Pengamatan IP Cycling Pada VPN Menggunakan GRC Fingerprints dan DNSLeakTest

R. Agastya Ardhitaputera Ramadhan(1*), Justinus Andjarwirawan(2), Agustinus Noertjahyana(3),


(1) Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya
(2) Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya
(3) Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya
(*) Corresponding Author

Abstract


As information technology has evolved within the modern era, the needs of information rises along with it. Where every individual need information quickly and accurately, a supporting medium must support it. One of these medium is fast internet. Many are paranoid towards the idea of the government stealing their private information and using it for what they see fit. The objective of this research is to determine whether or not the stability of said VPN is of acceptable levels. The data will be taken hour-by-hour for 30(thirty) days from www.dnsleaktest.com and www.grc.com/fingerprints.htm. The results will then be forwarded to the Google Sheets website that has been programmed to receive the IP, Hostname, ISP and Country tags from the source code from said page. Commercial VPNs are private networks that allow its users to appear to be connecting from another network. This is however not without risk, for those services may not be safe. In this experiment, we have concluded that some VPNs are unstable when used at certain times.

Keywords


IP; VPN; GRC Fingerprints; DNSLeaktest; Keamanan VPN; Certificate

Full Text:

PDF

References


Agustinus Raharjo, Hendry, Ramos Somya. "Perancangan

dan Implementasi File Sharing Extension Pada Browser

Google Chrome." Artikel Ilmiah (2012).

backup_8a418a1e6ea10f17. Apa dan Bagaimana A Man In

The Middle Attack? 6 Maret 2015. 21 September 2021.

CyberGhost SA Dionisie. VPN by CyberGhost - Fast &

Secure WiFi Protection. Bucharest, Romania, 13 September

CyberGhostVPN. CyberGhost. Bucharest, Romania, 2011.

Dedi Irawan, Fatoni. "Penerapan IP Security pada Jaringan

VPN Site to Site di PT. Pertamina Ubeb Adera Pengabuan."

(n.d.).

fathurhoho. Optimalkan Google Chrome dengan Extension. 4

April 2016. 21 September 2021.

Galang. Fungsi, Cara Kerja dan Apakah VPN. 2021. 21

September 2021.

Herru Hardiyansah, S.Kom. Keamanan Komputer dan

Jaringan. 7 Desember 2017. 21 September 2021.

IRAWAN AFRIANTO, EKO BUDI SETIAWAN. "Kajian

virtual private network (vpn) sebagai sistem pengamanan

data pada jaringan komputer (studi kasus jaringan komputer

unikom)." Majalah Ilmiah UNIKOM (2015): 44-45.

Kadek Jeny Femila Devi, I Ketut Resika Arthana, I Gede

Mahendra Darmawiguna. "Pengembangan Distribusi Luxpati

Berbasis Ubuntu Sebagai Penunjang Proses Belajar Mengajar

di Jurusan Pendidikan Teknik Informatika." Jurnal Nasional

Pendidikan Teknik Informatika (JANAPATI) (2015): 2087-

Khan, Mohammad Taha, et al. "An empirical analysis of the

commercial vpn ecosystem." Proceedings of the Internet

Measurement Conference 2018. 2018.

Kompas.com. Sistem Operasi Komputer: Pengertian, Fungsi,

Jenis, Cara Kerja, dan Contohnya. 15 April 2021. 21

September 2021.

Listyorini, Tri. "NETWORKING OPERATING SYSTEM

(NOS) BERBASIS SIMULASI." Jurnal SIMETRIS, Vol. 9

(2018): 2252-4983.

Maharani, Fitri Latifah. "Penerapan Teknologi Virtual

Private Network." Indonesian Journal on Networking and

Security - Volume 7 No 2 (2017): 2354-6654.

Nurul Hidayah. "Nurul Hidayah, Sulfahmi, Iani Zairani,

Marwah Yusuf, Sufiati." COMBINE ASSURANCE

DALAM KONTEKS PENGENDALIAN (2019): 32-37.

Senarath, A. and Arachchilage, N.A.G. Why Developers

Cannot Embed Privacy into Software Systems? Conference

on Evaluation and Assessment in Software Engineering -

EASE, ACM (2018), 211–216.


Refbacks

  • There are currently no refbacks.


Jurnal telah terindeks oleh :