Virtual Private Networks (VPN) Technologies and Security Issues Report
VerifiedAdded on 2023/01/04
|6
|3751
|56
Report
AI Summary
This report provides an analysis of Virtual Private Networks (VPNs), focusing on their significance, technologies, and security issues. It delves into the history of VPNs, tracing their evolution from the 1990s to their current widespread use in business and corporate sectors for secure data transfer. The report examines the advantages of VPNs, such as encryption and authentication, in mitigating security threats. It explores various security risks, including logging, denial-of-service attacks, and data breaches, and reviews the opinions of several authors on VPN security. The report emphasizes the importance of encryption, authentication, and other security measures to control and manage threats, and concludes by highlighting the need for advanced security systems to address evolving cybercrimes. The report covers topics like remote access VPNs, site-to-site VPNs and also discusses the importance of firewalls to manage network traffic.

Virtual Private
Network
Network
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

VIRTUAL PRIVATE NETWORK 1
Abstract
VPN is one of the best networks for sending and
receiving data over fewer security networks and it
also improves the performance networks. This type
of network used by many companies and business
industries in order to send data in an effective
manner. The major advantage of the virtual private
network is that it protects communication networks
and servers form unauthentic servers and reduce
the level of security risks. However, a virtual
private network is mainly utilized in the field of
corporate sectors for improving the overall
performance of wireless networks. It is observed
that such kind of wireless network allows
consumers for creating and implementing a secure
connection with another computer server. The
objective of this research is to analyse the concept
of a virtual private network and evaluate the
challenges and risks associated with the VPN
networks. The literature review focuses on virtual
private networks security and discusses the
opinions of other authors in order to improve the
effectiveness of the paper. This paper shows that
the security of VPN networks can be increased with
the help of encryption and authentic networks that
have the potential to control and manage risks and
threats faced by virtual private networks. In further
research, the researcher will improve the
effectiveness of the paper and suggest better
techniques for avoiding security threats and risks
occurred in VPN networks.
KeyWords: virtual private networks,
communication networks, encryption and
authentication
Introduction
The term VPN is defined as the virtual private
network which enables consumers to transfer and
receive data or information by using public
networks. It is one of the common types of the
network which is used in a communication system
for exchanging information from one network to
another. Security is a biggest concern in the IT
which impact on the user’s private details [1]. A
virtual private network is one of the best networks
that reduce the level of security threats and issues
by encrypting the data or information of users. The
aim of this research is to analyse the importance of
virtual private networks and critically review the
security risks linked with virtual private networks.
The major focuses of this study are to understand
the challenges and problems linked with virtual
private networks and address security-related issues
[2].
A recent study identified that virtual private
network generates a secure and private system over
a less secure network, for example, public internet.
The encryption is a very common technique used
by users during communication and virtual private
networks also encrypt the data files which cannot
be accessed by hackers without user’s permission.
Moreover, the security level and include encoding
also addresses the creating and getting networks.
This study will conduct a works appraisal to
analyse the opinions of authors and review the
results and findings of previous research studies. In
this modern era, the use of virtual private networks
are growing rapidly due to security benefits and it
is widely used in the business industries and
companies for exchanging information from one
place to another. This report is divided into several
sections for example; the history of virtual private
networks, the background of the study, literature
review, security issues linked with virtual private
networks and proposed solutions.
History of virtual private networks
The past of virtual private networks starts back in
1996 when employees of Microsoft developed the
peer to peer tunnelling network. In the year 1999,
the virtual private networks were launched and
used the concept of the virtual network in
companies [3]. Organizations required a secure and
private network in order to exchange data and VPN
networks helped them and improved the overall
security of the system. Vendors for example
checkpoint, cisco and other developed and
implemented virtual private networks for
improving the performance of communication
system. Today, this information technology is
considered as a standard feature which is widely
implemented throughout most organizations [4].
Point to point tunnel protocol is one of the best
virtual private networks that have the ability to
control and manage the communication system
used by companies and users. In last five years, the
use of virtual private networks has increased by
45% because of their high level of security and it
also maintains the gap between transmitter and
receiver system for improving the security of data
and information.
Virtual Private Network
Abstract
VPN is one of the best networks for sending and
receiving data over fewer security networks and it
also improves the performance networks. This type
of network used by many companies and business
industries in order to send data in an effective
manner. The major advantage of the virtual private
network is that it protects communication networks
and servers form unauthentic servers and reduce
the level of security risks. However, a virtual
private network is mainly utilized in the field of
corporate sectors for improving the overall
performance of wireless networks. It is observed
that such kind of wireless network allows
consumers for creating and implementing a secure
connection with another computer server. The
objective of this research is to analyse the concept
of a virtual private network and evaluate the
challenges and risks associated with the VPN
networks. The literature review focuses on virtual
private networks security and discusses the
opinions of other authors in order to improve the
effectiveness of the paper. This paper shows that
the security of VPN networks can be increased with
the help of encryption and authentic networks that
have the potential to control and manage risks and
threats faced by virtual private networks. In further
research, the researcher will improve the
effectiveness of the paper and suggest better
techniques for avoiding security threats and risks
occurred in VPN networks.
KeyWords: virtual private networks,
communication networks, encryption and
authentication
Introduction
The term VPN is defined as the virtual private
network which enables consumers to transfer and
receive data or information by using public
networks. It is one of the common types of the
network which is used in a communication system
for exchanging information from one network to
another. Security is a biggest concern in the IT
which impact on the user’s private details [1]. A
virtual private network is one of the best networks
that reduce the level of security threats and issues
by encrypting the data or information of users. The
aim of this research is to analyse the importance of
virtual private networks and critically review the
security risks linked with virtual private networks.
The major focuses of this study are to understand
the challenges and problems linked with virtual
private networks and address security-related issues
[2].
A recent study identified that virtual private
network generates a secure and private system over
a less secure network, for example, public internet.
The encryption is a very common technique used
by users during communication and virtual private
networks also encrypt the data files which cannot
be accessed by hackers without user’s permission.
Moreover, the security level and include encoding
also addresses the creating and getting networks.
This study will conduct a works appraisal to
analyse the opinions of authors and review the
results and findings of previous research studies. In
this modern era, the use of virtual private networks
are growing rapidly due to security benefits and it
is widely used in the business industries and
companies for exchanging information from one
place to another. This report is divided into several
sections for example; the history of virtual private
networks, the background of the study, literature
review, security issues linked with virtual private
networks and proposed solutions.
History of virtual private networks
The past of virtual private networks starts back in
1996 when employees of Microsoft developed the
peer to peer tunnelling network. In the year 1999,
the virtual private networks were launched and
used the concept of the virtual network in
companies [3]. Organizations required a secure and
private network in order to exchange data and VPN
networks helped them and improved the overall
security of the system. Vendors for example
checkpoint, cisco and other developed and
implemented virtual private networks for
improving the performance of communication
system. Today, this information technology is
considered as a standard feature which is widely
implemented throughout most organizations [4].
Point to point tunnel protocol is one of the best
virtual private networks that have the ability to
control and manage the communication system
used by companies and users. In last five years, the
use of virtual private networks has increased by
45% because of their high level of security and it
also maintains the gap between transmitter and
receiver system for improving the security of data
and information.
Virtual Private Network

VIRTUAL PRIVATE NETWORK 2
Background of the study
A virtual private network is a kind of technique
which is used by users for creating a secure
network for communication and reduces the
problems and issues linked with the communication
networks. It is observed that a virtual private
network works by using the shared public network
and tunnelling network protocols. A recent study
identified that the term virtual private network is an
encrypted technique which is mainly used in the
field of communication for sharing data or
information over internet protocols. This type of
network can be used for accessing region restricted
servers and improving the overall efficiency of the
networks. moreover, such type of network devices
are used in the business industries for connecting
two or more devices with the other and exchange
data or information from one device to another.
When any consumer connects their devices with a
virtual private network then it provides a way to
control and monitor the overall communication
system in an effective manner.
The major concern with the virtual private network
is security issues which impact on the overall
performance of the system. There are various kinds
of security issues occurred in the field of virtual
private networks such as a denial of service attack,
ad-hoc, configuration conflict, phishing and so on.
Therefore, security-related issues occurred in VPN
networks can be maintained with the help of
several techniques such as softether VPN,
Microsoft direct access and encryption technique
[5]. Therefore, many consumers and companies are
focusing on the security and privacy of virtual
private networks but communication networks are
directly linked with the data breach and attacks
which also affect overall security systems. The
researchers suggested that firewall is another
security tool which can be used with virtual private
networks because it has the ability to control and
manage the traffic signals linked with the computer
servers and networks [6].
Literature review
Virtual private network security is one of the
common topics for research and there are many
authors provided their viewpoints on challenges
and issues faced by virtual private networks. This
section provides in-depth analysis of VPN
networks and highlights the security issues linked
with VPN servers.
According to Wang, Wei, and Vangury, (2014) the
virtual private network is a very advanced network
which can be used for sending data over a network
because it is cost effective technique rather than
other networks. From this paper, it is analysed that
virtual private networks improve the
communication process and provide a way for
reducing errors and issues which impact on the
performance of networks [7]. A remote access VPN
connection is developed with the help of wireless
networks which interconnect two or more devices
with each other. It is analysed that the virtual
private networks improve authentication of servers
and block the unwanted signals from
communication systems.
Xu, Huang, and Tsai, (2014) suggested that a VPN
network is produced by founding a point to point
joining by using devoted networks and traffic
encryptions. It is observed that the major
implementation of virtual private networks
involves major two techniques such as IPsec and
Open VPN. After analysing this paper it has found
that there are major two kinds of virtual private
networks used in the communication systems such
as remote access and site to site. A remote access
VPN technique is a very common network which is
mainly used in companies and business industries
for connecting two or more networks with each
other. However, site to site VPN is defined as the
connectivity system which provides
communication between two or more VPN
gateways.
According to Harfoushi, et al., (2014) the
fundamental concept of the virtual private network
is completely based on the MPLS which uses
isolation of routing and addresses the security risks
linked with networks. It is observed that VPN
networks are also linked with the security risks
because it uses internet connectivity for exchanging
information and hackers send traffic signals over
the VPN network using the internet. From this
paper, it is observed that attacker targeted on the
computer servers and routers in order to access data
and information of consumers. According to Bays,
et al., (2015) in virtual private networks, users are
directly linked with the internet and attackers
attacks on the IP addresses of user’s networks in
order to detect their data and information.
The authors argued that ad-hoc is one of the
common security issues occurred in the field of
virtual private networks and its impacts on the
user's peripheral devices such as mobile devices
and computer systems [8]. It is observed that the
virtual private network is more reliable and flexible
rather than other but it is also associated with data
breaching and security threats. Because of security
vulnerabilities, users may be lost their personal
information and it is increasing very fast because
many users use unauthentic servers and networks
along with the virtual private networks which
create data breach problems. In the last few years,
the problem of a data breach has increased by 44%
due to lack of security and many hackers targeted
Background of the study
A virtual private network is a kind of technique
which is used by users for creating a secure
network for communication and reduces the
problems and issues linked with the communication
networks. It is observed that a virtual private
network works by using the shared public network
and tunnelling network protocols. A recent study
identified that the term virtual private network is an
encrypted technique which is mainly used in the
field of communication for sharing data or
information over internet protocols. This type of
network can be used for accessing region restricted
servers and improving the overall efficiency of the
networks. moreover, such type of network devices
are used in the business industries for connecting
two or more devices with the other and exchange
data or information from one device to another.
When any consumer connects their devices with a
virtual private network then it provides a way to
control and monitor the overall communication
system in an effective manner.
The major concern with the virtual private network
is security issues which impact on the overall
performance of the system. There are various kinds
of security issues occurred in the field of virtual
private networks such as a denial of service attack,
ad-hoc, configuration conflict, phishing and so on.
Therefore, security-related issues occurred in VPN
networks can be maintained with the help of
several techniques such as softether VPN,
Microsoft direct access and encryption technique
[5]. Therefore, many consumers and companies are
focusing on the security and privacy of virtual
private networks but communication networks are
directly linked with the data breach and attacks
which also affect overall security systems. The
researchers suggested that firewall is another
security tool which can be used with virtual private
networks because it has the ability to control and
manage the traffic signals linked with the computer
servers and networks [6].
Literature review
Virtual private network security is one of the
common topics for research and there are many
authors provided their viewpoints on challenges
and issues faced by virtual private networks. This
section provides in-depth analysis of VPN
networks and highlights the security issues linked
with VPN servers.
According to Wang, Wei, and Vangury, (2014) the
virtual private network is a very advanced network
which can be used for sending data over a network
because it is cost effective technique rather than
other networks. From this paper, it is analysed that
virtual private networks improve the
communication process and provide a way for
reducing errors and issues which impact on the
performance of networks [7]. A remote access VPN
connection is developed with the help of wireless
networks which interconnect two or more devices
with each other. It is analysed that the virtual
private networks improve authentication of servers
and block the unwanted signals from
communication systems.
Xu, Huang, and Tsai, (2014) suggested that a VPN
network is produced by founding a point to point
joining by using devoted networks and traffic
encryptions. It is observed that the major
implementation of virtual private networks
involves major two techniques such as IPsec and
Open VPN. After analysing this paper it has found
that there are major two kinds of virtual private
networks used in the communication systems such
as remote access and site to site. A remote access
VPN technique is a very common network which is
mainly used in companies and business industries
for connecting two or more networks with each
other. However, site to site VPN is defined as the
connectivity system which provides
communication between two or more VPN
gateways.
According to Harfoushi, et al., (2014) the
fundamental concept of the virtual private network
is completely based on the MPLS which uses
isolation of routing and addresses the security risks
linked with networks. It is observed that VPN
networks are also linked with the security risks
because it uses internet connectivity for exchanging
information and hackers send traffic signals over
the VPN network using the internet. From this
paper, it is observed that attacker targeted on the
computer servers and routers in order to access data
and information of consumers. According to Bays,
et al., (2015) in virtual private networks, users are
directly linked with the internet and attackers
attacks on the IP addresses of user’s networks in
order to detect their data and information.
The authors argued that ad-hoc is one of the
common security issues occurred in the field of
virtual private networks and its impacts on the
user's peripheral devices such as mobile devices
and computer systems [8]. It is observed that the
virtual private network is more reliable and flexible
rather than other but it is also associated with data
breaching and security threats. Because of security
vulnerabilities, users may be lost their personal
information and it is increasing very fast because
many users use unauthentic servers and networks
along with the virtual private networks which
create data breach problems. In the last few years,
the problem of a data breach has increased by 44%
due to lack of security and many hackers targeted
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

VIRTUAL PRIVATE NETWORK 3
virtual private networks and enters into the servers
and networks.
Goyal, (2014) identified that brute force attack also
occurs in the case of VPN networks because virtual
private networks connect two or more servers with
each other. This paper is completely based on the
virtual private networks and identified the risk
factors linked with the VPN networks. The authors
conducted a literature review in order to analyse the
opinions of other experts and reviewed that security
issues occurred when users use third-party
applications and connect their VPN networks with
unauthentic servers.
A recent study conducted by Han, Gopalakrishnan,
Ji, and Lee, (2015) identified that due to the
improper connection between VPN and other
devices hackers can easily break the security and
computer servers and collect private details of
users. There are many VPN networks available
which are developed by hackers and third-party
developer due to which consumers can suffer from
data breach and cyber-attacks. According to
Bugeja, Jacobsson, and Davidsson, (2016), the
virtual private networks deliver very simple access
from the internet into corporate networks and
servers.
Simple authentication networks can lead security
risks because they cannot protect servers and
networks from hackers and criminals use strong
application for accessing the private details of
users. Malware is one of the common attacks which
also occur in the field of virtual private networks
where criminals send unwanted signals and virus to
the user’s networks. Such kind of viruses and
signals are developed with the help of botnet and
malicious software and its impacts on the overall
performance of computer devices along with virtual
private networks. Liang, and Yu, (2015) suggested
that the proper configuration and advanced security
systems can be used for controlling and monitoring
security issues faced by virtual private networks. it
is observed that the virtual private networks
transmit data with the help of internet which also
increase the rate of cyber-crimes because attackers
use the internet as a source for accessing data and
information of users without their permission and it
can be done with the help of virtual private
networks.
Security issues in virtual private networks
There are various kinds of security issues occurred
in the field of virtual private networks which are
described below:
Logging
It is one of the common kind of risk occurred in the
case of virtual private networks because logging is
a grey area where privacy of users may be reduced
by the attackers and numbers of logging attempts
may increase the rate of cyber-attacks in computer
networks [1]. Such kind of problem mainly occurs
in the free virtual private networks because these
are developed and produced by the hackers in order
to access the personal information of user’s
networks. Mainly, paid virtual private networks do
not produce this type of security risk because they
provide a private key for accessing data
communication networks used in the system. it is
observed that there are major two kinds of logs
occur in the case of VPN networks such as
connection bases and user based. However, the
connection based logging may not involve any IP
address or other personal identity but user base
logging system stores the IP address and other
confidential information of users.
Data breach or leaks
A recent study evaluated that the data breach
related issues occurred due to lack of proper
security and use of unwanted links which are linked
with the VPN networks. mainly, hackers use
advanced computer programmes for accessing data
of users for which they attack virtual private
networks and enter into their system with the help
of internet connectivity after that they encrypt their
personal information. A data leak can disclose the
physical location and online activities of consumers
and companies without their permission and it
occurs due to lack of privacy or legislation.
User authentication
It is observed that the term VPN does not give solid
customer validation. Due to lack of proper
authentication users were lost their personal
information. Many virtual private networks
implementations provide limited authentication
techniques. An outsider could catch this data and
use it to increase consequent access to the system
[9].
Client-side risks
The virtual private networks is directly associated
with the Internet by means of a standard broadband
association which also increase the issue of data
breach. This may signify a hazard to the personal
system linked with the computer networks. [2].
Therefore, it is identified that the client side risk
also enhances the rate of cyber-crimes and security
threats.
Virus and malware attacks
Virus and malware bot are very common attacks
occur in the area of virtual private networks. In
which hackers produce large amount of traffic
virtual private networks and enters into the servers
and networks.
Goyal, (2014) identified that brute force attack also
occurs in the case of VPN networks because virtual
private networks connect two or more servers with
each other. This paper is completely based on the
virtual private networks and identified the risk
factors linked with the VPN networks. The authors
conducted a literature review in order to analyse the
opinions of other experts and reviewed that security
issues occurred when users use third-party
applications and connect their VPN networks with
unauthentic servers.
A recent study conducted by Han, Gopalakrishnan,
Ji, and Lee, (2015) identified that due to the
improper connection between VPN and other
devices hackers can easily break the security and
computer servers and collect private details of
users. There are many VPN networks available
which are developed by hackers and third-party
developer due to which consumers can suffer from
data breach and cyber-attacks. According to
Bugeja, Jacobsson, and Davidsson, (2016), the
virtual private networks deliver very simple access
from the internet into corporate networks and
servers.
Simple authentication networks can lead security
risks because they cannot protect servers and
networks from hackers and criminals use strong
application for accessing the private details of
users. Malware is one of the common attacks which
also occur in the field of virtual private networks
where criminals send unwanted signals and virus to
the user’s networks. Such kind of viruses and
signals are developed with the help of botnet and
malicious software and its impacts on the overall
performance of computer devices along with virtual
private networks. Liang, and Yu, (2015) suggested
that the proper configuration and advanced security
systems can be used for controlling and monitoring
security issues faced by virtual private networks. it
is observed that the virtual private networks
transmit data with the help of internet which also
increase the rate of cyber-crimes because attackers
use the internet as a source for accessing data and
information of users without their permission and it
can be done with the help of virtual private
networks.
Security issues in virtual private networks
There are various kinds of security issues occurred
in the field of virtual private networks which are
described below:
Logging
It is one of the common kind of risk occurred in the
case of virtual private networks because logging is
a grey area where privacy of users may be reduced
by the attackers and numbers of logging attempts
may increase the rate of cyber-attacks in computer
networks [1]. Such kind of problem mainly occurs
in the free virtual private networks because these
are developed and produced by the hackers in order
to access the personal information of user’s
networks. Mainly, paid virtual private networks do
not produce this type of security risk because they
provide a private key for accessing data
communication networks used in the system. it is
observed that there are major two kinds of logs
occur in the case of VPN networks such as
connection bases and user based. However, the
connection based logging may not involve any IP
address or other personal identity but user base
logging system stores the IP address and other
confidential information of users.
Data breach or leaks
A recent study evaluated that the data breach
related issues occurred due to lack of proper
security and use of unwanted links which are linked
with the VPN networks. mainly, hackers use
advanced computer programmes for accessing data
of users for which they attack virtual private
networks and enter into their system with the help
of internet connectivity after that they encrypt their
personal information. A data leak can disclose the
physical location and online activities of consumers
and companies without their permission and it
occurs due to lack of privacy or legislation.
User authentication
It is observed that the term VPN does not give solid
customer validation. Due to lack of proper
authentication users were lost their personal
information. Many virtual private networks
implementations provide limited authentication
techniques. An outsider could catch this data and
use it to increase consequent access to the system
[9].
Client-side risks
The virtual private networks is directly associated
with the Internet by means of a standard broadband
association which also increase the issue of data
breach. This may signify a hazard to the personal
system linked with the computer networks. [2].
Therefore, it is identified that the client side risk
also enhances the rate of cyber-crimes and security
threats.
Virus and malware attacks
Virus and malware bot are very common attacks
occur in the area of virtual private networks. In
which hackers produce large amount of traffic
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

VIRTUAL PRIVATE NETWORK 4
signals and viruses with the help of malware
software and transfer to the networks used by
consumers. These viruses and traffic signals block
the personal information and data of consumers and
also reduce the overall performance of the virtual
private networks and many companies also suffer
such kind of issues while transferring data from one
location to another.
Collecting and selling personal data
Certain free VPN administrations can possibly
continue running and spread their surprising
expenses on the off chance that they gather
information about you and offer these to outsider
advertisers or whoever pays a decent cost for them.
Mainly, hackers collect data of consumers by
blocking the VPN servers and sell these data sets to
third-party developers in order to earn money.
Therefore all these are security challenges and risks
liked with the virtual private networks due to which
consumers may lose their private details and
information [3].
The proposed solution for improving VPN
security
Encryption and Virtual IP Addresses
VPNs give a few one of kind highlights to guard
you on the web. Two of the most significant are
encryption and virtual IP addresses. Encryption
secures information a layer of unbreakable code.
With this setup, your data winds up
incomprehensible to outsiders, including digital
hoodlums, government offices, and ISPs. Nobody
can perceive what you're downloading, or which
sites you're chatting with a VPN set up [10].
Possible authentication method
Authentication is one of the best technique for
improving the security of VPN networks and it
provides a platform to avoid security threats and
risks. Therefore, consumers should use only
authentic server and networks during the
communication process because unauthorized
networks can lead to security risk in VPN networks
[4].
Limited VPN access
It is another technique for reducing the security
issues and threats in virtual private networks and
improves the overall performance of networks. A
VPN association is a way to your LAN, and should
possibly be open when it should be. Remote
workers ought to be debilitated from associating
with the VPN the entire day to check email.
There are few other steps which can be used for
improving the security of VPN networks such as:
Use updated software
Follow proper configuration
Use secured networks and servers
Avoid unwanted links and third-party
applications
Improve the security of E-mails with the
help of robust technology
Provide access to the selected files and
manage personal data or information by
using backup plans [5].
Advantages and drawbacks of VPN
Advantages
More reliable
Very easy to configure
Simple and easy to understand and apply
More flexible rather than other networks
Drawbacks of VPNs
Less secure
More costly
Conclusion
This research paper is completely based on the
virtual private networks and provided in-depth
analysis of virtual private network issues. From the
above discussion, it has concluded that virtual
private network is a very best network which can
be used for sending and receiving data over a
network. Security is one of the biggest concerns
with VPN networks which also impact on the
overall performance of networks and systems. This
report identified the challenges and issues linked
with virtual private networks and suggested several
techniques for improving the security of VPN
networks. it is identified that lack of security and
use of unauthentic server both are major risk
factors that increase the issue of data breach and
cyber-crimes. Therefore, it is suggested that
consumers should use only authentic server and use
encryption technique while sending or receiving
data using VPN networks. Moreover, they can
adopt firewall, antivirus and robust technologies for
improving the privacy of VPN networks.
Future research
In future, this research will improve the
effectiveness of the paper and avoid drawbacks of
the current investigation. Moreover, the authors
will provide complete information about the
challenges and issues faced by virtual private
networks and also critically review the proposed
solution for avoiding security threats and risks
linked with the VPN networks.
signals and viruses with the help of malware
software and transfer to the networks used by
consumers. These viruses and traffic signals block
the personal information and data of consumers and
also reduce the overall performance of the virtual
private networks and many companies also suffer
such kind of issues while transferring data from one
location to another.
Collecting and selling personal data
Certain free VPN administrations can possibly
continue running and spread their surprising
expenses on the off chance that they gather
information about you and offer these to outsider
advertisers or whoever pays a decent cost for them.
Mainly, hackers collect data of consumers by
blocking the VPN servers and sell these data sets to
third-party developers in order to earn money.
Therefore all these are security challenges and risks
liked with the virtual private networks due to which
consumers may lose their private details and
information [3].
The proposed solution for improving VPN
security
Encryption and Virtual IP Addresses
VPNs give a few one of kind highlights to guard
you on the web. Two of the most significant are
encryption and virtual IP addresses. Encryption
secures information a layer of unbreakable code.
With this setup, your data winds up
incomprehensible to outsiders, including digital
hoodlums, government offices, and ISPs. Nobody
can perceive what you're downloading, or which
sites you're chatting with a VPN set up [10].
Possible authentication method
Authentication is one of the best technique for
improving the security of VPN networks and it
provides a platform to avoid security threats and
risks. Therefore, consumers should use only
authentic server and networks during the
communication process because unauthorized
networks can lead to security risk in VPN networks
[4].
Limited VPN access
It is another technique for reducing the security
issues and threats in virtual private networks and
improves the overall performance of networks. A
VPN association is a way to your LAN, and should
possibly be open when it should be. Remote
workers ought to be debilitated from associating
with the VPN the entire day to check email.
There are few other steps which can be used for
improving the security of VPN networks such as:
Use updated software
Follow proper configuration
Use secured networks and servers
Avoid unwanted links and third-party
applications
Improve the security of E-mails with the
help of robust technology
Provide access to the selected files and
manage personal data or information by
using backup plans [5].
Advantages and drawbacks of VPN
Advantages
More reliable
Very easy to configure
Simple and easy to understand and apply
More flexible rather than other networks
Drawbacks of VPNs
Less secure
More costly
Conclusion
This research paper is completely based on the
virtual private networks and provided in-depth
analysis of virtual private network issues. From the
above discussion, it has concluded that virtual
private network is a very best network which can
be used for sending and receiving data over a
network. Security is one of the biggest concerns
with VPN networks which also impact on the
overall performance of networks and systems. This
report identified the challenges and issues linked
with virtual private networks and suggested several
techniques for improving the security of VPN
networks. it is identified that lack of security and
use of unauthentic server both are major risk
factors that increase the issue of data breach and
cyber-crimes. Therefore, it is suggested that
consumers should use only authentic server and use
encryption technique while sending or receiving
data using VPN networks. Moreover, they can
adopt firewall, antivirus and robust technologies for
improving the privacy of VPN networks.
Future research
In future, this research will improve the
effectiveness of the paper and avoid drawbacks of
the current investigation. Moreover, the authors
will provide complete information about the
challenges and issues faced by virtual private
networks and also critically review the proposed
solution for avoiding security threats and risks
linked with the VPN networks.

VIRTUAL PRIVATE NETWORK 5
References
[1]. Y., Wang, J. Wei and, K., Vangury,
“Bring your own device security issues
and challenges,” In 2014 IEEE 11th
Consumer Communications and
Networking Conference (CCNC), vol. 12,
no. 4, pp. 80-85, 2014..
[2]. L., Xu, D. Huang and, W.T., Tsai, “Cloud-
based virtual laboratory for network
security education,” IEEE Transactions on
Education, vol. 57, no. 3, pp.145-150,
2014.
[3]. O., Harfoushi, B., Alfawwaz, N.A.,
Ghatasheh, R., Obiedat, M. Mua’ad and,
H., Faris, “Data security issues and
challenges in cloud computing: a
conceptual analysis and
review,” communications and
Network, vol. 6, no. 01, p.15, 2014
[4]. L.R., Bays, R.R., Oliveira, M.P., Gaspary,
L.P. Barcellos and, E.R.M., Madeira,
“Virtual network security: threats,
countermeasures, and challenges,” Journal
of Internet Services and Applications, vol.
6, no. 1, p.1, 2015.
[5]. S., Goyal, “Public vs private vs hybrid vs
community-cloud computing: a critical
review,” International Journal of
Computer Network and Information
Security, vol. 6, no. 3, p.20, 2014.
[6]. B., Han, V., Gopalakrishnan, L. Ji and, S.,
Lee, “Network function virtualization:
Challenges and opportunities for
innovations,” IEEE Communications
Magazine, vol. 53, no. 2, pp.90-97, 2015.
[7]. J., Bugeja, A. Jacobsson and, P.,
Davidsson, “On privacy and security
challenges in smart connected homes,”
In 2016 European Intelligence and
Security Informatics Conference (EISIC),
vol. 12, no. 5, pp. 172-175, 2016.
[8]. C. Liang and, F.R., Yu, “Wireless network
virtualization: A survey, some research
issues and challenges,” IEEE
Communications Surveys & Tutorials, vol.
17, no. 1, pp.358-380, 2015.
[9]. L., Xu, D. Huang and, W.T., Tsai, “Cloud-
based virtual laboratory for network
security education,” IEEE Transactions on
Education, vol. 7, no. 3, pp.145-150,
2014.
[10]. A.F.G. Skarmeta and, G.M.,
Pérez, “Policy-based dynamic provision of
IP services in a secure VPN coalition
scenario,” IEEE Communications
Magazine, vol. 42, no. 11, pp.118-124,
2014.
References
[1]. Y., Wang, J. Wei and, K., Vangury,
“Bring your own device security issues
and challenges,” In 2014 IEEE 11th
Consumer Communications and
Networking Conference (CCNC), vol. 12,
no. 4, pp. 80-85, 2014..
[2]. L., Xu, D. Huang and, W.T., Tsai, “Cloud-
based virtual laboratory for network
security education,” IEEE Transactions on
Education, vol. 57, no. 3, pp.145-150,
2014.
[3]. O., Harfoushi, B., Alfawwaz, N.A.,
Ghatasheh, R., Obiedat, M. Mua’ad and,
H., Faris, “Data security issues and
challenges in cloud computing: a
conceptual analysis and
review,” communications and
Network, vol. 6, no. 01, p.15, 2014
[4]. L.R., Bays, R.R., Oliveira, M.P., Gaspary,
L.P. Barcellos and, E.R.M., Madeira,
“Virtual network security: threats,
countermeasures, and challenges,” Journal
of Internet Services and Applications, vol.
6, no. 1, p.1, 2015.
[5]. S., Goyal, “Public vs private vs hybrid vs
community-cloud computing: a critical
review,” International Journal of
Computer Network and Information
Security, vol. 6, no. 3, p.20, 2014.
[6]. B., Han, V., Gopalakrishnan, L. Ji and, S.,
Lee, “Network function virtualization:
Challenges and opportunities for
innovations,” IEEE Communications
Magazine, vol. 53, no. 2, pp.90-97, 2015.
[7]. J., Bugeja, A. Jacobsson and, P.,
Davidsson, “On privacy and security
challenges in smart connected homes,”
In 2016 European Intelligence and
Security Informatics Conference (EISIC),
vol. 12, no. 5, pp. 172-175, 2016.
[8]. C. Liang and, F.R., Yu, “Wireless network
virtualization: A survey, some research
issues and challenges,” IEEE
Communications Surveys & Tutorials, vol.
17, no. 1, pp.358-380, 2015.
[9]. L., Xu, D. Huang and, W.T., Tsai, “Cloud-
based virtual laboratory for network
security education,” IEEE Transactions on
Education, vol. 7, no. 3, pp.145-150,
2014.
[10]. A.F.G. Skarmeta and, G.M.,
Pérez, “Policy-based dynamic provision of
IP services in a secure VPN coalition
scenario,” IEEE Communications
Magazine, vol. 42, no. 11, pp.118-124,
2014.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.