VPN Detection and Blocking

Authors

  • Tejas Ravi Ghatikar, Vemuri Anvesh Sai

Keywords:

Vpn- Ip address detection, Vpn blocking, Vpn detection, automate, Piracy

Abstract

A huge opportunity for Blocking through Vpn address detection is to design a system specifically to support small-scale Websites in the process of achieving high level security from fraudulent activities. The ability to build an automated system to detect a Vpn-address and deny access in a cost effective manner helps reduce their vulnerability of being targeted. The prime goal of the proposed application is to solve the problem of website owners to safeguard their business from unethical activities such as piracy. Upon entering the website, the system will grant/deny access to user based on their IP address being a Vpn enabled IP-address or not. Hence, users who are trying to use Vpn to enter website will be denied access and shown a forbidden access page giving a choice to refresh and enter the website without a Vpn-enabled Ip address.

References

DATACONOMY-“Three vpn use cases you should know about” february 19 2020

INC42 – “Indians expected to take vpn route to dodge Chinese app ban” June 30 2020

ZDNET-“hacker group chain vpn and windows bugs to attack us government networks” October 12 2020

T. Hunt, “Observations and thoughts on the LinkedIn data breach,” troyhunt.com,2016.[Online].Available:”https://www.troyhunt.com/observations-and-thoughts-on-the-linkedin-data-breach/”

[Accessed: 06-Dec-2017].

S. Miller, K. Curran and T. Lunney, “Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic,” 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Glasgow, UK, 2018, pp. 1-8, doi: 10.1109/CyberSA.2018.8551395.

Draper-Gil, G., Lashkari, A., Mamun, M. and A. Ghorbani, A. (2016): “Characterization of Encrypted and VPN Traffic using Time-related Features.” In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP. ISBN 978-989-758-167-0. pages 407-414. DOI: 10.5220/0005740704070414

T. M. Chen and Y. W. Wang, “Web Filtering and Censoring,” in Computer, vol. 43, no. 3, pp. 94-97, March 2010, doi: 10.1109/MC.2010.84.

Chen, Thomas & Wang, Victoria. (2010). “Web Filtering and Censoring”. Computer. 43. 94 - 97.

Chuersanoenkung, N.; Kim, Y.S.; Kang, B.H. (2005). [IEEE International Conference on Information Technology: Coding and Computing (ITCC05) - Volume I - Las Vegas, NV, USA (2005.04.0-2005.04.6)] International Conference on Information Technology: Coding and Computing (ITCC05) - Volume II - Dynamic web content filtering based on user’s knowledge, vol. 1, 184–188 Vol. 1. doi:10.1109/itcc.2005.137

M. Pannu, B. Gill, R. Bird, K. Yang and B. Farrell, “Exploring proxy detection methodology,” 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), Vancouver, BC, Canada, 2016, pp. 1-6. doi: 10.1109/ICCCF.2016.7740438.

Mohammed Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, and Narseo Vallina-Rodriguez. 2018. An Empirical Analysis of the Commercial VPN Ecosystem. In Proceedings of the Internet Measurement Conference 2018 (IMC ’18). Association for Computing Machinery, New York, NY, USA, 443–456. DOI:https://doi.org/10.1145/3278532.3278570

Fujikawa, H., Dantani, E., Yamamoto, Y. et al. Network virtualization by differentially switched VPN for stable business communication with offshore computers. J Reliable Intell Environ 2, 119–130 (2016). https://doi.org/10.1007/s40860-016-0026-9

Downloads

How to Cite

Tejas Ravi Ghatikar, Vemuri Anvesh Sai. (2022). VPN Detection and Blocking. International Journal of Research & Technology, 10(3), 29–32. Retrieved from https://ijrt.org/j/article/view/331

Similar Articles

<< < 1 2 3 4 > >> 

You may also start an advanced similarity search for this article.