Security in Virtual private network

نویسندگان

  • Tripti Sharma
  • Rahul Yadav
چکیده

Information security, sometimes shortened to Info Sec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible by using an expensive leased line solution or by dialling directly into the local area network (LAN). VPNs allow remote users to access private networks securely over the internet. A remote user in one part of the UK can establish a secure network connection using a VPN to a school LAN in another part of the UK and only incur the call cost for the local internet connection. A virtual private network gives secure access to LAN resources over a shared network infrastructure such as the internet. It can be conceptualised as creating a tunnel from one location to another, with encrypted data travelling through the tunnel before being decrypted at its destination. Remote users can connect to their organisation's LAN or any other LAN. They can access resources such as email and documents as if they were connected to the LAN as normal. By using VPN technology it is possible to connect to a school LAN from anywhere in the world via the internet, and to access it securely and privately without incurring the large communication costs associated with other solutions. Methods and Technology Used: i) To minimize usage of CPU and memory. ii) Comparison between two different platform of VPN based on hardware. Five phases for development of test bed process: i) Planning ii) Design iii) Implementation iv) Testing v) Compare vi) Compile Two VPN technologies that are being used are: i) Site-to-site VPN ii) Remote Access VPN

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provisioning Restorable Virtual Private Networks Using Barabasi and Waxman Topology Generation Model

As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...

متن کامل

A Topology-aware Reliable Routing Protocol for Internet Security in Virtual Private Network

Most of the Virtual Private Network (VPN) suffers from security related and overhead problems. During the inter domain routing, the conventional protocols require each gateway to resend its routing table periodically to all its neighbors thus increasing the delay. Since VPNs carry sensitive information over an insecure network, the traffic in this network has to be transmitted reliably and secu...

متن کامل

Scalability Implications of Virtual Private Networks

This article gives an overview of the most promising technologies for service providers to offer virtual private network services. The focus of this article is on the analysis of the scalability implications of these virtual private network mechanisms on existing service provider backbone networks. Very often, when deploying VPN services, service providers will be confronted with a trade-off be...

متن کامل

R. Ravi: Enhanced Provisioning Algorithm for Virtual Private Network in Hose Model with Quality of Service Support Using Waxman Model

As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing ha...

متن کامل

Securing virtual private LAN service by efficient key management

Virtual private local area network service (VPLS) is a layer 2 service provider-provisioned virtual private network service. Security is one of the key system requirements of a VPLS because it delivers the frames via an untrusted network. Several VPLS architectures are proposed during the recent years. However, many of them do not provide a sufficient level of security. On the other hand, the e...

متن کامل

It Network Security for Control and Communication Systems in the Power Industry

Designing, implementing, running, and managing control and communication systems to state-of-the-art security standards is a major challenge to both power system integrators and operators, even more so in multi-vendor environments. In this paper, we discuss how industrially ruggedized network security appliances can provide building blocks and contribute to security solutions in both retrofit a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015