CFP last date
20 January 2025
Reseach Article

A Conceptual Survey of Sturucture, Security and Advantages in Virtual Private Network

by Shubham Patni, Mayuresh Sambudas, Shabnam Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 31
Year of Publication: 2018
Authors: Shubham Patni, Mayuresh Sambudas, Shabnam Sharma
10.5120/ijca2018918285

Shubham Patni, Mayuresh Sambudas, Shabnam Sharma . A Conceptual Survey of Sturucture, Security and Advantages in Virtual Private Network. International Journal of Computer Applications. 182, 31 ( Dec 2018), 33-35. DOI=10.5120/ijca2018918285

@article{ 10.5120/ijca2018918285,
author = { Shubham Patni, Mayuresh Sambudas, Shabnam Sharma },
title = { A Conceptual Survey of Sturucture, Security and Advantages in Virtual Private Network },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2018 },
volume = { 182 },
number = { 31 },
month = { Dec },
year = { 2018 },
issn = { 0975-8887 },
pages = { 33-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number31/30228-2018918285/ },
doi = { 10.5120/ijca2018918285 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:01.290477+05:30
%A Shubham Patni
%A Mayuresh Sambudas
%A Shabnam Sharma
%T A Conceptual Survey of Sturucture, Security and Advantages in Virtual Private Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 31
%P 33-35
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There is an increasing request nowadays to connect to core networks from different places. Workers regularly need to connect to internal private networks over the Internet from home, hotels, airports or from other external networks. Security becomes a main attention when staff or business partners have constant access to internal networks from insecure external locations. Currently, such a secured access is realized with Virtual Private Network (VPN) connections. Although operational, the current VPN solutions suffer of severe limits. Most of the VPN solutions are not satisfactorily secured since they are using weak authentication. The more secured ones are quite often expensive and require the usage of security tokens that demand administration from the service provider. On the user's side there is a need for additional care and attention since he/she has to carry an extra device. In this paper, the focus is to examine the structure, security, and benefits of VPNs.

References
  1. Harkins, D. & Carrel, D., RFC-2409: The Internet Key Exchange (IKE), IETF, Network Working Group,841November 1998, online: http://www.ietf.org/rfc/rfc2409.txt
  2. Pereira, R. & Beaulieu, S., Extended Authentication within ISAKMP/Oakley (XAUTH), IETF, online: http://tools.ietf.org/id/draft-ietf-ipsec-isakmp-xauth06.txt
  3. Samar, V. & Schemers, R., Unified Login with Pluggable Authentication Module (PAM), Open Software Foundation, October 1995, online: http://www.opengroup.org
  4. Kent, S. & Sea, K., RFC-4301: Atkinson, R., & Kent, S. (1998). Security architecture for the internet protocol., December 2005, online: http://www.ietf.org/rfc/rfc4301.txt
  5. Phifer, L. (2006). Understanding IPSec identity and authentication options. Search Security. com, June., SearchSecurity.com, June 2006, online: http://searchsecurity.techtarget.com.
  6. Ortiz (1997) “Ortiz, S. (1997). Virtual private networks: leveraging the Internet. Computer, 30(11), 18-20.. Computer, Vol. 30, 18-20.
  7. “Chan, M. C., Hadama, H., & Stadler, R. (1996, April). An architecture for broadband virtual networks under customer control. In Network Operations and Management Symposium, 1996., IEEE (pp. 135-144). IEEE.. Network Operations and Management Symposium, IEEE, Kyoto, Japan, 1, 135-144.
  8. Xiangping Chen, Mohapatra, P. (2002) “Chen, X., & Mohapatra, P. (2002). Performance evaluation of service differentiating Internet servers. IEEE Transactions on Computers, 51(11), 1368-1375.Computer, IEEE Transactions, Vol. 51, 1368-1375.
  9. Caronni, G., Kumar, S., Schuba, C., & Scott, G. (2000, December). Virtual enterprise networks: the next generation of secure enterprise networking. In acsac (p. 42). IEEE.G.; Kumar, S.; Schuba, C.; Scott, G. Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference, 2000 Page(s): 42 –51
  10. Isaacs, R. (2000, March). Lightweight, dynamic and programmable virtual private networks. In Open Architectures and Network Programming, 2000. Proceedings. OPENARCH 2000. 2000 IEEE Third Conference on (pp. 3-12). IEEE., 2000. Proceedings. OPENARCH 2000. 2000 IEEE Third Conference on, 2000 Page(s): 3 –12
Index Terms

Computer Science
Information Sciences

Keywords

Security Administration Authentication Network Server