logo

Alternative Technologies To Replace VPN | Paper

   

Added on  2020-02-24

11 Pages4211 Words151 Views
Running head: ALTERNATIVE TECHNOLOGIES TO REPLACE VPNAlternative Technologies toReplace VPNAuthor name

ALTERNATIVE TECHNOLOGIES TO REPLACE VPN1Abstract The security of the transited data inthe internet have a pivotal part in presenttimes; generally business is executed over theinternet and even to remote devices, which isconsiderably more vulnerable than whenrunning on an internal network of aorganization or user. The data can beintercepted by the unauthorized individuals;this clarifies why extensive exertion is beingdedicated at the current time to informationencryption and secure transmission. Thispaper concentrates basically on finding outthe alternative technologies while discussingthe issues of the traditional and legacy VPNsolutions. IntroductionIn the era of the internet,security and privacy are the greatestconcerns. A Virtual Private Network or VPN isone such network, which enhances one’sonline privacy and security. The VPN serviceproviders provide an encrypted connection toscramble the data that is transferred over thatnetwork. This prohibits outsiders from readingthe data by breaking into the network as anintermediary (Man in the Middle Attack). VPNextends the access of a private or restrictednetwork across a public network. This enablesthe internet users to receive and send dataacross multiple public or shared networks.This network system creates a make believeenvironment as if the users are directlyconnected to the secured or private network.The VPN also hides all browsing records fromthe Internet Service Provider (ISP) as well.However, the VPN Service Provider is nowaware of the data usage and transaction.Therefore, it is best recommended to viewVPN as a model for security and not foranonymity. However, over the time usersof VPN has encountered certain issues withthe system. Congestion, latency,fragmentation, and packet loss have been amajor issue with the VPN system. Otherbottlenecks include difficulties withcompliance and troubleshooting VPN errors[8]. Several users have complained about theirVPN connections being rejected and at timesthe authentication process getting toocomplex to manage. Drop in the traffic due toencryption failure is another noticeableproblem. When the security gateway at thereceiver’s end is expecting an encryptedpacket, but it receives an unencrypted one orthe vice versa, the traffic system crashes.Other problems include the lack of repeatingpatterns, the requirement of high availabilityfor VPN connections and it being morebandwidth-intensive than any normal clear-text transmission [5]. There is also an addeddifficulty with regards to the aspect ofplatform friendliness. In infrastructures, whichare incompatible and obsolete to install or run

ALTERNATIVE TECHNOLOGIES TO REPLACE VPN2legacy VPN systems, the cost can risedramatically.It has high requirements ofadditional software and hardwarecomponents. Other expenses include high-cost licensing and other additionalinvestments.With the increase indifficulties faced in the traditional or legacyVPN technology, several attempts have beenmade to replace it with some modernapproach. Microsoft Direct Access is one ofthe newly invented technologies that aim toreplace the classic VPN solutions. It was firstlaunched in 2008 but was discarded by thetech society due to its enormously complexfunctionality. Later in 2012, after the releaseof the Windows Server 2012, therequirements were not much complicated anymore. This made the technology rise up to itsfame. Unlike the legacy VPN connections thatare bound to be initiated and terminated onlyby explicit user action, the Microsoft’ssolution through their Direct Accessconnections proved to be fruitful. No soonerdoes the user connect to the internet, DirectAccess is automatically connected. It alsoprovides a more user-friendly way ofoperation in comparison to the legacy VPNs.Another commonly used replacementtechnology is the SoftEther or SoftwareEthernet VPN. It is considered as the world’sstrongest multi-protocol VPN. It is easy-to-useand can be run on any Operating Systemplatform. It has more ability and betterperforming credibility than any Open orLegacy VPN technologies, and hence it ispreferred more in the recent times [1].Network analysts predict that products, whichare based on the SSL VPN technology, willreplace traditional IP Security Protocol VPN asa permanent remote-access solution. This report aims at surveyingall the above mentioned aspects of the VirtualPrivate Network technology, covering everyminute details about the troubles faced inusing the legacy VPN technologies and sortingout the feasible technologies that can replacethe same. A literature review is to beconducted in order to throw light on theworks of various diligent in this field. Theliterature review would help in the betterunderstanding of the topic and help inenriching the report. Further, the difficultiesthat are being faced on using the legacy VPNtechnologies are to be discussed with detailedexplanation for each. Then, the replacementtechnologies shall be highlighted alongsideexplaining their advantage over the legacyVPN technology systems. Lastly, the scope ofimprovement in the field of VPN technologieswill be elaborated for further studyopportunities on the topic.Literature Review The main objective of the VPNtechnology is to provide the capabilities of aprivate leased secure lines that in the public

ALTERNATIVE TECHNOLOGIES TO REPLACE VPN3networks while making it cost effective andmore secure than public connection in theunsecured public networks. With this benefitsthere are some common issues that affectsthe security and the performance. VPN fingerprinting: As opined by the AlMhdawi (2016), with the use of the traditionalVPN solutions it is possible to get the digitalfingerprints of the VPN servers. Techniquessuch as Vendor Identity (ID) fingerprinting,UDP (User Datagram Protocol) back offfingerprinting, or similar other techniques.While this is not considered as a performanceor security issue; even some of the VPNservice providers does not consider as anissue by any means. When analysed thisfingerprinting techniques it gives helpful datato potential hackers or the attackers. A fewframeworks also uncover the general kind ofused device information, such as “Cisco PIX".In addition to that others exposes the productsoftware/firmware details as well. In theirpapers, the authors Shahzad and Hussain (2013)described that Information of the devices toimplement the VPN the details of thebackdoors of these devices enables anattackers to focus on those flaws in order tointrude the VPN between the two points [6]. Storing authentication credentials insecurely:Numerous VPN solutions/programs offer tostore a few or the greater part of thevalidation credentials such as username andthe corresponding password for particularuser, which is the default setting for a . Whilethis makes the VPN easy to utilize it likewisepresents security risks that, particularly if theaccreditations are not very much ensured.Man in the middle attacks: An unapprovedmachine begins blocking the correspondencebetween the hubs in the system and changesthe substance of the information that istransmitted between them. The sort ofchanges includes expansion, erasure andalteration of information [5]. With the combination of the multiple privateand public networks like the internet, the VPNhelps the users to send and receive the datathrough public networks which are oftenunsecure. According to Kuroda (2017), eventhough the VPN is a cost effective for theusers as well for the organizations whichprovides an efficient data transmissionchannel among the unsecured publicnetworks, it also possess numerousvulnerabilities and risks that needs to beaddressed such as Man in the Middle attacksand VPN hijacking. More over as mentionedby BĂNUȚĂ (2012), the due to the lack of userauthentication, interoperability and infectionof any one of the two points (sender andreceiver) is infected by malwares or virusesthen it is possible that the whole network iscompromised by the attackers and may beable to steal the password of VPN. Another issue in the VPN is theinteroperability between the frame works.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer and Network Security | CN6107
|14
|4340
|48

Assignment on Virtual Private Network
|9
|2285
|38

VPN Applications and Significance
|8
|1128
|307

Alternative Options to Overcome and Resolve VPN Problems
|4
|3817
|398

VPN Security Issues - CSC332 - Case Study
|8
|3117
|62

SSL/TLS VPN Technologies: Significance, Role, Advantages, and Security
|9
|2008
|427