Virtual Private Networks: Technologies and Security Issues
Verified
Added on 2023/06/04
|5
|3844
|470
AI Summary
This report discusses the benefits and security issues of Virtual Private Networks (VPNs) for remote access. It emphasizes the importance of authentication and encryption technologies for protecting sensitive data. The report also covers the challenges, drawbacks, and solutions for enhancing VPN security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Virtual Private Networks (VPN Technologies and Security Issues)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Abstract— System and Network Issues are considered to be leading risk challenges for both managers and executive of an organization.Therateofchangeresultsinorganization management.Itisnotfullyawareofdifferentkindof innovation and technology in the domain of Internet security technology.Without this kind of knowledge, thereislarge number of organizations which can easily take advantage of both benefits and capabilities of the network. Virtual Private Networks are soon becoming the remote access. It will able make another advantage for the power of the internet by providing a network tunnel. It is mainly done throughpublic cloud for realizing cost saving and enhancingproductivityof various remote access application. VPN is most of the casesare not protected by more than a weak password. Thereislarge number of choices available for understandinglargenumber of methods which can be used for enhancing the overall security ofVPN.SecurityofDatatendstoplayakeyrolein understanding the business transaction.A large number of transactions are carried out on the internet. It is very much vulnerable at the time of running on the internal network. Keywords—VirtualPrivateNetwork,InternetProtocol Security, computer security, Protocol. I.INTRODUCTION Thereislargenumberoforganizationswhich increasingly dependoncomputernetwork for their business communication, database and distribution of data [5].With the passage of the time,internethas become more and more accessible to bandwidth for capability grew.Thereislarge number of organizations whohaveoffload their intranets for bothwebsand creating the things which are known to them. Extranets are considered tobe linkedfor understanding both internal and external users. Much of the emphasizes is put on network security which has increased asresultof public security break-ins [22]. Apart from this, there are threats and government regulatory agencies for understanding security related problems. With the passage of time,internethas been changed and improved a lot for improving the information access to variousbusiness[15].Thereislargenumberimproved information access for the given business. Their network and related technologies have easily createddoorto increase in the number of technologies. It has ultimately opened updoor tolargenumber of security threats. The organization should protect themselves from these issues. Thereislargenumber of network-based attacks which are considered to be very serious at the time of inflicting upon business. This is due to the fact that they store sensitive data like personal and medical records. The effect of attack can easily range from inconvenient to complete debilitation [10]. Thereislarge numberofcostsignificantwhichareconsideredtobe important for data, network downtime and third-party claims. The main notion of this paper is all about having an understanding with respect to benefits that can be gathered by VPN. The issues have been discussed in the domain of howorganizationcan easily value computer networks. There islargenumber of issues has been discussed on the fact that organization can value computer networks inmuchdifferent way. With the passage of time, therehavebeen remote access which is becoming a standard practice. It mainly helps in analyzingcertainnumber of ways foroverallproductivity and staying in the competition [2]. Thecompetition of business environment has almost gone electronic in nature. Remote access business should focus oncertainnumber of ways for maximizing communication and interaction. It focuses on empowering mobile employees and remote user withaccessto some of the critical information at any location and time. It also helps the organization in extending their reach beyond the employees for work effectively with contractors and consultants for working inmucheffective way [8]. Remote access has been traditionally set up through dial-upmodes. Being effective, this particular method is plagued as a result ofslowtransmission of both speed and expenses. With the passage of time, remote access has come awaylong for understanding the Virtual Private Network (VPN) technology. VPNs mainly help in leveraging the power ofinternetwhich is needed for remote access. Remote dial-indone into the local POP and connecting the corporate networkbythe help of internet. Thisisconsidered to be significanceof cost reduction techniques,improving the services at any time and place. II.LITERATUREREVIEW According to (), VPN aims in connecting various kind of users on different kind of remote user or even offices for some of the enterprisenetworksover the internet. At the time of supportingtravelingemployee for a branch office which is very much similar [12]. The remote user aims to call internet service providers in the point of presence. Charges related to bandwidth are not only cost saving which has been afforded by VPN. VPN as aims to reduce the overall network complexity which result inloweroperating cost.Helpdeskcall aims in reducing the user in the network. They are offloaded to the help desk of ISP and services which is limited. It can be round off for loading the ISP help desk and services as a part of themonthlyflat rate. It is simplifiedarchitecture which is needed connectinglarge number of users through one or more ISP. The remote connection fortravelingsales is connected fortraveling sales for connecting over 56 kbps. It focuses onbranchof office which can connect T1 speeds by making use of router [2].Costentertainmentanditsaccountabilityarealso improvedbytheVPNstructureasoneleverageISP administration forchargebacktosystem. The whole capital cost can be easily reducing because the individual pays for ISPaccess.ISPismainlyresponsibleforrequired establishing connectivity. It merely focuses on investment oncertainnumber of equipment for remote user access for ISP. A VPN can be defined as a virtual platform which helps in gaining benefit from network communication which is availableoninternet. Anindividualcaneasilyconduct business onremoteplatform by making use ofInternet. It is considered to becost-effectiveprivate lines whichtendto empower employees. It mainly tends to operate inhighly competitive business environment. An individual can easily havecompetitiveadvantage by dependingonVPN [10]. It is mainly done so that they evolve network inmorerapid way. It is mainly done so that any competitors can be done with major investment in the whole network. With the changing time, the need of the network will be changing the major
changes in the whole infrastructure. It tends to improve the overall scalability of the private network. It aims in having easyaccess to equipment which can be addedanadditional ISP based connection [17]. It emphasizes easy access to equipment which can shift additional equipment’s that run oninternet. Fig 1: Basic VPN Source: [1] Both cost saving and simplified way of managementare considered to bebenefitfor VPN. An individual can easily gainhugeamount of competitive advantage from VPN. It is mainly done forguaranteeof the security information which is transmitted on the network. At present, online business activity is not very much limited to communication and harmless access to public documents [18]. For various IT organization, security tends to play the key role in the implementation of VPN.Withthe help ofprivatenetwork, one can easily help in controlling the flow of information. Secure remote access over VPNs which can be achieved by businessapplication.Itfocusesonemployingsecurity services which can be used for encrypting information and authenticateuserfor any kind of network access. III.CHALLENGES, DRAWBACKS,ANDSOLUTION Encryption is one layer of protection which focus on confidentiality and integrity of given data which is needed for seeding, receiving and storing. It can be easily achieved withthe help of encryption technology. Credit card numbers alsomakepersonal information and trade secret. Thereis largenumber of confidential files which are there in the network devices and unprotected [19]. One of the best of encryptinginformationisallaboutuseofencryption technology.Encryptionfocusesoncertainnumberof technology so it canbenefitso that an individual can easily gain access tonetwork. The present business tends to exits at the given speed of thought and data needs to be transmitted topublicnetwork for open and public networks which cannot be trusted. One of the best ways is all aboutgainingaccesstonetworkwhich is donewiththe help of encryption. It merely highlights the fact that information can flow invariouspublic network which is important for looking for eyes. Integrityof data is considered to be important for rest and transit which is important for any business purpose. The electronic orders come up with the request of more than 100,000unitswhichisquitedifferentinnature.An individual need to be confident so that no can hold of the confidential information and changes. It can easily conduct e-business on the public network. Encryption technologies aimto provideoptionof booby trap. VPNisconsidered to beprivateencrypted tunnel which is needed for protecting all the required information as it travelsinthepublicnetwork.Forprovidingcomplete solution, an individual need to be aware of the authenticity of users. In the attempt of identifyinglargenumber of users, many kinds of VPN are protected by password mechanism. Passwordcannot ensure access as they are considered to be weakmethod of security.Passwordcan be easily guessed, stolen and compromised and the user does not have any idea who is on another side of the VPN. As an individualhasgained knowledge about the VPN securitythatisauthentication.Itisallaboutmaking identificationand verification of authenticity ofuser. It plays a key role in gainingeasyaccess to important data for both assets and resources. Password tends to play the weakest role and widely used as the authentication of data. It helps the user in protecting itwiththe help ofpassword.Password cannot alone be used for securing the remote access. It is considered to be as weak form as it can be easily stolen or even compromised. This particular method of authentication is considered to be much stronger than password as it requires twoformsof identification before getting access. It is much like bank ATMwhereuserknownboththePINandhavethe authentication device that issmartcard. RSA is considered to betimesecuredtokenswhichcanprovidestrong authenticationwhichisneededbyUserforpresenting something. The tokens are mainly designed in such a way that it is very much easy to use. It comes up with deploying option which is needed for replacing password. A weak form of authentication that is it can be easily guessed or even compromised. Digital Certificates are considered to beaweak form of authentication. It is becoming widespread due togrowthof internet-based connection. Digital certificates are needed for identifying some digital credentials whichareused by some of the rightful owners. Digital certificates come up with two strong factor authentication which has the abilityto protect web browser credential scores. Introduction of both smart cards and USB tokens are considered to be as one of the strongest methods of providing authenticate services. It does notprovideaccesstosmartcardbuttotwo-factor authentications [21]. But a pair of cards can be used for both storing and generation of smart card or USB. The private key never tends to leave card or token so that it can be never be utilized or even copied to a given server. By the introduction ofthirdfactors like biometrics, an individual can easily achieve the best level of authentication. Biometrics can be considered to be characteristic which is unique to a user [11]. This particular measurement can be donebythe help of fingerprint, voice printing and lastly retinal scanning. It isthird-factorauthentication which is combined with some of the certificate stores or even USB token which is impenetrable in nature. VPN access can be easily protected by the help of password. It tends to offerweakform of authentication which can be guessed ineasyway. It is used because stolen or even compromised. And many times, experts are not available as they can be hacked through password protection.
A large number of system software tools are available like NT crack and LOPhtcrack. It can be considered to be as an automated way of guessing password which is done through brute force along with extensive dictionaries. This particular approach is considered to bebestone which is needed for understanding the password. Fig 2: Challenges in VPN Source: [5] Network monitoring also isknownas sniffing ofnetwork can be considered to be based oncertainnumber of facts. Ethernet route all the given network traffic for some past based individual user [9]. It is easily captured which is needed for managing some of the special nodes. Brute force dialing is another kind of program like ToneLoc which is automatedfortheprocessingoflocatingmodem-based telephone lines. When a particular line is found it merely focus oncertainnumber of attempts for which password alternatives. At present, many kinds of tools have been designed for both controlling and improving the given network which can be used fordestructivepurpose [17]. Tools like SATAN (System Administrator Tool for Analyzing Network) can be used for analyzing the given networks. It has been merely designed so that it can help the managers in providing strength to the given network. IV.CONCLUSION From the above pages that this report is all about VPN. In the last few years, VPNhasemerged as the main technology for reducingtheremote accessto cost.Itcan provide various kind of transaction throughinternet. VPN aims to providetremendousamount of business value if and only if they can provideproperlevel of security forguaranteeof privacy and integrity ofcorporateinformation. It can be only accessed by some of theauthenticatedusers. Each of theVPNaimstoprovideproperlevelofsecurityfor providingguaranteeofbothprivacyandintegrityof corporateinformationaccessedbyauthenticatingusers. EachofthegivenVPNneedstoprovidesecurityfor preventing of unauthorized view ofnetwork. It emphasizes identifying each of the user and data is even passed by the helpofinternet.Networksecurityisconsideredtobe improvingtheoverallimportanceoforganizationof differentsize.Itisallaboutprotectingtherequired information which is needed fortransportof information in remoteaccessandbranchconnectionoreveninternal networks. VPN technology has been designed in such a way that it can easily provide the coming appearance ofnetwork. Itismainlyusedforunderstandingtheuseofshared network for understanding the physical connection. VPN intends to exploit the overall benefits of the given public network along with compromising with the overall security of the network. VPN intends to open up some new kind of option for implementing e-business application. It is mainly needed for extending the implementation of e-business for customer accesstoworldwide places. FUTUREWORKS VPN technology can be still considered to be in its infancy stage.Butinthelastfewyears,VPNtechnologyhas evolvedalotanddemonstratedalargenumberof advantages which has been promised. VPN is a global technologywhichislinkedtosomeofthevarious geographic regions of the world. Adaptation of technology like QoS will help the vendors in reducing issues related to interoperability.Bothimplementationandproper management of VPN can easily become complex forlarge number of organizations. REFERENCES [1] Völp, M., Asmussen, N., Härtig, H., Nöthen, B. and Fettweis, G., 2015, September. Towards dependable CPS infrastructures:Architecturalandoperating-system challenges.InEmergingTechnologies&Factory Automation (ETFA), 2015 IEEE 20th Conference on (pp. 1- 8). IEEE. [2] Bugeja, J., Jacobsson, A. and Davidsson, P., 2016, August.Onprivacyandsecuritychallengesinsmart connected homes. In Intelligence and Security Informatics Conference (EISIC), 2016 European (pp. 172-175). IEEE. [3] Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security incloudcomputing:Opportunitiesandchallenges. Information sciences, 305, pp.357-383. [4] Dorri, A., Steger, M., Kanhere, S.S. and Jurdak, R., 2017.Blockchain:Adistributedsolutiontoautomotive securityandprivacy.IEEECommunicationsMagazine, 55(12), pp.119-125. [5] Vasilakos, A.V., Li, Z., Simon, G. and You, W., 2015. Information-centricnetwork:Researchchallengesand opportunities.Journalofnetworkandcomputer applications, 52, pp.1-10. [6] Gurtov, A., Liyanage, M. and Korzun, D., 2016. Secure communicationanddataprocessingchallengesinthe industrial internet. Baltic Journal of Modern Computing, 4(4), p.1058. [7] Ahmad, I., Liyanage, M., Ylianttila, M. and Gurtov, A., 2017, June. Analysis ofdeploymentchallenges of Host IdentityProtocol.InNetworksandCommunications (EuCNC), 2017 European Conference on (pp. 1-6). IEEE. [8]Wallis,K.andReich,C.,2016.SecureZero ConfigurationofIoTDevices-ASurvey.BW-CAR| SINCOM, 59. [9] Airehrour, D., Gutierrez, J.andRay, S.K., 2016. Secure routing forinternetof things: A survey. Journal of Network and Computer Applications, 66, pp.198-213. [10]Alcaraz,C.andZeadally,S.,2015.Critical infrastructure protection: Requirements and challenges for the21stcentury.Internationaljournalofcritical infrastructure protection, 8, pp.53-66.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
[11]Dincer,C.andZeydan,E.,2017,June.Bigdata security:Requirements,challengesandpreservationof privatedatainsidemobileoperators.InBlackSea ConferenceonCommunicationsandNetworking (BlackSeaCom), 2017 IEEE International (pp. 1-6). IEEE. [12]Moura,J.andHutchison,D.,2016.Reviewand analysisofnetworkingchallengesincloudcomputing. Journal of Network and Computer Applications, 60, pp.113- 129. [13] Joshi, R.H., Rathi, D.P., Khan, A. and Jain, M., 2018. A Survey on Various Security Issues and Challenges to Secure Cloud Computing. [14] Shankar, R. and Duraisamy, S., 2018. Different Service ModelsandDeploymentModelsofCloudComputing: Challenges. [15]Shand,C.,Taylor,G.,Stewart,E.,Roberts,C., Mcmorran,A.andMohapatra,P.,2017.Improving actionable observability of large distribution networks for transmission operators to support improved system control, faultdetectionandmitigation.CIRED-OpenAccess Proceedings Journal, 2017(1), pp.1215-1218. [16] Osmani, L., Toor, S., Komu, M., Kortelainen, M.J., Lindén, T., White, J., Khan, R., Eerola, P. and Tarkoma, S., 2018. Secure cloud connectivity for scientific applications. IEEE Transactions on Services Computing, 11(4), pp.658- 670. [17] Samaila, M.G., Neto, M., Fernandes, D.A., Freire, M.M.andInácio,P.R.,2018.Challengesofsecuring Internetof Things devices: A survey. Security and Privacy, 1(2), p.e20. [18] Ali, M.N.B., Hossain, M.E. and Parvez, M.M., 2015. Design and Implementation of a Secure Campus Network. InternationalJournalofEmergingTechnologyand Advanced Engineering, 5(7), pp.370-374. [19] Liyanage, M., Ylianttila, M. and Gurtov, A., 2017, October.SoftwaredefinedVPLSarchitectures: Opportunitiesandchallenges.InPersonal,Indoor,and Mobile Radio Communications (PIMRC), 2017 IEEE 28th Annual International Symposium on (pp. 1-7). IEEE. [20] Moreno-Vozmediano, R., Montero, R.S., Huedo, E. and Llorente, I.M., 2017. Cross-site virtual network in cloud and fog computing. IEEE Cloud Computing, (2), pp.46-53. [21]Partridge,C.,Nelson,S.andKong,D.,2017, September. Realizing a virtual private network using named datanetworking.InProceedingsofthe4thACM Conference on Information-Centric Networking (pp. 156- 162). ACM. [22] Downer, K. and Bhattacharya, M., 2015, December. BYODsecurity:Anewbusinesschallenge.InSmart City/SocialCom/SustainCom(SmartCity),2015IEEE International Conference on (pp. 1128-1133). IEEE.