Preview

Вестник Казахстанско-Британского технического университета

Расширенный поиск

ОБШИРНЫЙ ОБЗОР ВИРТУАЛЬНОЙ ЧАСТНОЙ СЕТИ

Аннотация

Виртуальная частная сеть (ВЧС) обеспечивает шифрование данных и проверяет безопасность для обеспечения конфиденциальности авторизованных пользователей. ВЧС ограничивает доступ постороннего лица к серверу. В этом документе представлена подробная информация и представлена классификация различных типов ВЧС. Обсуждается подробная концепция зашифрованного туннеля и процессов шифрования данных. Кроме того, обсуждаются вопросы безопасности протокола Интернета (IPsec) и ВЧС на основе уровня. Виртуальная сетевая служба (ВСС) предоставляет возможности управления, а свойства производительности также включены в этот обзор. Наконец, виртуализация маршрутизатора получается путем проведения экспериментов.

Об авторах

А. Разак
Международный университет информационных технологий
Казахстан

PhD, ассоц. профессор



С. Т. Аманжолова
Международный университет информационных технологий
Казахстан

к. т. н., ассистент-профессор



А. Есеналина
Международный университет информационных технологий
Казахстан

студент



Д. Советов
Международный университет информационных технологий
Казахстан

студент



Список литературы

1. Surantha, Nico. “Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm.” Procedia Computer Science135 (2018): 259-266.

2. Elezi, Muhamed, and Bujar Raufi. “Conception of Virtual Private Networks using IPsec suite of protocols, comparative analysis of distributed database queries using different IPsec modes of encryption.” Procedia-Social and Behavioral Sciences 195 (2015): 1938-1948.

3. Elezi, Muhamed, and Bujar Raufi. “Conception of Virtual Private Networks using IPsec suite of protocols, comparative analysis of distributed database queries using different IPsec modes of encryption.” Procedia-Social and Behavioral Sciences 195 (2015): 1938-1948.

4. Wesinger, Ralph, and Christopher Coley. “Method for providing a virtual private network connection.” U. S. Patent Application 11/250,909, filed March 9, 2006.

5. Chawla, Deepak, and William R. Beckett III. “Methods, systems, and computer program products for providing a virtual private gateway between user devices and various networks.” U. S. Patent 9,021,251, issued April 28, 2015.

6. Mayya, Ajit Ramachandra, Parag Pritam THAKORE, Stephen Craig Connors, Steven Michael Woo, Sunil Mukundan, and Thomas Harold Speeter. “Method and system of establishing a virtual private network in a cloud service for branch networking.” U. S. Patent Application 16/179,675,

7. filed March 7, 2019.

8. Lospoto, Gabriele, Massimo Rimondini, Benedetto Gabriele Vignoli, and Giuseppe Di Battista. “Rethinking virtual private networks in the software-defined era.” In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 379-387. IEEE, 2015.

9. Wang, Wei, and Charles Shen. “Methods and apparatus to improve security of a virtual private mobile network.” U. S. Patent 9,172,678, issued October 27, 20159. Ismail, Mohd Nazri. “Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance.” International Journal of Multidisciplinary Sciences and Engineering (IJMSE) 1, no. 2 (2011): 16-21.

10. Lospoto, Gabriele, Massimo Rimondini, Benedetto Gabriele Vignoli, and Giuseppe Di Battista. “Rethinking virtual private networks in the software-defined era.” In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 379-387. IEEE, 2015.

11. Sridevi and Dr. Manjaia D. H, “Network Security Comparision between IPSec and GRE”, International Journal of Emerging Trends & Technology. March - April 2014.

12. [Mohd Nazri Ismail, “Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance”, International Journal of multidisciplinary sciences and engineering. November 2010.

13. Ritik kajal, Deepshikha Saini and Kusum Grewal, “Virtual Private Network” International Journal of Advanced Research in Computer Science and Software Engineering October 2012.

14. Jahan, Sohely, Md Saifur Rahman, and Sajeeb Saha. “Application specific tunneling protocol selection for Virtual Private Networks.” In 2017 International Conference on Networking, Systems and Security (NSysS), pp. 39-44. IEEE, 2017.

15. Malheiros, Neumar, Edmundo Madeira, Fabio Verdi, and Mauricio Magalhaes. “A management architecture for layer 1 VPN services.” In Broadband Communications, Networks and Systems, 2006. BROADNETS 2006. 3rd International Conference on, pp. 1-10. IEEE, 2006.

16. Bensalah, Faycal, Najib El Kamoun, and Ayoub Bahnasse. “Evaluation of tunnel layer impact on VOIP performances (IP-MPLS-MPLS VPN-MPLS VPN IPsec).” International Journal of Computer Science and Network Security (IJCSNS) 17, no. 3 (2017): 87.

17. Barkie, Eric J., Benjamin L. Fletcher, Marco Pistoia, John J. Ponzo, and Andrew P. Wyskida. “Authentication in virtual private networks.” U. S. Patent 9,094,400, issued July 28, 2015.

18. Bloch, Noam, Eitan Hirshberg, and Michael Kagan. “Network interface controller supporting network virtualization.” U. S. Patent 9,008,097, issued April 14, 2015.

19. Surantha, Nico. “Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm.” Procedia Computer Science135 (2018): 259-266.

20. Caicedo-Munoz, Julian Andres, Agapito Ledezma Espino, Juan Carlos Corrales, and Alvaro Rendon. “QoS-Classifier for VPN and Non-VPN traffic based on time-related features.” Computer Networks 144 (2018): 271-279.

21. Coonjah, Irfaan, Pierre Clarel Catherine, and K. M. S. Soyjaudah. “Performance evaluation and analysis of layer 3 tunneling between Open SSH and Open VPN in a wide area network environment.” In Computing, Communication and Security (ICCCS), 2015 International Conference on, pp. 1-4. IEEE 2015.

22. Garg, Pankaj, and Y. Wang. NVGRE: Network virtualization using generic routing encapsulation. No. RFC 7637. 2015.

23. Lakbabi, Abdelmajid, Ghizlane Orhanou, and Said El Hajji. “VPN IPSEC & SSL technology Security and management point of view.” In Next Generation Networks and Services (NGNS), 2012, pp. 202-208. IEEE, 2012.

24. Narayan, Shaneel, Cameron J. Williams, Daniel K. Hart, and Max W. Qualtrough. “Network performance comparison of VPN protocols on wired and wireless networks.” In Computer Communication and Informatics (ICCCI), 2015 International Conference on, pp. 1-7. IEEE, 2015.


Рецензия

Для цитирования:


Разак А., Аманжолова С.Т., Есеналина А., Советов Д. ОБШИРНЫЙ ОБЗОР ВИРТУАЛЬНОЙ ЧАСТНОЙ СЕТИ. Вестник Казахстанско-Британского технического университета. 2019;16(3):179-192.

For citation:


Razaque A., Amanzholova S., Yessenalina A., Sovetov D. COMPREHENSIVE REVIEW OF VIRTUAL PRIVATE NETWORK. Herald of the Kazakh-British technical university. 2019;16(3):179-192.

Просмотров: 301


Creative Commons License
Контент доступен под лицензией Creative Commons Attribution 4.0 License.


ISSN 1998-6688 (Print)
ISSN 2959-8109 (Online)