at STMIK STIKOM Indonesia has a satisfactory quality.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Wijaya, Tony. „PENERAPAN METODE SCRUM DAN VIRTUAL PRIVATE NETWORK DALAM PERANCANGAN SISTEM ORDERSALES“. CCIT Journal 11, Nr. 1 (20.02.2018): 115–25. http://dx.doi.org/10.33050/ccit.v11i1.565.

Der volle Inhalt der Quelle
Annotation:
Sales Ordering System is a mobile application used by salesman to create sales invoice. With this system, salesman can directly input invoices to server computer at head office using their smartphones. It is possible because there is Virtual Private Network (VPN) that connect server PC with those smartphones. This system has featureof sales invoice which can be done using smartphone browser.The writer implements Scrum which is derived from Agile Methodology in this research to design the system.Scrum is a framework that focus at dividing main goal into several easy-to-achieve goals.Scrum assumed user requirements in a project development cannot be listed completely up front, because they often changed their minds in the process.Testing is done with blackbox method to ensure the feature mentioned above is well implemented.With sales ordering system, companies can achieve one step further in productivity and to give better service and satisfaction to consumer.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Octavia, Hadria. „UNJUK KERJA PENERAPAN TEKNOLOGI VoIP PADA JARINGAN VPN (VIRTUAL PRIVATE NETWORK)“. Elektron : Jurnal Ilmiah 5, Nr. 2 (26.08.2018): 1–12. http://dx.doi.org/10.30630/eji.5.2.49.

Der volle Inhalt der Quelle
Annotation:
VoIP ( Voice over Internet Protocol ) is a technology used for communication in the form of IP based voice media over long distances. The concept of a VPN (Virtual Private Network) in this paper makes a client that is on the public network can be connected to a LAN network. To use the VoIP server in the Linux operating system Trixbox, whereas for the VPN server using ClearOS and X-lite is used as a softphone to make calls to the client. Of testing at 64kbps bandwidth using the G711 codec produces value performance (delay, jitter, and packet loss ) is not good, so that voice data delivered is less clear. Thus the choice of bandwidth for the G.711 codec 512kbps up is the best solution to get the value of the performance (delay, jitter, and packet loss) better . And a choice of 3 Greed (low, medium, high) on setting bandwidth, high is the best option. Because it can produce the best performance for VoIP VPN technology.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Kaur, Gagandeep, Dr Mohita Garg und Mrs Navjot Jyoti. „ENHANCED SECURITY MECHANISM IN CLOUD COMPUTING: A REVIEW“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, Nr. 6 (24.04.2015): 5840–44. http://dx.doi.org/10.24297/ijct.v14i6.1910.

Der volle Inhalt der Quelle
Annotation:
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. We can do segregate data by creating virtual partitions of data for saving and allowing user to access data in his partition only. We will be implementing cloud security aspects for data mining by implementing cloud system. After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud. We will be fixing threats in data mining to Personal/private data in cloud systems. Â
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Kaur, Randeep, und Jagroop Kaur. „Enhancing Cloud Computing Security by Using Pixel Key Pattern“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, Nr. 7 (16.05.2015): 5919–28. http://dx.doi.org/10.24297/ijct.v14i7.1894.

Der volle Inhalt der Quelle
Annotation:
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. We can do segregate data by creating virtual partitions of data for saving and allowing user to access data in his partition only. We will be implementing cloud security aspects for data mining by implementing cloud system. After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud. We will be fixing threats in data mining to Personal/private data in cloud systems. Â
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Kaur, Amandeep, und Mr Pawan Luthra. „ENHANCED SECURITY MECHANISM IN CLOUD COMPUTING USING HYBRID ENCRYPTION ALGORITHM AND FRAGMENTATION: A REVIEW“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, Nr. 8 (02.06.2015): 5987–93. http://dx.doi.org/10.24297/ijct.v14i8.1859.

Der volle Inhalt der Quelle
Annotation:
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the schematic diagrams. It represents all the complexities of the network which may include everything from cables, routers, servers, data centers and all such other devices. Cloud based systems saves data off multiple organizations on shared hardware systems. Data segregation is done by encrypting data of users, but encryption is not complete solution. We can do segregate data by creating virtual partitions of data for saving and allowing user to access data in his partition only. We will be implementing cloud security aspects for data mining by implementing cloud system. After implementing cloud infrastructure for data mining for cloud system we shall be evaluating security measure for data mining in cloud. We will be fixing threats in data mining to Personal/private data in cloud systems. Â
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Ariyadi, Tamsir, und Muhamad Agung Prabowo. „Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security“. INOVTEK Polbeng - Seri Informatika 6, Nr. 1 (15.06.2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.

Der volle Inhalt der Quelle
Annotation:
Dibutuhkannya komunikasi dalam menunjang interaksi antar perusahaan yang memiliki kaitan yang sangat erat terhadap perkembangan teknologi informasi melalui jaringan komputer. Virtual Private Network atau biasa disebut VPN memiliki peran penting dalam perkembangan sistem keamanan dalam jaringan internet, terutama dalam membatasi hak akses terhadap server, database, dan sejenisnya dalam meminimalisir terjadinya akses illegal terhadap data-data penting perusahaan. VPN memiliki beberapa tipe salah seperti VPN Tunnel dan IPSec, VPN Tunnel memiliki konsep yang lebih sederhana dibandingkan dengan IPSec karena dapat menghubungkan server dan client secara remoteaccess yang hanya membutuhkan 1 router saja yang terhubung pada sisi server. IPSec memiliki tingkat keamanan yang lebih tinggi dibandingkan dengan VPN Tunnel dengan jalur komunikasi dilengkapi dengan kriptografi. IPSec yang berjalan pada L2TP memiliki tingkat kinerja yang lebih baik dibandingkan VPN Tunnel berdasarkan hasil yang telah di dapatkan, karena konsep yang mengharuskan router terkoneksi secara point-to-point. Kata Kunci - Virtual Private Network (VPN), IPSec, Tunneling, Quality of Service, Peformance
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Sudiana, Sudiana, Kusrini Kusrini und Andi Sunyoto. „DESAIN SISTEM MANAJEMEN SERVER DATABASE SECARA REMOTE CONTROL BERBASIS VPN (VIRTUAL PRIVATE NETWORK)“. KURVATEK 3, Nr. 1 (06.05.2018): 119–31. http://dx.doi.org/10.33579/krvtk.v3i1.752.

Der volle Inhalt der Quelle
Annotation:
Kegiatan bisnis UMKM berupa pembelian, pemasaran, penjualan, pengembalian, gudang, karyawan, dan analisa barang dan jasa mayoritas dilakukan secara konvensional (pencatatan manual). Sistem ini semakin terasa lambat dan tidak berkualitas dalam sistem pelayanan-prima, terutama bila melakukan proses bisnis secara ecer dan grosir, maka volume barang dan jasa yang dikendalikan menjadi besar, hal ini mengakibatkan waktu tunggu pelayanan ketika melakukan pencatatan transaksi menjadi tidak wajar (pelayanan buruk), sehingga akan sangat berakibat terhadap keuntungan dan kredibilitas perusahaan, oleh karena itu diperlukan adanya suatu proses perancangan sistem “manajemen-server-client” spesifik berupa monitoring, pengendalian, pemeliharaan, perbaikan, pengujian, dan asistensi terhadap operasional sistem server-client database yang bisa dilakukan oleh tenaga ahli perusahaan sendiri baik langsung maupun tidak (secara remote-control). Penelitian ini bertujuan untuk mengimplementasikan TI dalam sistem manajemen (pengendalian, pemantauan, pemeliharaan, perbaikan, pengujian dan asistensi) server-client database secara jarak jauh (remote-control). Jenis penelitian yang dilakukan adalah studi kasus pada UMKM (usaha mikro, kecil dan menengah) di perusahan dagang (PD) “dian’s putra grosir”. Metode yang digunakan adalah deskriptif kualitatif yang mengambarkan langkah-langkah mendesain sistem manajemen server-client database secara remote-control berbasis VPN dengan aplikasi TeamViewer.Hasil penelitian menunjukkan bahwa implementasi teknologi informasi (TI) dalam sistem manajemen (pengendalian, pemantauan, pemeliharaan, perbaikan, pengujian dan asistensi) server-client database secara jarak jauh (remote-control) berbasis VPN dapat dilaksanakan dan dioperasikan dengan baik dan benar pada salah satu UMKM, sehingga UMKM tersebut mempunyai suatu mekanisme spesifik dalam melakukkan sistem manajemen server-client dengan baik, aman, dan ekonomis.Kata kunci: Server Database, Remote Control, VPN.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Ma, Xiaobo, Jian Qu, Feitong Chen, Wenmao Liu, Jianfeng Li, Jing Tao, Hongshan Jiao, Mawei Shi und Zhi-Li Zhang. „One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers“. IEEE Communications Magazine 59, Nr. 2 (Februar 2021): 64–69. http://dx.doi.org/10.1109/mcom.001.2000602.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Mukmin, Chairul, und Widya Cholil. „PERBANDINGAN OPENVZ DENGAN KERNEL BASED VIRTUAL MACHINE (KVM)“. Jurnal Ilmiah Matrik 20, Nr. 2 (25.01.2019): 129–35. http://dx.doi.org/10.33557/jurnalmatrik.v20i2.115.

Der volle Inhalt der Quelle
Annotation:
Server virtualization is one system that uses energy and can work simultaneously. In this study the comparison of OpenVZ based hypervisors with kernel virtual machine (KVM) hypervisors will be compared on a virtual private server (VPS) machine. The research method uses PPDIOO developed by Cisco in network system design. The phases in the PPDIOO method are Prepare, Plan, Design, Implement, Operate and Optimize. The results of this study are OpenVZ-based virtual machines are more stable than KVM because the level of efficiency of existing resources is more efficient use of OpenVZ-based virtual machines with data using 0.8% CPU performance and 589mb of memory, the level of use of KVM-based virtual machine resources is greater with 65.4% CPU performance and 2824 mb memory, OpenVZ-based virtual machines that are able to run without large resources, while KVM-based virtual machines while working together require very large resources. Keywords: ,, ,, Kernel-based Virtual Machine (KVM), Virtual Private Server (VPS)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Sun, Jian, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu und Xiaojiang Du. „Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective“. Security and Communication Networks 2019 (14.03.2019): 1–15. http://dx.doi.org/10.1155/2019/4074272.

Der volle Inhalt der Quelle
Annotation:
Network function virtualization (NFV) is a new way to provide services to users in a network. Different from dedicated hardware that realizes the network functions for an IoT application, the network function of an NFV network is executed on general servers, and in order to achieve complete network functions, service function chaining (SFC) chains virtual network functions to work together to support an IoT application. In this paper, we focus on a main challenge in this domain, i.e., resource efficient provisioning for social IoT application oriented SFC requests. We propose an online SFC deployment algorithm based on the layered strategies of physical networks and an evaluation of physical network nodes, which can efficiently reduce bandwidth resource consumption (OSFCD-LSEM) and support the security and privacy of social IoT applications. The results of our simulation show that our proposed algorithm improves the bandwidth carrying rate, time efficiency, and acceptance rate by 50%, 60%, and 15%, respectively.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Fathsyah, Muhammad Munaza, Irawan Hadi und Irma Salamah. „Implementasi Virtual Private Network Failover Menggunakan Mikrotik Pada Jaringan Lokal Politeknik Negeri Sriwijaya“. Jurnal Teknik Komputer 7, Nr. 2 (29.07.2021): 222–28. http://dx.doi.org/10.31294/jtk.v7i2.11077.

Der volle Inhalt der Quelle
Annotation:
Pertumbuhan, perkembangan, dan kebutuhan akan informasi terus-menerus menjadi sebuah kebutuhan primer bagi setiap masyarakat umum, organisasi, perusahaan, dan lembaga pendidikan. Salah satu contoh lembaga pendidikan yang memiliki kebutuhan akan informasi yaitu Politeknik Negeri Sriwijaya (Polsri), dimana dosen dan mahasiswa memerlukan koneksi melalui sebuah media kabel ataupun nirkabel untuk terhubung ke jaringan internet (global) maupun jaringan intranet (lokal). Sistem Akademik dan Learning Management System (LMS) adalah salah satu jaringan lokal Polsri yang paling sering diakses untuk memenuhi kegiatan akademik. Dosen ataupun mahasiswa sebagai client akan terus dapat mengakses jaringan lokal tersebut selama jalur komunikasi atau media transmisi antar router client dan router server tetap terhubung. Apabila jalur komunikasi utama antar router client dan router server terputus oleh faktor tertentu, maka client tidak dapat mengakses jaringan lokal sehingga proses kegiatan akademik menjadi terhambat. Untuk menghindari kejadian tersebut, maka diperlukan sebuah jalur komunikasi cadangan (backup link) dan suatu penerapan teknik failover pada sisi router client. Teknik failover adalah teknik yang memiliki kemampuan untuk mengalihkan jalur komunikasi utama ke jalur komunikasi cadangan sehingga komunikasi dapat terus berjalan meskipun jalur komunikasi utama terputus. Jalur komunikasi cadangan pada implementasi ini didukung oleh teknologi telepon seluler generasi keempat atau teknologi yang lebih dikenal dengan istilah 4G LTE (Fourth Generation Long Term Evolution). Selain itu, terdapat penerapan Virtual Private Network (VPN) tipe Layer Two Tunneling Protocol (L2TP) pada jalur komunikasi cadangan untuk menjaga keamanan komunikasi. Protokol routing yang akan digunakan untuk melakukan proses pertukaran informasi routing pada implementasi ini adalah Border Gateway Protocol (BGP).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Mohd Fuzi, Mohd Faris, Mohamad Ridzuan Mohd Alias, Naginder Kaur und Iman Hazwam Abd Halim. „SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network“. Journal of Computing Research and Innovation 6, Nr. 4 (20.09.2021): 90–101. http://dx.doi.org/10.24191/jcrinn.v6i4.230.

Der volle Inhalt der Quelle
Annotation:
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet. VPNs can be used to shield users’ browsing activity and encrypts data transmitted over the network to prevent sniffing attack. Nowadays, users can either pay a premium price for a good VPN service or risk their privacy using free browser-based VPN. Thus, SafeSearch is developed to address these issues in mind. With SafeSearch, users will not need to fork out a lot of money for premium VPN subscription services or expose themselves to targeted advertising when utilising free browser-based VPN. In this study, open VPN protocol was used to create the VPN server on a microcomputer called Raspberry Pi. The software used was mostly open-source except for the VPN client. Obfuscation technique was used to hide VPN traffic by disguising it as just another normal Internet traffic against Deep Packet Inspection when passing through firewall. After the VPN server was established, tests were carried out to evaluate the functionality and reliability of the VPN server in “real-world” environment. The tests conducted were network restriction penetration assessment, network performance and user acceptance test. Penetration assessment result showed that SafeSearch is capable of bypassing web filtering and deep packet inspection. Network performance during SafeSearch connection has slight latency and bandwidth decline, although it is not overly affected. The outcome of the user acceptance test was positive as the majority of participants of the study were confident that SafeSearch can secure their connection and protect their privacy when browsing the web. To conclude, both objectives of this project were fully achieved and the scope of study was followed thoroughly.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Fan, Pei Ying, und Yang Qiu. „Integration of Network Resources Based on Unified Identity Authentication“. Applied Mechanics and Materials 623 (August 2014): 258–61. http://dx.doi.org/10.4028/www.scientific.net/amm.623.258.

Der volle Inhalt der Quelle
Annotation:
This article analysis the current situation of the virtual construction in university, which information non-sharing, poor safety and difficult management. Aiming at data diversification and the difference between platform, develop tools and system, making every network teaching resources system as an “information islet”, thus cause the disperse and independence of resources and data, integrate each resources system effectively by looking for a service governance structure. We proposed management system and method for private universities of long-term development. The main research is to set up the unified authentication system which can complete unified authentication and authority and administer. Using the virtual server technology, Information Office will set up a virtual campus portal platform with unified planning and concentration deployment, which is simple operation, advanced technology, safe and reliable, to realize unified management and guarantee the information resources interoperability and consistency.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Fawaid, Ibnu Haris, Diah Risqiwati und Denar Regata Akbi. „Rancang Bangun Mirror Repository Linux Menggunakan Load-Balanced Mirror Service System (LMSS) Pada Private Cloud“. Jurnal Repositor 2, Nr. 1 (04.01.2020): 35. http://dx.doi.org/10.22219/repositor.v2i1.327.

Der volle Inhalt der Quelle
Annotation:
Abstrak Meningkatnya permintaan pembaharuan aplikasi berbasis open source karena seiring meningkatnya jumlah pengguna sistem operasi Linux, oleh karenanya ketika banyak pengguna linux yang melakukan permintaan pembaharuan aplikasi menyebabkan lambatnya kecepatan unduh dan membutuhkan waktu lama. Salah satu solusinya yaitu dengan membuat mirror repository linux agar memudahkan dan menawarkan koneksi pengguna yang lebih baik. Namun demikian, suatu saat ketika semakin bertambah jumlah pengguna mirror tersebut akan mengalami penurunan kualitas download hingga dapat mengalami down, sehingga tidak dapat melayani permintaan pembaharuan pengguna dengan baik. Penelitian ini bertujuan untuk merancang dan membangun Mirror Repository Linux dengan menggunakan Load-balanced Mirror Service System (LMSS) dengan mengintegrasikan beberapa MIrror Server yang dibangun secara generate melalui Manage Large Network (MLN), dengan pembagian beban menggunakan Linux Virtual Server (LVS) pada metode Network Address Translation (NAT). Sehingga beban permintaan dari client dapat ditangani Mirror Server secara bersama – sama. Dengan demikian, rata – rata waktu download dapat berkurang sebanyak 17,2 % daripada menggunakan Single Server.AbstractThe increasing demand for open source-based application updates is due to the increasing number of users of Linux operating systems, therefore when many Linux users who request an application update cause slow download speed and takes a long time. One solution is to create Mirror Repository Linux in order to facilitate and offer better user connections. However, a time when the number of mirror users will decrease the quality of download until it can down, so it can not serve user renewal request well. This research aims to design and build linux mirror repositories by using Load-balanced Mirror Service System (LMSS) by integrating multiple Mirror Server generated via Manage Large Network (MLN), with load sharing using Linux Virtual Server (LVS) Network Address Translation (NAT). LMSS there is a Director Server as a counter / load manager that passes on the server, which will be forwarded to the destination server. So that the request load from the client can be handled Mirror Server together. Thus, the average download time can be reduced by 17.2% rather than using a single server.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Diana, Diana, Javier Rezon Gumiri und Ali Wandra. „Optimasi Keamanan Virtual Private Network Untuk Komunikasi Data Di Pusat Informasi Pengembangan Pemukiman Dan Bangunan (PIP2B)“. Pseudocode 8, Nr. 1 (10.03.2021): 76–89. http://dx.doi.org/10.33369/pseudocode.8.1.76-89.

Der volle Inhalt der Quelle
Annotation:
Keamanan, kemudahan dan kecepatan transfer (pertukaran data) adalah salah satu aspek yang penting dari suatu jaringan komunikasi, terutama untuk perusahaan–perusahaan skala menengah ke atas., sehingga jatuhnya informasi yang bersifat rahasia diambil dan dimanfaatkan oleh-oleh orang yang tidak bertanggung jawab akan menyebabkan kerugian yang besar, untuk mengatasi permasalahan ini perlu Virtual Private Network dan mengoptimalkan keamanan nya menggunakan metode Port Knocking dengan menutup semua port yang terbuka dan hanya mengijinkan koneksi yang telah melakukan tahap ”knocking” terhadap port tertentu diperbolehkan melalukan koneksi server tersebut agar komunikasi data antara pihak Pusat Informasi Pengembangan Pemukiman dan Bangunan dengan Mitra kerjanya lebih mudah dan aman dalam menyelesaikan pekerjaannya, Hasil pengujaian dengan adanya jaringan ini di sana ada service atau layanan-layanan yang ada bisa berjalan sesuai harapan tanpa terhambat waktu dan tempat dan metode port knocking keamanan lebih optimal karena memerlukan pengetukan port dan protocol terlebih dahulu, jadi untuk hak akses ke server lebih aman tidak sembarang orang dapat mengakses jika tidak ada izin.Kata Kunci: keamanan, Virtual Private Network, Port Knocking
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Ruslianto, Ikhwan. „Perancangan dan Implementasi Virtual Private Network (VPN) menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Mikrotik di Fakultas MIPA Universitas Tanjungpura“. Computer Engineering, Science and System Journal 4, Nr. 1 (06.02.2019): 74. http://dx.doi.org/10.24114/cess.v4i1.11792.

Der volle Inhalt der Quelle
Annotation:
Internet sudah menjadi bagian yang tidak terpisahkan dari aktivitas manusia sehari-hari. Dengan internet segala informasi bisa didapatkan dalam waktu yang cepat, dari berbagai penjuru dunia dapat saling berkomunikasi dan bertukar informasi. Akan tetapi dengan adanya internet, keterbukaan informasi menjadi hal yang biasa, walaupun terkadang ada informasi yang masih bersifat rahasia (confidentiality). Informasi dapat berupa apa saja, tidak terkecuali informasi dan data yang berkaitan dengan institusi pendidikan, Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Tanjungpura salah satunya. Di Fakultas MIPA sendiri ada beberapa informasi-informasi informasi yang hanya boleh diakses oleh kalangan tertentu saja. Misalnya ada beberapa aplikasi yang hanya dapat dibuka di lingkungan FMIPA saja maka dibuatlah mekanisme Virtual Private Network menggunakan protokol SSTP (Secure Socket Tunneling Protocol) agar Server dan aplikasi yang ada di lingkungan FMIPA dapat diakses menggunakan internet diluar lingkungan FMIPA. Konfigurasi SSTP dapat dilakukan menggunakan perangkat router mikrotik yang dihubungkan menggunakan perantara Virtual Private Server (VPS) yang ada di internet, kemudian diintegrasikan pada router mikrotik, sehingga kedua kondisi tersebut dapat saling berinteraksi seolah-olah pengguna berada dilingkungan FMIPA Untan
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Kamil, Idham, Julham Julham, Muharman Lubis und Arif Ridho Lubis. „Management maintenance system for remote control based on microcontroller and virtual private server“. Indonesian Journal of Electrical Engineering and Computer Science 16, Nr. 3 (01.12.2019): 1349. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1349-1355.

Der volle Inhalt der Quelle
Annotation:
<p>Open loop shaped control system is a form of system control without any feedback from the system. One example is the on-off condition which functions to connect and disconnect electricity. The condition to be studied is a dc motor that can be set to live and die via internet server-based client service. The server in this system is a virtual private server (VPS) device that will provide a source of service to the client in the form of a collection of information on dc motor conditions. In addition, its function is also to record the working time of the dc motor. So that a schedule can be determined when the dc motor is maintained. While the client is a control unit consisting of a microcontroller device, an ethernet module enc28j60 and a dc motor. In general the working principle of the system is beginning with the user accessing the desired VPS IP address through a web browser application. From the web browser the user chooses a dc motor to be activated. But before the client has been connected to the VPS regularly (every second), the point is to always get the latest dc motor condition information. Then the microcontroller will set the dc motor in active or off condition. The research method used is research and development. The results obtained from this study are that the amount of bandwidth needed for communication between VPS and microcontrollers via the internet network, when the control unit works is 6.02 kbps, while the response time for dc motor is 3.16 seconds and the response time for dc motor 2 is 3.46 seconds.</p>
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Syani, Mamay, und Bayu Saputro. „Implementasi Remote Monitoring Pada Virtual Private Server Berbasis Telegram Bot Api (Studi Kasus Politeknik Tedc Bandung“. Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) 4, Nr. 2 (31.03.2021): 94–111. http://dx.doi.org/10.47970/siskom-kb.v4i2.190.

Der volle Inhalt der Quelle
Annotation:
Perkembangan teknologi informasi dan khususnya jaringan sangatlah pesat oleh karena itu dibutuhkan sistem jaringan komputer yang sangat canggih. Dimana permasalahan yang sering terjadi disebuah perusahaan ataupun institusi yang sudah memakai server sering sekali kurangnya fleksibilitas dalam pengawasan server karena mudah sekali terjadi human error yang mengarah kepada admin jaringan yang bertugas untuk mengawasi server. Sebagai solusi dari permasalahan tersebut dengan menggunakan sistem Zabbix sebagai Network Monitoring System karena Zabbix sudah memiliki tampilan GUI berupa map dan grafik sehingga membantu pengaturan administrasi maupun sistemnya. Implementasi Bot sudah banyak digunakan dengan keunggulan dalam keandalan untuk menyediakan data ke pengguna yang tidak terbatas oleh waktu. Dengan Bot ini admin jaringan dengan mengirimkan perintah ke Bot maka informasi yang diinginkan akan diberikan ke admin jaringan tanpa harus mengecek langsung kondisi server secara real time.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Sidik, Sidik, Ade Sudaryana und Rame Santoso. „Implementasi Virtual Interface Menggunakan Metode EOIP Tunnel Pada Jaringan WAN PT. Indo Matra Lestari“. Jurnal Teknik Komputer 6, Nr. 1 (10.01.2020): 103–10. http://dx.doi.org/10.31294/jtk.v6i1.6830.

Der volle Inhalt der Quelle
Annotation:
Computer networks have become an important point in companies that have many branch offices to coordinate the transfer of data. PT Indo Matra Lestari's connection uses a VPN system using the PPTP method. Data Center is used as a VPN server, the client is the Head Office and Citereup Branch Offices. Between the Head Office and the Citereup Branch Office there is no direct connection so access to data made between the Head Office and the Citereup Branch Office is slow, because the data must pass through the Data Center before reaching its destination. Moreover, the data accessed is private to the company and only accessed on the local network. The solution used to create a direct and secure network path between the Head Office and Branch Offices is to use the EoIP Tunnel on the proxy router. Tunneling method in EoIP can make network bridging between proxy devices, EoIP Tunnel will change to Virtual Interface on the proxy router so that it is as if the proxy router is connected locally. Tunnel ID on the EoIP Tunnel functions as a tunneling path security. The application of the EoIP Tunnel makes the point to point connection point between Mikrotik devices faster in data access because the data access is directed to the destination. In order for this EoIP Tunnel connection to run optimally and well, a network management is needed in managing internet bandwidth usage
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Tanaka, Miyoko, Akane Tameike, Nobuhiro Ishikawa und Kazuo Furuya. „Development and Application of an Internet Electron Microscopy System for the Outreach Program in Japan“. Microscopy and Microanalysis 14, Nr. 2 (03.03.2008): 176–83. http://dx.doi.org/10.1017/s1431927608080070.

Der volle Inhalt der Quelle
Annotation:
The development of a remotely operated scanning electron microscopy (SEM) system and its use by high school students and the public as an outreach program are reported. The SEM and the server are located in the National Institute for Materials Science, Tsukuba, Japan, with client computers installed at a science museum and high schools. Using a secure virtual private network system and scheduling/management groupware, observation of SEM images and energy dispersive X-ray analysis are widely and frequently performed throughout Japan.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Li, Yuanming, Wei Guo, Xuejun Meng und Wen Xia. „Charging wireless sensor network security technology based on encryption algorithms and dynamic model“. International Journal of Distributed Sensor Networks 16, Nr. 3 (29.02.2020): 155014772090199. http://dx.doi.org/10.1177/1550147720901999.

Der volle Inhalt der Quelle
Annotation:
With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Kraft, Daniel. „Game Channels for Trustless Off-Chain Interactions in Decentralized Virtual Worlds“. Ledger 1 (21.12.2016): 84–98. http://dx.doi.org/10.5195/ledger.2016.15.

Der volle Inhalt der Quelle
Annotation:
Blockchains can be used to build multi-player online games and virtual worlds that require no central server. This concept is pioneered by Huntercoin, but it leads to large growth of the blockchain and heavy resource requirements. In this paper, we present a new protocol inspired by payment channels and sidechains that allows for trustless off-chain interactions of players in private turn-based games. They are usually performed without requiring space in the public blockchain, but if a dispute arises, the public network can be used to resolve the conflict. We also analyze the resulting security guarantees and describe possible extensions to games with shared turns and for near real-time interaction. Our proposed concept can be used to scale Huntercoin to very large or even infinite worlds and to enable almost real-time interactions between players.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Ginanjar, Herdiansyah Pratama, und Angga Setiyadi. „PENERAPAN TEKNOLOGI CLOUD COMPUTING PADA KATALOG PRODUK DI BALATKOP JAWA BARAT“. Komputa : Jurnal Ilmiah Komputer dan Informatika 9, Nr. 1 (23.03.2020): 25–33. http://dx.doi.org/10.34010/komputa.v9i1.3722.

Der volle Inhalt der Quelle
Annotation:
Balai Pelatihan Tenaga Koperasi dan Usaha Mikro, Kecil dan Menengah (BALATKOP) adalah salah satu Unit Pelaksana Teknis Daerah (UPTD) yang berperan sebagai klinik bisnis dalam menyelesaikan permasalahan Koperasi dan UMKM. Sebagai contoh BALATKOP yang berada di bawah naungan Dinas Koperasi dan UMKM. Pihak BALATKOP menyatakan tidak adanya suatu sistem teknologi informasi komunikasi yang mendukung pelaksanaan kegiatan pelatihan marketing online seperti website katalog produk. Berdasarkan permasalahan yang ada saat ini di BALATKOP, maka dibutuhkan sebuah sistem Cloud Computing E-katalog sebagai layanan pendukungnya. Pembangunan sistem Cloud Computing E-katalog dimulai dengan melakukan analisis sistem yang berjalan di BALATKOP, dilanjutkan dengan melakukan analisis pada arsitektur sistem Cloud Computing E-katalog yang akan dibangun dengan menggunakan tiga model layanan yaitu Software as a Service (Saas), Platform as a Service (PaaS) dan Infrastructure as a Service (IaaS). kemudian melakukan analisis pada alur perancangan teknologi Cloud Computing dan melakukan perancangan basis data (database) hingga perancangan antarmuka. Setelah tahapan anlisis dan desain selesai dilakukan maka tahapan selanjutnya adalah implementasi alur perancangan dari Cloud Computing sebagai sumber daya hardware, network dan storage pada Virtual Private Server (VPS). Kata kunci : Cloud Computing, Software as a Service (Saas), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Virtual Private Server (VPS).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Junaidi, Agus, Retno Wardhani und Masruroh Masruroh. „MEMBANGUN CLOUD COMPUTING UNTUK MANAGEMEN DATA PADA UNIVERSITAS ISLAM LAMONGAN“. Jurnal Teknika 10, Nr. 1 (02.05.2018): 975. http://dx.doi.org/10.30736/teknika.v10i1.204.

Der volle Inhalt der Quelle
Annotation:
To improve the efficiency of work activity management at Islamic University of Lamongan requires a service system that can help the work of management, especially data management service / file then the wake of data management services with website technology built in network of private University, website service is in the cloud Computing Local Service was built from a virtual server with a Debian 8 operating system and a server residing within the Proxmox operating system. The stages of the development of this service system include the creation of cloud services is done through several stages, namely the stage of network design, the stage of installing the operating system Proxmox, the stage of creating a VE server in proxmox, the stage of installing the VE server with debian8, the stage of configuring the VE server to web server and domain Server, implementation and testing stages. And also the stages of making management services through several stages, namely the design phase of the context diagram, the phase make usecase service diagram, create an activity diagram, the stage of making sequence diagram, and interfaces design stage
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Ruwaida, Devi, und Dian Kurnia. „RANCANG BANGUN FILE TRANSFER PROTOCOL (FTP) DENGAN PENGAMANAN OPEN SSL PADA JARINGAN VPN MIKROTIK DI SMK DWIWARNA“. Computer Engineering, Science and System Journal 3, Nr. 1 (31.01.2018): 45. http://dx.doi.org/10.24114/cess.v3i1.8267.

Der volle Inhalt der Quelle
Annotation:
File Transfer Protocol (FTP) server merupakan jenis sistem yang menghubungkan hak pengakses (client) dan penyedia (server) dalam melakukan pertukaran data yang melewati port 21, yang semula ftp server berjalan pada protocol yang tidak terlindungi di dalam port 21, kemudian dengan OpenSSL ini di amankan agar data dapat sampai ke tujuan. Pada penelitian ini akan dibangun Rancang Bangun File Transfer Protocol (Ftp) Dengan Pengamanan Open Ssl Pada Jaringan Vpn Mikrotik Di Smk Dwiwarna yang akan di konfigurasi pada debian 9.1 dengan di tambahnya pengaman sertifikat ssl , dengan harapan melindungi proses dalam pengiriman data dapat dengan aman dan ditambahkannya sistem VPN PPTP pada mikrotik akan lebih memberikan keamanan yang lebih baik lagi, dimana pemanfaatan Point-to-Point Tunneling Protocol (PPTP) suatu protokol jaringan yang bisa memungkinkan client dalam pengiriman data secara aman melalui remote client kepada server sekolah dibangunnya suatu virtual private network (VPN).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Min, Jie, Junbin Liang, Xingpo Ma und Hongling Chen. „STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems“. Security and Communication Networks 2021 (28.05.2021): 1–16. http://dx.doi.org/10.1155/2021/9939796.

Der volle Inhalt der Quelle
Annotation:
With the emergence of the fog computing and the sensor-cloud computing paradigms, end users can retrieve the desired sensory data generated by any wireless sensor network (WSN) in a fog-based sensor-cloud system transparently. However, the fog nodes and the cloud servers may suffer from many kinds of attacks on the Internet and become semitrusted, which threatens the security of query processing in the system. In this paper, we investigated the problem of secure, fine-grained spatial-temporal Top- k query in fog-based mobile sensor-cloud systems (FMSCSs) and proposed a novel scheme named STQ-SCS to tackle the problem based on the virtual grid construction and the size-order encryption-binding techniques. STQ-SCS can preserve the privacy of the sensed data items and their scores and make end users verify the completeness of the query results of fine-grained spatial-temporal Top- k queries with a 100% successful rate even if the fog nodes and the cloud servers are not totally trustworthy. Besides the good security performance, simulation results indicate that STQ-SCS is also an efficient scheme that incurs a much lower communication cost than the state-of-the-art schemes on securing fine-grained spatial-temporal Top- k query in FMSCSs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Subekti, Mohammad, Anthoni Tandiono, Fenky Tania und Hendro Wibowo A. „E-Commerce untuk Mendukung Business to Business Menggunakan Dynamic Dbmss: Studi Kasus pada Perusahaan Dagang Cross Tech“. ComTech: Computer, Mathematics and Engineering Applications 3, Nr. 1 (01.06.2012): 663. http://dx.doi.org/10.21512/comtech.v3i1.2465.

Der volle Inhalt der Quelle
Annotation:
The purpose of this study is to develop an e-commerce that can distribute any information about the products of PD Cross Tech. The e-commerce is supported by dynamic DBMS and can be connected via database reseller server so that it can do information sharing. The distribution is performed using the Distributed Relational Database Management System (DRDBMS), supported by the File Transfer Protocol and Virtual Private Network. In other words the e-Commerce supports multiplatform database. Research methodologies used are analytical methods, design methods, and literature study. Results showed that PD Cross Tech needs a new e-Commerce that supports multiplatform database. With this e-Commerce, it is expected that similar computer equipment needs for many organization in Indonesia can be designed in the same way.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Poddubnyi, I. V. „ON THE ISSUE OF THE USE OF INFORMATION AND COMMUNICATION TECHNOLOGIES BY THE DEFENDANTS IN ORDER TO HIDE THE THEFT FROM THE BANK ACCOUNTS OF CITIZENS“. Bulletin of Udmurt University. Series Economics and Law 30, Nr. 3 (26.06.2020): 424–30. http://dx.doi.org/10.35634/2412-9593-2020-30-3-424-430.

Der volle Inhalt der Quelle
Annotation:
The article substantiates the relevance of the study of theft from Bank accounts of citizens committed using information and communication technologies. The main information and communication technologies and techniques used by criminals to disguise criminal activity are analyzed and briefly characterized. The author reveals the term "cybercrime", which reflects the main features of this phenomenon. Based on the analysis of official statistics, a significant increase in crimes in this category is exposed. Various points of view are given on the terminology concerning the concealment of the crime, as well as the masking of criminal activity by the persons involved. The main methods and techniques of masking intruders on the Internet, such as the use of virtual private networks that encrypt the transmitted data and allow you to substitute the IP address of computer devices, proxy servers, which when connected becomes an intermediary for the subscriber's access to the Internet. Attention is paid to the use of socks protocols, which allow data exchange using special protocols. Separately, we study the problems of disclosure of theft from Bank cards, which use electronic money services (Visa, QIWI, Wallet, WebMoney, Yandex Money,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Azhar, Raisul, Heroe Santoso und Faisal Faisal. „Analisa Quality Of Service Menggunakan Aplikasi Gnump3d sebagai Server Media Streaming“. Jurnal Bumigora Information Technology (BITe) 3, Nr. 1 (10.07.2021): 45–55. http://dx.doi.org/10.30812/bite.v3i1.1320.

Der volle Inhalt der Quelle
Annotation:
Streaming merupakan istilah sebuah file video maupun audio yang dapat dimainkan tanpa terlebih dahulu dilakukan pengunduhan terhadap file. Streaming juga dapat diartikan sebagai teknik yang digunakan untuk melakukan transfer data sehingga dapat diproses secara tetap dan terus menerus. Saat ini banyak sekali aplikasi yang menjalankan audio dan video streaming antara lain seperti Gnump3d, Spotify, Joox, Deezer dan lain sebagainya. Banyaknya aplikasi tersebut tidak menjamin kualitas layanan atau QoS yang baik jika dijalankan pada jaringan internet yang didalmnya melewati banyak perangkat jaringan. Permasalahan QoS pada media Audio Streaming tidak akan banyak terlihat pada Server phisik akan tetapi akan terlihat jika aplikasi tersebut dipasang pada Virtual Private Server. Tujuan dari penelitian ini adalah ingin mengetahui tingkat kualitas layanan atau QoS yang dihasilkan oleh Sebuah Aplikasi Gnump3d yang terpasang pada VPS dengann hanya memperhatikan parameter Delay,Jiiter, Packet, Loss dan Throughput. Metodologi penelitian menggunakan metodologi Network Development Life Cycle (NDLC). Hasil dari penelitian ini diperoleh QoS audio streaming yang dinilai baik berdasarkan standard pengukuran QoS TIPHON dan hanya satu parameter QoS yang di anggap gagal yaitu pada Jitter karena memiliki nilai yang tidak sesuai standart tersebut.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Jung, Younchan, und Ronnel Agulto. „Virtual IP-Based Secure Gatekeeper System for Internet of Things“. Sensors 21, Nr. 1 (23.12.2020): 38. http://dx.doi.org/10.3390/s21010038.

Der volle Inhalt der Quelle
Annotation:
The advantage of using the Network Address Translation device is that the internal IP address, which makes the IP address space of Internet of Things (IoT) devices expanded, is invisible from the outside and safe from external attacks. However, the use of these private IPv4 addresses poses traversal problems, especially for the mobile IoTs to operate peer-to-peer applications. An alternative solution is to use IPv6 technologies for future IoT devices. However, IPv6 package, including IPSec, is too complex to apply to the IoT device because it is a technology developed for the user terminal with enough computing power. This paper proposes a gatekeeper to enable the real IP addresses of IoTs inside the same subnetwork to be not explicitly addressable and visible from outside of the gatekeeper. Each IoT device publishes its virtual IP address via the Registrar Server or Domain Name System (DNS) with which the gatekeeper shares the address mapping information. While the gatekeeper maintains the mapping information for the local IoT devices, the registration server or DNS has global address mapping information so that any peer can reach the mapping information. All incoming and outgoing packets must pass through the gatekeeper responsible for the address conversion and security checks for them from the entrance. This paper aims to apply our gatekeeper system to a platform of self-driving cars that allows surrounding IoT cameras and autonomous vehicles to communicate with each other securely, safely, and rapidly. So, this paper finally analyzes improvement effects on latency to show that our gatekeeper system guarantees the latency goal of 20 ms under the environment of 5G links.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Tran, Duc Trong. „Exploiting a drainage database via internet“. Science and Technology Development Journal 19, Nr. 2 (30.06.2016): 67–74. http://dx.doi.org/10.32508/stdj.v19i2.669.

Der volle Inhalt der Quelle
Annotation:
To manage the HCMC drainage system, the city’s Urban Drainage Company has been developing a desktop GIS based on ArcGIS software, ESRI. In this system, drainage database is organized into Geodatabase model and is stored in a server placed at the company headquarter. The company’s satellite offices can get access to the server’s database through a virtual private network. With this arrangement, investment cost will increase rapidly if the company is going to equip GIS software to workstation of every related staff. To avoid this investment burden problem, a WebGIS system has been developed based on ASP.NET framework of Microsoft, as well as the open source products Geoserver, and OpenLayers. With this webGIS, the company staff can access to drainage database from everywhere through the Internet by using just a normal web browser making requests for data through a standard web page. They can also carry out several basic GIS functions, such as viewing, querying, and doing statistics and making graph. The system has been tested and proved to work effectively enabling the company staff to cost-effectively exploit its drainage Geodatabase through the internet.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Zain ul Abideen, Muhammad, Shahzad Saleem und Madiha Ejaz. „VPN Traffic Detection in SSL-Protected Channel“. Security and Communication Networks 2019 (29.10.2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Der volle Inhalt der Quelle
Annotation:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection system (NIDS) and firewalls generally have no feature to inspect HTTPS or encrypted traffic, so they rely on unencrypted traffic to manage the encrypted payload of the network. Recent and powerful next-generation firewalls have Secure Sockets Layer (SSL) inspection feature which are expensive and may not be suitable for every organizations. A virtual private network (VPN) is a service which hides real traffic by creating SSL-protected channel between the user and server. Every Internet activity is then performed under the established SSL tunnel. The user inside the network with malicious intent or to hide his activity from the network security administration of the organization may use VPN services. Any VPN service may be used by users to bypass the filters or signatures applied on network security devices. These services may be the source of new virus or worm injected inside the network or a gateway to facilitate information leakage. In this paper, we have proposed a novel approach to detect VPN activity inside the network. The proposed system analyzes the communication between user and the server to analyze and extract features from network, transport, and application layer which are not encrypted and classify the incoming traffic as malicious, i.e., VPN traffic or standard traffic. Network traffic is analyzed and classified using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic. Once traffic is classified, the connection based on the server’s IP, TCP port connected, domain name, and server name inside the HTTPS connection is analyzed. This helps in verifying legitimate connection and flags the VPN-based traffic. We worked on top five freely available VPN services and analyzed their traffic patterns; the results show successful detection of the VPN activity performed by the user. We analyzed the activity of five users, using some sort of VPN service in their Internet activity, inside the network. Out of total 729 connections made by different users, 329 connections were classified as legitimate activity, marking 400 remaining connections as VPN-based connections. The proposed system is lightweight enough to keep minimal overhead, both in network and resource utilization and requires no specialized hardware.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Xiong, Yong-Hua, Shao-Yun Wan, Yong He und Dan Su. „Design and Implementation of a Prototype Cloud Video Surveillance System“. Journal of Advanced Computational Intelligence and Intelligent Informatics 18, Nr. 1 (20.01.2014): 40–47. http://dx.doi.org/10.20965/jaciii.2014.p0040.

Der volle Inhalt der Quelle
Annotation:
Cloud-based video surveillance systems, as a new cloud computing service model, are an emerging research topic, both at home and abroad. Current research is mainly focused on exploring applications of the system. This paper proposes a design and implementation method for cloud-based video surveillance systems using the characteristics of cloud computing, such as parallel computing, large storage space, and easy expandability. The system architecture and function modules are built, and a prototype cloud-based video surveillance system is established in a campus network using key technologies, including virtual machine task access control, video-data distributed storage, and database-active communicationmethods. Using the system, the user is able to place a webcam in a location that requires monitoring so that video surveillance can be achieved, and video data can be viewed through a browser. The system has the following advantages: low investment and maintenance cost, high portability, easily extendable, superior data security, and excellent sharing. As a private cloud server in the campus network, the system is able to not only provide convenient video surveillance services, but it can also be an excellent practical experimental platform for cloud computing-related research, which carries outstanding application value.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Bhandari, Rupesh, und Kirubanand V B. „Enhanced encryption technique for secure iot data transmission“. International Journal of Electrical and Computer Engineering (IJECE) 9, Nr. 5 (01.10.2019): 3732. http://dx.doi.org/10.11591/ijece.v9i5.pp3732-3738.

Der volle Inhalt der Quelle
Annotation:
<div class="page" title="Page 1"><div class="section"><div class="layoutArea"><div class="column"><p><span>Internet of things is the latest booming innovation in the current period, which lets the physical entity to process and intervene with the virtual entities. As all the entities are connected with each other, it generates load of data, which lacks proper security and privacy standards. Cryptography is one of the domains of Network Security, which is one such mechanism that helps the data transmission process to be secure enough over the wireless or wired channel and along with that, it provides authenticity, confidentiality, integrity of data and prevents repudiation. In this paper, we have proposed an alternate enhanced cryptographic solution combing the characteristic of symmetric, asymmetric encryption algorithms and Public Key Server. Here, the key pairs of end points (User’s Device and IoT device) are generated using Elliptic Curve Cryptography and the respective public keys are registered in Public Key Server along with their unique MAC address. Thereafter, both the ends will agree on one common private secret key, which will be the base for further cryptographic process using AES algorithm. This model can be called as multi-phase protection mechanism. It will make the process of data transmission secure enough that no intermediate can tamper the data.</span></p></div></div></div></div>
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie