• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 48
  • 30
  • 17
  • 5
  • 5
  • 5
  • 5
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 129
  • 50
  • 30
  • 28
  • 24
  • 23
  • 22
  • 22
  • 22
  • 21
  • 20
  • 18
  • 16
  • 14
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Evaluation of WireGuard and OpenVPN VPN solutions

Sabbagh, Mohammed, Anbarje, Ahmad January 2020 (has links)
This project evaluates two types of VPN solutions–WireGuard and OpenVPN.The evaluation is done by four different experiments to measure the maximum throughputof each of the VPN solutions, and a theoretical study on the encryption techniquesthat each VPN solution use. Experiments were conducted using a network performancemeasurement tool called IPerf. By applying static parameters that control themeasurements, such as transferring regular and zip file types, measuring throughputwhen the compression is enabled on the VPN channel and when it is disabled, also,applying measurements with the conditions of the same parameters but with differentoperating systems when using both VPN solutions.one of the measurement results shows that the throughput is about 93 Mbps forWireGuard comparing it with 56 Mbps and 59Mbps for OpenVPN when sendingregular and compressed files respectively.In conclusion, throughput can vary slightly depending on the measurement tooland the version of the software used. Also, the buffer of the measurement tool hasan important role when measuring the throughput, it gives different throughput andpacket loss results which depends on the size of that buffer. Moreover, According to atheoretical study, throughput can also vary depending on the speed of the encryptionalgorithm used. Both VPN solutions use many encryption algorithms, such as AESin OpenVPN, while WireGuard uses ChaCha20 with Poly1305.
82

Dataskydd och dark patterns : En studie om hur VPN-tjänster hanterar personuppgifter / Data protection and dark patterns : A study of how VPN services handle personal data

Dao, Xi Hoa January 2022 (has links)
Dark patterns is a term used to describe the way companies deceive users by design to give away as much personal data as possible, in order to benefit themselves. Previous studies have shown that the presence of dark patterns is very common on websites as well as in mobile applications. As the web and broadband companies collect a lot of data from web users, virtual private network (VPN) software has become commonly used to protect online users’ privacy. No previous studies have examined VPN services in this context. This report therefore examines VPN providers’ software and websites through content analysis, to determine if dark patterns are present in their user interfaces and information presented to the users and if so, in what way dark patterns are present. The result of this study shows that dark patterns were present on all VPN providers’ websites that were examined and one of the websites made it particularly difficult to delete user accounts and their related data. It is questionable whether all personal data gets removed after an account deletion request has been made by the user, since users have to give away more personal data in exchange to submit the deletion request, thus making personal data a tradeoff.
83

A Cross-Platform Always On VPN Solution for Ensuring Online Security

Thiede, Adam, Samen, Josef January 2023 (has links)
This thesis examines the implementation of an Always On VPN solution for Windows 10 and macOS, focusing on the configuration of a Palo Alto Firewall to enable their GlobalProtect VPN as Always On. This means that the VPN solution is enabled on a device at all times. The primary objective of this thesis is to present a solution, where the GlobalProtect VPN is configured to be Always On for both Windows 10 and macOS devices. Furthermore, the objective is to evaluate the performance impact of the VPN solution on network throughput, packet loss, and jitter. The study compares performance in both AES 128-bit GCM and AES 256-bit GCM encryption modes, as well as performance without the VPN, to determine its potential impact on employee workflow. The employee workflow consists of file uploads of varying sizes across a single stream as well as multiple streams. Here, our study finds that performance is reduced with the VPN solution active and can limit upload speeds by up to 45% depending on the tested scenario. Jitter and packet loss can also increase by more than 50% for jitter and roughly 10% for packet loss. It is worth noting that the practical differences such as time lost through lower network throughput when enabling the VPN solution or added jitter and packet loss is till very low for the majoirty of the scenarios tested in this thesis.  Additionally, the thesis analyzes the functional and performance differences between Windows 10 and macOS when utilizing the VPN solution. Performance wise, the loss is similar between Windows 10 and macOS in certain scenarios but can differ in others. The thesis also highlights a significant limitation of the GlobalProtect VPN, specifically concerning its ability to enforce an Always On VPN experience on macOS devices. Unlike Windows 10, macOS users can still uninstall the VPN agent, posing challenges in ensuring continuous VPN connectivity. The thesis proposes removing administrative rights from macOS users as an optimal solution to prevent agent uninstallation and to maintain an Always On VPN experience with Palo Alto's GlobalProtect VPN.
84

Implementación de un servicio de red GNU/Linux para mejorar la gestión de acceso a los servicios de red e internet para las agencias en las zonas rurales en la empresa Edpyme Alternativa

Pérez Tesén, Daniel Rodolfo January 2020 (has links)
El presente trabajo de investigación tiene como objetivo principal mejorar la gestión y optimizar los recursos de red e internet para las zonas semi rurales y rurales de la empresa Edpyme Alternativa, entidad financiera dedicada a prestar servicios y productos micro financieros para la pequeña y micro Empresa, usando para ello infraestructura tecnológica y herramientas GNU/LINUX, para mantener la continuidad operativa y que está al alcance de las necesidades de la empresa La estrategia de Edpyme Alternativa, para los siguientes tres años reposa sobre tres pilares fundamentales: crecimiento rural y consolidación urbana, fortalecimientos de procesos y sistemas de control y fortalecimiento del equipo de trabajo. Teniendo en cuenta estas estrategias es que Edpyme alternativa en su afán de expandir nuevos mercados financieros en las zonas rurales y con ello apoyar con la formalización y desarrollo de micro empresas, expande su nicho de mercado hacia estas zonas donde los proveedores grandes de servicios de internet local como Claro, Bitel y Telefónica del Perú, no cuentan con una infraestructura como del tipo de redes tipo MPLS o privadas y solo cuentan con acceso a Internet público. Estas sedes se vuelven vulnerables ante la amenaza de los piratas informáticos que utilizan diferentes métodos de sabotaje para intentar encontrar equipos desprotegidos. La implementación de este servicio de red, se realizó en base a los indicadores de crecimiento y disponibilidad de los servicios informáticos que tiene Edpyme alternativa, por el cual se realizó la recolección de datos con el propósito de conocer el proceso de otorgamiento de créditos y cuáles eran sus limitaciones y situación problemática que afrontaba en estas zonas semi rurales y rurales. El trabajo de investigación permitió demostrar que la variable crecimiento de cartera y costos operativos calculados por mes se puede mejorar implementando el servicio de red GNU/LINUX para mantener la continuidad operativa y ayudar a alcanzar las metas y objetivos de Edpyme Alternativa.
85

VPN is the new black - En studie kring unga svenskars attityder kring illegala former av legal streaming

Nordling, Paulina January 2016 (has links)
Studien har undersökt vilka attityder unga svenskar i åldern 16-29 har kring olika former avstreaming. Studien har också undersökt vilka attityder de unga svenskarna har kring illegalaformer av legal streaming samt om dessa attityder överensstämmer eller inte med attityder kring övriga streamingformer. Studien ämnar komplettera tidigare studier som inte tidigare undersökt unga svenskars attityder kring illegala former av legal streaming.Studien genomfördes med både kvalitativ och kvantitativ metod. För att samla in det empiriska materialet genomfördes en webbenkät med 82 respondenter och en intervju med en fokusgrupp bestående av fyra personer. Utöver detta har det också genomförts en innehållsanalys av två internetforum.Det resultat som de empiriska undersökningarna resulterade i överensstämde till stor del med tidigare studier. Attityderna som fanns kring de olika formerna av streaming överensstämde till stor del även de. Signifikanta faktorer som påverkade dessa attityder var bland annat viljan att se en stor mängd film samt ny film. Den ekonomiska aspekten var inte alltid den mest drivande faktorn. Vidare ansåg respondenter att streamingtjänsters utbud inte bör begränsas geografiskt.Slutsatsen var att attityderna kring de olika formerna av streaming till stor del stämde överensmed attityder som påvisats i tidigare studier. Attityderna som påträffades i studiens empiriöverensstämmer oavsett hur användaren streamar. Vidare vittnade respondenterna om attavstängande från legala streamingtjänster om de geografiska begränsningarna kringgicks kunde leda till ett ökat användande av illegala streamingtjänster. / The study has examined the attitudes of young Swedes in the ages 16-29 have on various forms of streaming. The study has also examined the young Swedes attitudes towards illegal forms of legal streaming and circumventing geographic limits. The goal was to see if these attitudes were consistent or not with the attitudes about other forms of streaming. The study had the purpose to complement previous studies with the attitudes about illegal forms of legal streaming since this have not been examined before.The study was conducted by using both quantitative and qualitative methods. In order to collect the empirical result the study used a web survey respond2ent by 82 respondents and an interview with a focus group concluding four respondents. In addition to this, a content analysis of two Internet forums has been done.The empirical inquest resulted in similar results as previous studies. The attitudes that werefound in this empirical study were also consistent within the different forms of streaming. Therespondents testified that a factor they had that affected the attitudes was a will to see a largeamount of movies. The economical aspect was not one of the biggest factors that affected the attitudes. The respondents did not though that the amount of movies they offered to the users should be limited geographically.The conclusion was that the attitudes of the various forms of streaming were largely consistent with the attitudes demonstrated in previous studies. Attitudes found in the study's empirical evidence were consistent regardless whichever way as the user streams. Furthermore, respondents testified that seclusion from the legal streaming services if the users were circumventing the geographic limits might lead towards an increased use of illegal streaming services.
86

Analyzing the Impact of Cloud Infrastructure on VPN Performance: A Comparison of Microsoft Azure and Amazon Web Services

Wallin, Filip, Putrus, Marwin January 2024 (has links)
In recent years, the interest and utilization of VPNs and cloud computing have surged, which has led to the development of Cloud VPNs. Cloud VPNs are often used to give employers access to company resources over a secured and trusted network, but individuals can also use them. Cloud computing offers numerous advantages, including cost efficiency, scalability, security, and reliability. Companies and individuals widely use it to streamline operations, reduce expenditures, and leverage technologies without the need to maintain on-premise infrastructure. Cloud-based solutions impose specific requirements on technologies designed to operate in the cloud, which include security, efficient resource management, and high network availability and performance. In this thesis, we will analyze and evaluate the network performance impact that Amazon Web Services (AWS) and Microsoft Azure, two of the market-leading cloud platforms, have on the VPN services OpenVPN and WireGuard while considering associated operational costs and user complexity. The network performance impact is evaluated through measuring the throughput, latency, jitter, and packet loss. We have performed experiments divided into three setups, each simulating different traffic patterns, and VPN usage scenarios. Throughout these experiments, we observed and documented the user complexity related to setup, installation, and configuration processes. Our findings indicate that Azure has the best overall network throughput across all setups, fewer retransmissions, and fewer packet losses. Conversely, AWS exhibits lower latency and jitter. Additionally, our assessment of operational costs and user complexity reveals that Azure offers lower associated costs but a higher user complexity. Furthermore, our experiments identified that WireGuard, when paired with Azure, offers the best VPN solution.
87

IPsec Intrusion Detection Analysis : Using data from an Ericsson Ethernet Interface Board

Amso, Julian, Faienza, Achille January 2008 (has links)
IP security (IPsec) is commonly used for protection in Virtual Private Networks (VPN). It is also used for the protection of traffic between nodes in third generation (3G) mobile networks. The main duty of telecommunication operators is to assure the quality of service and availability of the network for their users. Therefore knowledge of threats that could affect these requirements is of relevance. Denial of Service (DoS) and other attacks could constitute serious threats in 3G networks and, if successful, they could lead to financial and reputation damage for the telecommunication operator. One of the goals of each telecommunications vendor is to produce equipment and software in such a way as to reduce the risk of successful attacks upon networks built using their equipment and software. This master’s thesis aims to identify the classes of attacks that could affect the regular operation of an IPsec-protected network. Therefore, the IPsec protocol and its possible weaknesses are explained. As practical demonstration of these ideas, an Intrusion Detection Analyzer prototype for an Ericsson Ethernet Interface board was developed to detect anomalous IPsec-protected traffic. / IP Security (IPsec) protokollet används bl.a. för att skydda Virtuellt Privat Nätverk (VPN). Protokollet används även för att skydda noderna i tredje generationens (3G) mobila nätverk. Telekomoperatöreranas uppgift går bl.a. ut på att se till att de mobila näten är tillgängliga för användarna samt garanterna en viss garanterad tjänstekvalitet. Därför är kunskapen om de olika hoten som påverkar dessa faktorer relevant. Överbelastningsattacker och andra attacker kan utgöra ett stort hot mot bl.a. 3G nät. Om dessa attacker lyckas kan de leda till finansiella skador och ett skadat anseende för telekomoperatörerna. Ett av målen för telekomtillverkarna är att tillverka produkter och program som kan minimera riskerna för en attack och skadorna som åstadkoms på ett nätverk uppbyggt med deras utrustning. Detta examensarbete har som mål att identifiera de olika typer av attacker som kan påverka driften av IPsec-skyddade nätverk. IPsecprotokollet och dess svagheter är förklarade. Svagheter och problem med vissa implementationer nämns också. I detta arbete ingår också att utveckla en Intrusion Detection Analyzer prototyp för ett Ericssons Ethernet Gränssnitt kort för att upptäcka avvikande IPsecskyddad trafik
88

Corporate Wireless IP Telephony

García Hijes, Raúl January 2005 (has links)
IP telephony is defined as the transport of telephony calls over an IP network. IP telephony exploits the integration of voice and data networks. However, enterprises are still reluctant to deploy IP telephony despite the potential increase in productivity and reduction of costs. The principal concerns are: can IP telephony provide the same level of performance in terms of security, reliability, and scalability as traditional telephony? If so, are its proclaimed benefits such as flexibility and mobility cost-effective? The aim of this thesis is to analyze how to deploy IP telephony in large corporations - while providing the necessary security and facilitating mobility. Through the different parts of this thesis, we will analyze the applicable technologies, along with their integration and management. We will focus on the essential requirements for an enterprise of scalability, reliability, flexibility, high-availability, and cost-effectiveness. The massive changes brought about due to the deregulation of telecommunications in nearly all countries, the increasingly global nature of business, and the progressively affordable and power technology underlying information and communication technologies have lead to increasing adoption of IP telephony by residential and commercial users. This thesis will examine these technologies in the context of a very large distributed corporation. / IP telefoni är definierat som transporten av telefon samtal genom ett IP nätverk. IP telefoni utnyttjar integrationen av tal och data nätverk. Dock är affärsföretag fortfarande motsträviga till att införa IP telefoni trots potentiell ökning i produktivitet och minskade kostnader. Huvud bekymren är: kan IP telefoni tillhandahålla samma nivå av prestanda med avseende på säkerhet, tillförlitlighet, och skalbarhet som traditionell telefoni? Och i så fall, är dom proklamerade fördelarna flexibilitet och rörlighet kostnadseffektiva? Målet för detta examensarbete är att analysera hur IP telefoni kan införas i stora affärsföretag - medan samtidigt tillhandahålla nödvändig säkerhet och främja rörlighet. Genom olika delar av detta examensarbete, analyserar vi tillämpliga teknologier, inklusive deras integrering och skötsel. Vi kommer att fokusera på de grundläggande kraven för ett affärsföretag gällande skalbarhet, tillförlitlighet, flexibilitet, hög tillgänglighet, och kostnadseffektivitet. Dom massiva förändringarna frambringade i och med avregleringen av telekommunikation i stort sett alla länder, affärsverksamhetens alltmer globala natur, och de progressivt kostnadseffektiva och kraftfulla underliggande teknologier bakom informations och kommunikations system har lett till ökande adoptering av IP telefoni av både privata och kommersiella användare. Detta examensarbete undersöker relevanta teknologier i samband med mycket stora utbredda affärsföretag. / <p>Exchange student from Centro Politecnico Superior (University of Zaragoza, Spain).</p>
89

Kommunikationslösningar i molnet : Examensarbete angående olika nätverkslösningar i WAN

Andersson, Tobias, Hedlund, Victor January 2015 (has links)
Att koppla samman nätverk över geografiskt olika platser har blivit allt vanligare i dagens samhälle. Rapporten kommer belysa olika WAN-lösningar för att göra detta möjligt. De olika lösningar som kommer belysas i denna rapport är att hyra egen fiber, lager2-länk, MPLS och även VPN. Det kommer göras jämförelser mellan dessa lösningar när det gäller kostnad, säkerhet, hastighet och tillförlitlighet. Detta har gjorts med vetenskapliga artiklar och intervjuer men rapporten innefattar även en praktisk tillämpling i form av ett experiment. / To connect networks across geographically diverse sites has become increasingly common in todays society. This report will highlight the various WAN solutions to make this possible. The different solutions that will be highlighted in this report is rent own fiber , Layer 2 link, MPLS , and VPN. There will be comparisons between these solutions in terms of cost, safety , speed and reliability. This has been done with scientific articles and interviews , but the report also includes a practical laboration.
90

Utvärdering av nätverkssäkerheten på J Bil AB / Evaluation of the network security at J Bil AB

Ahmed, Olfet, Saman, Nawar January 2013 (has links)
Detta examensarbete är en utvärdering av nätverkssäkerheten hos J BiL AB, både på social och teknisk nivå. Företaget är beroende av säkra Internet-anslutningar för att nå externa tjänster och interna servrar lokaliserade på olika geografiska platser. Företaget har ingen IT-ansvarig som aktivt underhåller och övervakar nätverket, utan konsulterar ett externt dataföretag. Syftet med examensarbetet är att utvärdera säkerheten, upptäcka brister, ge förbättringsförslag och till viss del implementera lösningar. För att undersöka säkerheten har observationer och intervjuer med personalen gjorts och ett flertal attacker mot nätverket har utförts. Utifrån den data som samlats in kunde slutsatsen dras att företaget har brister vad gäller IT-säkerheten. Framförallt den sociala säkerheten visade sig ha stora luckor vilket till stor del beror på att de anställda varken har blivit utbildade eller fått någon information om hur de ska hantera lösenord, datorer och IT-frågor i allmänt. Förbättringsförslag har getts och viss implementation har genomförts för att eliminera bristerna. De anställda har även med hjälp av en IT-policy och föreläsning blivit utbildade i hur de ska agera och tänka kring IT-relaterade säkerhetsfrågor. / The aim of this project is to evaluate the network security at J Bil AB. The focus will be on both social and technical issues. For the employees to be able to con-nect to remote servers and external services and perform their daily work tasks, secure connections is needed. J Bil Ab has no IT manager who actively maintains and monitors the network; rather they consult a computer company when changes and implementations are required. The projects’ goal is to identify gaps, come up with suggestions for improvement and to some extent implement so-lutions. To do this, an observation of the employees hav been made, an inter-view have been held, and several attacks on the network have been performed. Based on the data collected, it was concluded that the company has shortcom-ings in IT security. Above all, the social security appeared to have major gaps in it and that is mainly because the lack of knowledge among the employees and they have never been informed of how to manage their passwords, computers and IT issues in general. Suggestions for improvement have been given and some implementations have been performed to eliminate the deficiencies.

Page generated in 0.0697 seconds