COMPREHENSIVE REVIEW OF VIRTUAL PRIVATE NETWORK
Abstract
A Virtual Private Network (VPN) provides the data encryption and checks security in order to provide privacy authorized users. The VPN restricts the unauthorized person to gain the access to server. This paper presents a detailed information and provides classification on different types of VPN. The detail concept of an encrypted tunnel and data encryption processes are discussed. Furthermore, Internet Protocol Security (IPsec) and layer-based VPN are deliberated. As, the Virtual Network Service (VNS) provides management capabilities and performance properties is also included in this review. Finally, the router’s virtualization is obtained by conducting the experiments.
About the Authors
A. RazaqueKazakhstan
S. Amanzholova
Kazakhstan
A. Yessenalina
Kazakhstan
D. Sovetov
Kazakhstan
References
1. Surantha, Nico. “Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm.” Procedia Computer Science135 (2018): 259-266.
2. Elezi, Muhamed, and Bujar Raufi. “Conception of Virtual Private Networks using IPsec suite of protocols, comparative analysis of distributed database queries using different IPsec modes of encryption.” Procedia-Social and Behavioral Sciences 195 (2015): 1938-1948.
3. Elezi, Muhamed, and Bujar Raufi. “Conception of Virtual Private Networks using IPsec suite of protocols, comparative analysis of distributed database queries using different IPsec modes of encryption.” Procedia-Social and Behavioral Sciences 195 (2015): 1938-1948.
4. Wesinger, Ralph, and Christopher Coley. “Method for providing a virtual private network connection.” U. S. Patent Application 11/250,909, filed March 9, 2006.
5. Chawla, Deepak, and William R. Beckett III. “Methods, systems, and computer program products for providing a virtual private gateway between user devices and various networks.” U. S. Patent 9,021,251, issued April 28, 2015.
6. Mayya, Ajit Ramachandra, Parag Pritam THAKORE, Stephen Craig Connors, Steven Michael Woo, Sunil Mukundan, and Thomas Harold Speeter. “Method and system of establishing a virtual private network in a cloud service for branch networking.” U. S. Patent Application 16/179,675,
7. filed March 7, 2019.
8. Lospoto, Gabriele, Massimo Rimondini, Benedetto Gabriele Vignoli, and Giuseppe Di Battista. “Rethinking virtual private networks in the software-defined era.” In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 379-387. IEEE, 2015.
9. Wang, Wei, and Charles Shen. “Methods and apparatus to improve security of a virtual private mobile network.” U. S. Patent 9,172,678, issued October 27, 20159. Ismail, Mohd Nazri. “Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance.” International Journal of Multidisciplinary Sciences and Engineering (IJMSE) 1, no. 2 (2011): 16-21.
10. Lospoto, Gabriele, Massimo Rimondini, Benedetto Gabriele Vignoli, and Giuseppe Di Battista. “Rethinking virtual private networks in the software-defined era.” In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 379-387. IEEE, 2015.
11. Sridevi and Dr. Manjaia D. H, “Network Security Comparision between IPSec and GRE”, International Journal of Emerging Trends & Technology. March - April 2014.
12. [Mohd Nazri Ismail, “Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance”, International Journal of multidisciplinary sciences and engineering. November 2010.
13. Ritik kajal, Deepshikha Saini and Kusum Grewal, “Virtual Private Network” International Journal of Advanced Research in Computer Science and Software Engineering October 2012.
14. Jahan, Sohely, Md Saifur Rahman, and Sajeeb Saha. “Application specific tunneling protocol selection for Virtual Private Networks.” In 2017 International Conference on Networking, Systems and Security (NSysS), pp. 39-44. IEEE, 2017.
15. Malheiros, Neumar, Edmundo Madeira, Fabio Verdi, and Mauricio Magalhaes. “A management architecture for layer 1 VPN services.” In Broadband Communications, Networks and Systems, 2006. BROADNETS 2006. 3rd International Conference on, pp. 1-10. IEEE, 2006.
16. Bensalah, Faycal, Najib El Kamoun, and Ayoub Bahnasse. “Evaluation of tunnel layer impact on VOIP performances (IP-MPLS-MPLS VPN-MPLS VPN IPsec).” International Journal of Computer Science and Network Security (IJCSNS) 17, no. 3 (2017): 87.
17. Barkie, Eric J., Benjamin L. Fletcher, Marco Pistoia, John J. Ponzo, and Andrew P. Wyskida. “Authentication in virtual private networks.” U. S. Patent 9,094,400, issued July 28, 2015.
18. Bloch, Noam, Eitan Hirshberg, and Michael Kagan. “Network interface controller supporting network virtualization.” U. S. Patent 9,008,097, issued April 14, 2015.
19. Surantha, Nico. “Secure Portable Virtual Private Network with Rabbit Stream Cipher Algorithm.” Procedia Computer Science135 (2018): 259-266.
20. Caicedo-Munoz, Julian Andres, Agapito Ledezma Espino, Juan Carlos Corrales, and Alvaro Rendon. “QoS-Classifier for VPN and Non-VPN traffic based on time-related features.” Computer Networks 144 (2018): 271-279.
21. Coonjah, Irfaan, Pierre Clarel Catherine, and K. M. S. Soyjaudah. “Performance evaluation and analysis of layer 3 tunneling between Open SSH and Open VPN in a wide area network environment.” In Computing, Communication and Security (ICCCS), 2015 International Conference on, pp. 1-4. IEEE 2015.
22. Garg, Pankaj, and Y. Wang. NVGRE: Network virtualization using generic routing encapsulation. No. RFC 7637. 2015.
23. Lakbabi, Abdelmajid, Ghizlane Orhanou, and Said El Hajji. “VPN IPSEC & SSL technology Security and management point of view.” In Next Generation Networks and Services (NGNS), 2012, pp. 202-208. IEEE, 2012.
24. Narayan, Shaneel, Cameron J. Williams, Daniel K. Hart, and Max W. Qualtrough. “Network performance comparison of VPN protocols on wired and wireless networks.” In Computer Communication and Informatics (ICCCI), 2015 International Conference on, pp. 1-7. IEEE, 2015.
Review
For citations:
Razaque A., Amanzholova S., Yessenalina A., Sovetov D. COMPREHENSIVE REVIEW OF VIRTUAL PRIVATE NETWORK. Herald of the Kazakh-British technical university. 2019;16(3):179-192.