INVESTIGATION OF METHODS OF PREVENTING THE DISCLOSURE OF AN IP-ADDRESS WITHAN ACTIVE VPN-CONNECTION
Journal Title: Наукові праці. Серія "Комп’ютерні технології" - Year 2017, Vol 307, Issue 295
Abstract
For secure operation on the Internet, you can use different types of connection. One type of such connections is VPN connections. It allows you to tunnel all incoming/outgoing traffic, encrypt it. However, when the VPN connection is disconnected or lost, the user’s real IP address may be leaked. This will identify the user and intercept his data. Known methods of protection do not allow solving this problem. The paper considers the basic methods of preventing the disclosure of a real IP address when using an active connection in a VPN network, an analysis and methods for preventing leakage in various operating systems are presented, a method of protection is exemplified using the example of the macOS 10.13 operating system. Based on the testing of the method, it was proved that it fully performs its functions to protect the user’s device. The advantage of this method is the impossibility of disclosing the IP address, since Internet traffic will be blocked if it does not pass through the VPN server. The drawback of this method lies in the possible increase in connection time and in the possibility of implementation only in a specific operating system. As a result of the implementation of the method, they were able to establish a VPN connection, which has a higher degree of security.
Authors and Affiliations
O. V. Nikonenko, V. S. Sytnikov
CHOICE OF SOFTWARE MODULES FOR REENGINEERING BY COMBINING SWOT- ANALYSIS AND GAME THEORY
In this paper built a conceptual model of the existing automated system and on it basis built a structural-functional diagram. The next step is to build a target model based on own developments. Considered the decision-m...
ONE-DIMENSIONAL ANALYTICAL GEOMETRY OF MULTIDIMENSIONAL SPACES
Analytical geometry allows to visualize complex functions of the original estimation of the decision-making system F(Z), where Z = (z1, z2, ..., ze ..., zE) is a vector of input variables. The value of F(Z) can be determ...
SHIPBOARD FIBER OPTIC HYDROPHONE
To build traffic safety navigation systems and submarine vessels and apparatus necessary to implement reliable control of hydroacoustic fields. Existing controls are not fully in its metro-logical and technical character...
INVESTIGATION OF METHODS OF PREVENTING THE DISCLOSURE OF AN IP-ADDRESS WITHAN ACTIVE VPN-CONNECTION
For secure operation on the Internet, you can use different types of connection. One type of such connections is VPN connections. It allows you to tunnel all incoming/outgoing traffic, encrypt it. However, when the VPN c...
AN INFORMATION FLOW MODEL OF LINEAR-FUNCTIONAL ORGANIZATIONAL MANAGEMENT STRUCTURES OF HIGH-TECHNOLOGY ENTERPRISES
Many recent studies have focused on formation of models and methods of analysis and management of information flows, recourses and processes. This paper focuses on formation of an analytical model of information flows on...