Ads Block Management System Using Open Virtual Private Network on Ubuntu Operating System

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In internet, an ad is something that able to be avoided when opening a web page. At this time many internet based businesses rely on advertising for their income. However, users are dissatisfied with the presence of ads on websites they visit, since the size of the ad data is often proportional to the actual content ads. This impacts not only on loading web pages and may lead to a file that may potentially be a carrier of the virus and may damage the operating system of the visitor. A system that can overcome the annoying ads will be needed by the user for the convenience of users in using the internet media. To overcome this will be built a system using the pi-hole and Ubuntu operating system

     


  • Keywords


    OpenVpn, Ubuntu, Pi-Hole, Dns, Adevertisement

  • References


      [1] R. Rahim, “Man-in-the-middle-attack prevention using interlock protocol method,” ARPN J. Eng. Appl. Sci., vol. 12, no. 22, pp. 6483–6487, 2017.

      [2] A. Putera, U. Siahaan, and R. Rahim, “Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,” Int. J. Secur. Its Appl., vol. 10, no. 8, pp. 173–180, Aug. 2016.

      [3] R. Rahim, M. Dahria, M. Syahril, and B. Anwar, “Combination of the Blowfish and Lempel-Ziv-Welch algorithms for text compression,” World Trans. Eng. Technol. Educ., vol. 15, no. 3, pp. 292–297, 2017.

      [4] R. Rahim, D. Hartama, H. Nurdiyanto, A. S. Ahmar, D. Abdullah, and D. Napitupulu, “Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm,” J. Phys. Conf. Ser., vol. 954, no. 1, p. 012008, 2018.

      [5] H. Nurdiyanto and R. Rahim, “Enhanced pixel value differencing steganography with government standard algorithm,” in 2017 3rd International Conference on Science in Information Technology (ICSITech), 2017, pp. 366–371.

      [6] H. Nurdiyanto, R. Rahim, and N. Wulan, “Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement,” J. Phys. Conf. Ser., vol. 930, no. 1, p. 012005, Dec. 2017.

      [7] T. Listyorini and R. Rahim, “A prototype fire detection implemented using the Internet of Things and fuzzy logic,” World Trans. Eng. Technol. Educ., vol. 16, no. 1, pp. 42–46, 2018.

      [8] M. Kayri, “a Proposed ‘ Osi Based ’ Network,” vol. 2, no. 3, pp. 12–18, 2010.

      [9] G. Bora, S. Bora, S. Singh, and S. M. Arsalan, “OSI Reference Model Networking : An Overview,” Int. J. Comput. Trends Technol., vol. 7, no. 4, pp. 214–218, 2014.

      [10] S. S. Ceballos and J. A. L. Leyva, “An optimized collaborative platform for educational cloud computing in application and presentation layers of OSI model,” in 2015 International Conference on Computing Systems and Telematics (ICCSAT), 2015, pp. 1–5.

      [11] R. Rahim et al., “Block Architecture Problem with Depth First Search Solution and Its Application,” J. Phys. Conf. Ser., vol. 954, no. 1, p. 012006, 2018.

      [12] C. Sabri, L. Kriaa, and S. L. Azzouz, “Comparison of IoT Constrained Devices Operating Systems: A Survey,” in 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017, pp. 369–375.

      [13] E. Baccelli et al., “RIOT: an Open Source Operating System for Low-end Embedded Devices in the IoT,” IEEE Internet Things J., p. 1, 2018.

      [14] H. Narayanan, V. Radhakrishnan, Shiju-Sathyadevan, and J. Poroor, “Architectural design for a secure Linux operating system,” in 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2017, pp. 949–953.

      [15] R. Ratnadewi, E. M. Sartika, R. Rahim, B. Anwar, M. Syahril, and H. Winata, “Crossing Rivers Problem Solution with Breadth-First Search Approach,” in IOP Conference Series: Materials Science and Engineering, 2018, vol. 288, no. 1.

      [16] S. D. Patel and T. M. Pattewar, “Static Detection of Shared Object Loadings on Linux (Ubuntu 14.10),” in 2015 International Conference on Computing Communication Control and Automation, 2015, pp. 589–593.

      [17] V. Boisselle and B. Adams, “The impact of cross-distribution bug duplicates, empirical study on Debian and Ubuntu,” in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2015, pp. 131–140.

      [18] D. Meng, “Implementation of a host-to-host VPN based on UDP tunnel and OpenVPN Tap interface in Java and its performance analysis,” in 2013 8th International Conference on Computer Science & Education, 2013, pp. 940–943.

      [19] R. M. Pandurang and D. C. Karia, “Performance measurement of WEP and WPA2 on WLAN using OpenVPN,” in 2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), 2015, pp. 1–4.

      [20] F. Zou, S. Zhang, B. Pei, L. Pan, L. Li, and J. Li, “Survey on Domain Name System Security,” in 2016 IEEE First International Conference on Data Science in Cyberspace (DSC), 2016, pp. 602–607.

      [21] M. Dooley and T. Rooney, “Introduction to the Domain Name System (DNS),” in DNS Security Management, Wiley-IEEE Press, 2017, p. 324.

      [22] S. Harhalakis, N. Samaras, and V. Vitsas, “The effects of Active Queue Management and Explicit Congestion Notification on DNS traffic,” in 2011 IEEE Symposium on Computers and Communications (ISCC), 2011, pp. 906–911.

      [23] C. Huang, D. A. Maltz, J. Li, and A. Greenberg, “Public DNS system and Global Traffic Management,” in 2011 Proceedings IEEE INFOCOM, 2011, pp. 2615–2623.

      [24] I. Coonjah, P. C. Catherine, and K. M. S. Soyjaudah, “Performance evaluation and analysis of layer 3 tunneling between OpenSSH and OpenVPN in a wide area network environment,” in 2015 International Conference on Computing, Communication and Security (ICCCS), 2015, pp. 1–4.

      [25] I. Coonjah, P. C. Catherine, and K. M. S. Soyjaudah, “Experimental performance comparison between TCP vs UDP tunnel using OpenVPN,” in 2015 International Conference on Computing, Communication and Security (ICCCS), 2015, pp. 1–5.


 

View

Download

Article ID: 13951
 
DOI: 10.14419/ijet.v7i2.5.13951




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.