scholarly journals RANCANG BANGUN FILE TRANSFER PROTOCOL (FTP) DENGAN PENGAMANAN OPEN SSL PADA JARINGAN VPN MIKROTIK DI SMK DWIWARNA

2018 ◽  
Vol 3 (1) ◽  
pp. 45
Author(s):  
Devi Ruwaida ◽  
Dian Kurnia

File Transfer Protocol (FTP) server merupakan jenis sistem yang menghubungkan hak pengakses (client) dan penyedia (server) dalam melakukan pertukaran data yang melewati port 21, yang semula ftp server berjalan pada protocol yang tidak terlindungi di dalam port 21, kemudian dengan OpenSSL ini di amankan agar data dapat sampai ke tujuan. Pada penelitian ini akan dibangun Rancang Bangun File Transfer Protocol (Ftp) Dengan Pengamanan Open Ssl Pada Jaringan Vpn Mikrotik Di Smk Dwiwarna  yang akan di konfigurasi pada debian 9.1 dengan  di tambahnya pengaman sertifikat ssl , dengan harapan  melindungi proses dalam pengiriman data dapat dengan aman dan ditambahkannya sistem VPN PPTP pada mikrotik akan lebih memberikan keamanan yang lebih baik lagi, dimana pemanfaatan Point-to-Point Tunneling Protocol (PPTP) suatu protokol jaringan yang bisa memungkinkan client dalam pengiriman data secara aman melalui remote client kepada server sekolah dibangunnya suatu virtual private network (VPN).

Author(s):  
S. Phani Praveen ◽  
T. Bala Murali Krishna ◽  
Sunil K. Chawla ◽  
CH Anuradha

Background: Every organization generally uses a VPN service individually to leather the actual communication. Such communication is actually not allowed by organization monitoring network. But these institutes are not in a position to spend huge amount of funds on secure sockets layer to monitor traffic over their computer networks. Objective: Our work suggests simple technique to block or detect annoying VPN clients inside the network activities. This method does not requires the network to decrypt or even decode any network communication. Method: The proposed solution selects two machine learning techniques Feature Tree and K-means as classifiction techniques which work on time related features. First, the DNS mapping with the ordinary characteristic of the transmission control protocol / internet protocol computer network stack is identified and it is not to be considered as a normal traiffic flow if the domain name information is not available. The process also examines non-standard utilization of hyper text transfer protocol security and also conceal such communication from hyper text transfer protocol security dependent filters in firewall to detect as anomaly in largely. Results: we define the trafic flow as normal trafic flow and VPN traffic flow. These two flows are characterized by taking two machine learning techniques Feature Tree and K-means. We have executed each experment 4 times. As a result, eight types of regular traffics and eight types of VPN traffics were represented. Conclusion: Once trafic flow is identified, it is classified and studied by machine learning techniques. Using time related features, the traffic flow is defined as normal flow or VPN traffic flow.


2020 ◽  
Vol 14 ◽  
pp. 01-08
Author(s):  
Anuntachai Machim ◽  
Murray John Lawn ◽  
Ikuo Yamamoto

Internet usage has become an essential part of our daily lives, it has become universal. The aim of this research is to consider existing Internet-based networks with regard to their support for the remote operation of robotic technology, in particular, looking at transmission speed and delay time as it relates to teleoperation. Currently dedicated connections are typically used when a high Quality of Service (QoS) is required for mission critical services or safety-critical systems (SCS), however such connections are very expensive to set up and maintain. Therefore, this study focuses on modifying existing internet networks in a manner to provide a better QoS with little additional cost. Using a number of microcontrollers, computers, and routers, two different protocols were used to control a robotic device remotely. Use of the Point-to-Point Tunnelling Protocol (PPTP) used for implementing a Virtual Private Network (VPN) was found to provide higher average transmission speeds compared to the using a Uniform Resource Locator (URL) which is a regular internet connection.


Author(s):  
Mohammad Subekti ◽  
Anthoni Tandiono ◽  
Fenky Tania ◽  
Hendro Wibowo A.

The purpose of this study is to develop an e-commerce that can distribute any information about the products of PD Cross Tech. The e-commerce is supported by dynamic DBMS and can be connected via database reseller server so that it can do information sharing. The distribution is performed using the Distributed Relational Database Management System (DRDBMS), supported by the File Transfer Protocol and Virtual Private Network. In other words the e-Commerce supports multiplatform database. Research methodologies used are analytical methods, design methods, and literature study. Results showed that PD Cross Tech needs a new e-Commerce that supports multiplatform database. With this e-Commerce, it is expected that similar computer equipment needs for many organization in Indonesia can be designed in the same way.


2014 ◽  
Vol 15 (5) ◽  
pp. 3086-3092 ◽  
Author(s):  
Jae-Won Ahn ◽  
Beom-Jin Choi ◽  
Sung-Jin Ok ◽  
Jung-Ha Kang ◽  
Jae-Young Kim ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document