A study of virtual private networks security issues and restrictions

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    VPN also called as Virtual Private Network serves as a communication network that supports secure data transmission in a public or an unsecured network using several technologies. A connection that is virtual is established among the users who are globally dispersed and are connected through the public or shared network (eg: Internet). Though virtual network is within the public network, it still gives the end-user a feeling of a private connection. This paper explains the concepts of core VPN technology. Security threats posed for VPN environment are discussed in detail and that care must be taken to handle these threats while implementing a virtual private network.

  • Keywords

    Virtual Private Network (VPN), VPN Protocols, Security, Limitations.

  • References

      [1].A.Thomas and G.Kelley,” Cost-Effective VPN-Based Remote Network Connectivity over the Internet”, Department of Computer Science, University of Massachusetts,100 Morrissey Boulevard, Boston, MA 02125-3393,2002.

      [2] W. BouDiab, S. Tohme and Carole Bassil “Critical VPN Security Analysis and New Approach for Securing VoIP Communications over VPN Networks”, WMuNeP”07, pp 92-96.

      [3] IP Encapsulating Security Payload, Network Working Group, Request for Comments: 2406, Obsoletes: 1827, Category: Standards Track, @Home Network November 1998

      [4]S.Kadry and W.Hassan, ”Design and implementation of system and network security for an enterprise with worldwide branches“, Journal of Theoretical and Applied Information Technology, School of Engineering, LIU, Beirut, Lebanon ,2008

      [5] “Security & Savings with Virtual Private Networks”, available:http://tools.netgear.com/media/whitepapers/VPN_Security.pdf. Last Available 19,04,2014.

      [6] Stephen Northcutt, Lenny Zeltser, Scott Winters, Karen Kent Frederick, and Ronald W. Ritchey. Inside Network Perimeter Security. New Riders, 2003.

      [7] SSH. Ssh main homepage. http://www.ssh.com, Visited 2004.

      [8]Net gear, Virtual Private networking, 24,santacalara, 4500 Great America Parkway Santa Clara, CA 95054 USA, Available: http://documentation.netgear.com/reference/nld/v pn/pdfs/FullManual.pdf. Last Available: 19.04.2014.

      [9] G. Bastian, E.Carter and C.Degu, “CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide”, Cisco Press, 808, Indianpolis, IN 46240 USA, 2005.

      [10] O. Elkeelany et al., “Performance analysis of IPSec protocol: encryption and authentication”, IEEE Communications Conference (ICC 2002), 2002, pp. 1164–1168.

      [11] S. Miltchev, S. Ioannidis and A. Keromytis, “A study of the relative costs of network security protocols”, USENIX 2002 Annual Technical Conference, Monterey, CA, June 2002.

      [12] Amirgaliyev Yedilkhan, Amanzholova Saule, Kalizhanova Aliya, ZamanovaSaule, Kozbakova Ainur” Using the ez-Cryptosystem for Data Transmission in Virtual Private Networks (Vpn)”

      [13] Alexander V. Uskov” Information Security of IPSec-Based Mobile VPN: Authentication and Encryption Algorithms Performance” 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, DOI 10.1109/TrustCom.2012.187

      [14] MarcinNiemiec & PetrMachnik” Authentication in virtual private networks based on quantum key distribution methods” DOI 10.1007/s11042-014-2299-1

      [15] Yu-Liang Liu · Yeali S. Sun · Meng Chang Chen” MTRA: An on-line hose-model VPN provisioning algorithm” Telecommunication System (2006) 31:379–398 DOI 10.1007/s11235-006-6724-2.

      [16] “Performance Analysis of AES and BLOWFISH Algorithms “, National Conference on Computer Communication & Informatics”, School of computer science, RVS college of arts and science, March 07, 2012.

      [17] S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol”, RFC 2401, November 1998.




Article ID: 30919
DOI: 10.14419/ijet.v7i4.6.30919

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.