Pengamatan IP Cycling Pada VPN Menggunakan GRC Fingerprints dan DNSLeakTest
Keywords:
DMAIC, 5why, stopwatch time study, non value added, waste.Abstract
As information technology has evolved within the modern era, the needs of information rises along with it. Where every individual need information quickly and accurately, a supporting medium must support it. One of these medium is fast internet. Many are paranoid towards the idea of the government stealing their private information and using it for what they see fit. The objective of this research is to determine whether or not the stability of said VPN is of acceptable levels. The data will be taken hour-by-hour for 30(thirty) days from www.dnsleaktest.com and www.grc.com/fingerprints.htm. The results will then be forwarded to the Google Sheets website that has been programmed to receive the IP, Hostname, ISP and Country tags from the source code from said page. Commercial VPNs are private networks that allow its users to appear to be connecting from another network. This is however not without risk, for those services may not be safe. In this experiment, we have concluded that some VPNs are unstable when used at certain times.References
[1] Agustinus Raharjo, Hendry, Ramos Somya. "Perancangan
dan Implementasi File Sharing Extension Pada Browser
Google Chrome." Artikel Ilmiah (2012).
[2] backup_8a418a1e6ea10f17. Apa dan Bagaimana A Man In
The Middle Attack? 6 Maret 2015. 21 September 2021.
[3] CyberGhost SA Dionisie. VPN by CyberGhost - Fast &
Secure WiFi Protection. Bucharest, Romania, 13 September
2021.
[4] CyberGhostVPN. CyberGhost. Bucharest, Romania, 2011.
[5] Dedi Irawan, Fatoni. "Penerapan IP Security pada Jaringan
VPN Site to Site di PT. Pertamina Ubeb Adera Pengabuan."
(n.d.).
[6] fathurhoho. Optimalkan Google Chrome dengan Extension. 4
April 2016. 21 September 2021.
[7] Galang. Fungsi, Cara Kerja dan Apakah VPN. 2021. 21
September 2021.
[8] Herru Hardiyansah, S.Kom. Keamanan Komputer dan
Jaringan. 7 Desember 2017. 21 September 2021.
[9] IRAWAN AFRIANTO, EKO BUDI SETIAWAN. "Kajian
virtual private network (vpn) sebagai sistem pengamanan
data pada jaringan komputer (studi kasus jaringan komputer
unikom)." Majalah Ilmiah UNIKOM (2015): 44-45.
[10] Kadek Jeny Femila Devi, I Ketut Resika Arthana, I Gede
Mahendra Darmawiguna. "Pengembangan Distribusi Luxpati
Berbasis Ubuntu Sebagai Penunjang Proses Belajar Mengajar
di Jurusan Pendidikan Teknik Informatika." Jurnal Nasional
Pendidikan Teknik Informatika (JANAPATI) (2015): 2087-
2658.
[11] Khan, Mohammad Taha, et al. "An empirical analysis of the
commercial vpn ecosystem." Proceedings of the Internet
Measurement Conference 2018. 2018.
[12] Kompas.com. Sistem Operasi Komputer: Pengertian, Fungsi,
Jenis, Cara Kerja, dan Contohnya. 15 April 2021. 21
September 2021.
[13] Listyorini, Tri. "NETWORKING OPERATING SYSTEM
(NOS) BERBASIS SIMULASI." Jurnal SIMETRIS, Vol. 9
(2018): 2252-4983.
[14] Maharani, Fitri Latifah. "Penerapan Teknologi Virtual
Private Network." Indonesian Journal on Networking and
Security - Volume 7 No 2 (2017): 2354-6654.
[15] Nurul Hidayah. "Nurul Hidayah, Sulfahmi, Iani Zairani,
Marwah Yusuf, Sufiati." COMBINE ASSURANCE
DALAM KONTEKS PENGENDALIAN (2019): 32-37.
[16] Senarath, A. and Arachchilage, N.A.G. Why Developers
Cannot Embed Privacy into Software Systems? Conference
on Evaluation and Assessment in Software Engineering -
EASE, ACM (2018), 211–216.