VPN VIRTUAL PRIVATE NETWORK APPLICATIONS IN DATA PREDICTION

Authors

  • Dorjan Zela University College of Business , Faculty of Engineering and Computer Science Author
  • Besjana Mema Mediterranean University of Albania, Fakulty of Informatic Author
  • Katerina Zela Mediterranean University of Albania, Fakulty of Informatic Author

Keywords:

Virtual Private Network, Authentication, Security, Privacy, OpenVPN, Mikrotik, Analytics

Abstract

The evolution and age of the latest programs and services, along with the expansion of encrypted communications, make it difficult for site visitors within a security enterprise. Virtual private networks (VPNs) are one example of an encrypted communications provider that is becoming popular as a way to bypass censorship in addition to gaining access to geo-blocked offerings. This paper examines the presentation of an IP security, VPN. The Cisco Packet Line Platform is used for simulation, evaluation, and verification. It uses a virtual connection to carry data packets from a non-public network to remote locations.

Network data transmission used on an unsecured public Internet network so that you can access the network from cross-purposes and search for data traffic. One solution that can be done is with Virtual Private Network techniques using OpenVPN on learning networks. The results of the implementation of the Virtual Private Network using OpenVPN are that the effort gives a positive result, this is proven by sniffing the data that cannot detect the username and password sent. Quality of Service measurement results showed a decrease in network quality with latency parameters increasing from 51.4 ms to

463.4 ms, packet loss increased from 7.8% to 20.2%, throughput decreased from 82.8% to 71.6%, and bandwidth decreased from 64786 to 6.6 bits. 55589 bit/s, is due to the time-consuming encryption and encapsulation process. A virtual private network (VPN) can be defined as a way to provide secure communication between members of a group through the use of public telecommunications infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. There are many different VPN solutions out there, and simply deciding which one to choose can be difficult as they all have advantages and disadvantages. VPNs can be categorized as secure or trusted VPNs, client-based or web-based VPNs, client-side or provider-based VPNs, or outsourced or in-house VPNs. These categories often overlap with each other. To decide which VPN solutions to choose for different parts of the enterprise infrastructure, the chosen solution should be the one that best meets the requirements of the enterprise.

Downloads

Published

2024-12-20

Issue

Section

Articles