scholarly journals Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study

2019 ◽  
Vol 22 (4) ◽  
pp. 283-293
Author(s):  
Subhi Aswad Mohammed

This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON   simulation results show higher response time for packet transmission due to effect of VPN tunneling. The concurrent activation of application execution is used as a solution to the delay problem of the initial timing period while the application proceeds. The results dealing with QoS are E-mail, FTP, voice services traffic and IP traffic dropped. The VPN Tunnels is in the range of (0.01 to 0.02) sec.; along with this simulator there are four VPN tunnels in the network. Also, a special server’s load balance is used to manage distribution of the server processing load across all other network servers to achieve the best response

2014 ◽  
Vol 686 ◽  
pp. 210-219
Author(s):  
Guo Fang Zhang

The rapid development of electronic businesses raises the need for exchanging information between enterprise networks via internet. If a secure connection is necessary then a virtual private network (VPN) is essential. IPSec use encrypting and encapsulating technology in client device and establishes a secure tunnel connection. The private network built by IPSec technology can ensure good transmission performance and service quality over public networks. This paper analyses the architecture of IPSec and describes the process of creating a site-to-site IPSec VPN between header and branch of enterprise over internet. In addition, this study analyses the encryption at the boundary of the network and concludes a propose some practical problems need to consider inside enterprise network.


1995 ◽  
Vol 18 (1) ◽  
pp. 24-31 ◽  
Author(s):  
P Crocetti ◽  
S Fotedar ◽  
L Fratta ◽  
G Gallassi ◽  
M Gerla

2004 ◽  
Vol 17 ◽  
pp. 19-22 ◽  
Author(s):  
A. Altın ◽  
E. Amaldi ◽  
P. Belotti ◽  
M.Ç. Pınar

Author(s):  
Samuel Ndichu ◽  
◽  
Sylvester McOyowo ◽  
Henry Okoyo ◽  
Cyrus Wekesa

Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or resources being accessed. These threats differ depending on the type of device used to procure remote access. One kind of these remote access devices can be considered as safe as the organization probably issues it to provide for remote access. The other type is risky and unsafe, as they are beyond the organization’s control and monitoring. The myriad of devices is, however, a necessary evil, be it employees on public networks like cyber cafes, wireless networks, vendors support, or telecommuting. Virtual Private Network (VPN) securely connects a remote user or device to an internal or private network using the internet and other public networks. However, this conventional remote access security approach has several vulnerabilities, which can take advantage of encryption. The significant threats are malware, botnets, and Distributed Denial of Service (DDoS). Because of the nature of a VPN, encryption will prevent traditional security devices such as a firewall, Intrusion Detection System (IDS), and antivirus software from detecting compromised traffic. These vulnerabilities have been exploited over time by attackers using evasive techniques to avoid detection leading to costly security breaches and compromises. We highlight numerous shortcomings for several conventional approaches to remote access security. We then adopt network tiers to facilitate vulnerability management (VM) in remote access domains. We perform regular traffic simulation using Network Security Simulator (NeSSi2) to set bandwidth baseline and use this as a benchmark to investigate malware spreading capabilities and DDoS attacks by continuous flooding in remote access. Finally, we propose a novel approach to remote access security by passive learning of packet capture file features using machine learning and classification using a classifier model.


2007 ◽  
Vol 37 (3) ◽  
pp. 706-721 ◽  
Author(s):  
Friedrich Eisenbrand ◽  
Fabrizio Grandoni ◽  
Gianpaolo Oriolo ◽  
Martin Skutella

2006 ◽  
Author(s):  
Tomonori Takeda ◽  
Ryuichi Matsuzaki ◽  
Ichiro Inoue ◽  
Shigeo Urushidani

2015 ◽  
Vol 49 (3) ◽  
pp. 569-588 ◽  
Author(s):  
Ahmad Moradi ◽  
Andrea Lodi ◽  
S. Mehdi Hashemi

Sign in / Sign up

Export Citation Format

Share Document