• No results found

Universiti Teknologi MARA. SafeSearch Microcomputer Based VPN

N/A
N/A
Protected

Academic year: 2021

Share "Universiti Teknologi MARA. SafeSearch Microcomputer Based VPN"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Universiti Teknologi MARA

SafeSearch – Microcomputer Based VPN

Mohamad Ridzuan bin Mohd Alias 2017762279

FYP Proposal (CSP 600)

Bachelor of Computer Science (Hons.) Data Communication & Networking Faculty of

Computer and Mathematical Sciences

DEC 2019

(2)

ii

STUDENT DECLARATION

STUDENT DECLARATION

I certify that this report and the project to which it refers is the product of my own work and that any idea or quotation from the work of other people, published or otherwise are fully acknowledge in accordance with the standard referring practices of the discipline.

………..

MOHAMAD RIDZUAN BIN MOHD ALIAS 2017762279

MAY 23, 2019

(3)

iv

ABSTRACT

ABSTRACT

In networking, a VPN also known as Virtual Private Network could be described as a private network that uses public network to tunnel the connection from the user end until it reaches the VPN server. VPN allows user to create a secure connection to another network over the internet. VPNs can be used to shield users browsing activity and encrypts data transmitted over the network to prevent sniffing attack. Nowadays, user can either pay a premium price for a good VPN service or risk their privacy using free browser-based VPN. Safesearch is developed to address these issues in mind.

With Safesearch, users will not need to fork over their hard-earned money for premium VPN subscription services or expose themselves to targeted advertising when utilizing free browser-based VPN. OpenVPN protocol was used to create the VPN server on a microcomputer called Raspberry Pi. The Software used was mostly open-source except for the VPN client. The hardware cost may vary among online marketplace.

After the VPN server was established, tests are carried out to evaluate the functionality and reliability of the VPN server in “real-world” environment. The outcome of the test was positive as substantial amount of participant are confident that Safesearch can secure their connection and protect their privacy when browsing the web. To conclude, both objectives in this project were fully achieved and the scope given was followed thoroughly. In the future, students seeking to create their own VPN server can refer to this project to gain further understanding.

(4)

v

TABLE OF CONTENTS TABLE OF CONTENTS

CONTENTS PAGE

SUPERVISOR APPROVAL i

STUDENT DECLARATION ii

ACKNOWLEDGEMENT iii

ABSTRACT iv

TABLE OF CONTENTS v

LIST OF FIGURES viii

LIST OF TABLES x

LIST OF LISTINGS xi

CHAPTER 1: INTRODUCTION

1.1 Background of Study 1

1.2 Problem Statement 2

1.3 Objective 3

1.4 Scope 3

1.5 Significance 4

CHAPTER 2: LITERATURE REVIEW

2.1 Virtual Private Network 5

2.2 VPN Obfuscation Technique 7

2.3 Overview of Microcontroller 9

2.3.1 Raspberry Pi 3 B+ 11

2.3.2 Raspbian 11

2.3.3 Headless Setup 12

2.4 DNS 13

2.4.1 Dynamic DNS 14

2.5 Port Forwarding 15

2.6 Network Performance Testing 16

(5)

vii

4.4.3 Dynamic Update Client 39

4.5 OpenVPN 40

4.5.1 Installing OpenVPN 40

4.5.2 Obfuscation proxy 41

4.6 Accessing VPN 42

4.6.1 Viscosity 43

4.6.2 Configuring connection 43

4.7 Summary 45

CHAPTER 5: RESULT AND ANALYSIS

5.1 Test Results 46

5.1.1 Network Restriction Penetration Assessment 46

5.1.2 VPN Server Latency Assessment 48

5.1.3 VPN Server Bandwidth Assessment 51

5.2 User Acceptance Test 54

5.2.1 Participant Gender Distribution 55

5.2.2 Participant VPN Experience Distribution 55 5.2.3 Participant Cybersecurity Awareness Distribution 56

5.2.4 Prototype Evaluation 57

5.3 Summary 59

CONCLUSION AND RECOMMENDATION

6.1 Project Result 60

6.2 Conclusion 60

6.3 Limitation 61

6.4 Recommendation 61

REFERENCE 62

APPENDICES 66

APPENDIX A: USER ACCEPTANCE TEST 66

References

Related documents

VPN stands for Virtual Private Network and is a ‘tunnel’ or connection into the University’s network; so setting up the VPN connection on a home PC/Laptop allows you to connect to

Vegetable garden not and bell and howell solar animal repeller instructions said to exterminate a powerful ultrasonic waves so do not hear the pest control and not!.

We project average annual headline inflation of 2% in 2015 (vs. Given that the inflation risks have abated amid lower oil prices and ample excess capacity, there is room for

In this task, you need to create a tunnel between a computer and a gateway, allowing the computer to access the private network that is connected to the gateway.. To demonstrate

Does the solution enable various network security architectures, such as virtual private networking (VPN), cloud-based security, network segmentation, and/or parallel

Handleiding een Virtual Private Network (VPN) verbinding opzetten Versie 1.3 – 18-11-2009.. 1 Setting up a Virtual Private Network (VPN) connection

IPTV is a service that provides television programming services (sports, news, movies, etc.) and other interactive entertainment content (music, games, advertising)

 If you are using VPN with your Windows computer and have difficulty accessing certain applications, or are being prompted to provide a password for applications you don’t