Analysis of VPN Technologies, Security Issues, and Solutions (MN610)
VerifiedAdded on 2021/10/04
|5
|3994
|500
Report
AI Summary
This report provides a comprehensive overview of Virtual Private Network (VPN) technologies, focusing on legacy VPNs and their associated drawbacks. It explores the core functionality of VPNs, including remote access and site-to-site connections, emphasizing the role of encryption and secure tunnels. The report delves into the limitations of legacy VPNs, such as reliability, speed, and security vulnerabilities, including IPsec protocol issues. It also examines solutions like firewalls, proxy servers, and authentication methods to mitigate these problems. Furthermore, the report discusses the advantages of VPNs, such as enhanced security, remote access, and anonymity, while also acknowledging the limitations, including security concerns and performance issues like KillSwitch and the need for strong user authentication. The report also highlights alternative technologies like SoftEther VPNs, and the significance of VPNs in the current technological landscape.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

VPN REPLACEMENT TECHNOLOGIES
ABSTRACT – The main aim of this report is to understand about the virtual private network replacement
technologies. The virtual private network or VPN is the extension of private network across the public network.
This type of private network extension is majorly responsible for enabling the users in sending as well as receiving
the confidential data, across the shared or the public networks. The computing devices of these users are directly
connected to the respective private network. The applications that are running across the virtual private network
are extremely advantageous in respect to the functionalities, security as well as management of the specified
private networks. This technology of virtual private network is developed for allowing the remote users or branch
offices and providing access to the corporate resources and applications. The legacy virtual private networks or
VPNs comprises of some of the major and the most significant issues or problems. The IPsec based protocols of
VPN have now become completely obsolete. These specific IPsec based protocols of VPN are not at all familiar
with the firewalls, proxies or NATs. This report has properly explained about the several limitations or problems
that are previously existing in the legacy VPNs and even relevant or suitable solutions for these issues. Moreover,
the VPN security issue is also addressed in the report properly.
1. INTRODUCTION
The virtual private network or simply VPN can be
stated as the technology, which is responsible for
creating the safe as well as encrypted connection over
the lesser secured network like the Internet connectivity
[12]. This technology of virtual private network is
subsequently developed as the methodology for the
purpose of allowing the respective remote users or the
branch divisions for securely accessing the corporate
resources or applications. For ensuring safety, the
sensitive data travels through the secured tunnels. The
users of virtual private networks should utilize the
authenticated and authorized methods such as
passwords, unique identifying processes and tokens for
gaining proper access to the servers of virtual private
networks [15].
1.1 VIRTUAL PRIVATE NETWORKS
1.1.1. Background
The virtual private networks are also utilized by the
remote workers, who require the access to the
corporate resources and consumers, who might require
downloading the files or the business travellers, who
wish to log into the sites, which are substantially
restricted geographically. The VPN services are
extremely critical conduits, by which the data could be
transported securely and safely. The two extremely
common virtual private network types are site to site
VPNs and remote access VPNs [3]. The remote access
virtual private network utilizes the infrastructure of
public telecommunication such as the Internet for
providing remote users with the safe and secured access
to the organizational network. The client of virtual
private network on the computer or mobile device of the
remote user is connected to the gateway of virtual
private network within the network of the organization.
1.1.2. Details of Virtual Private Network
The following report will be outlining a brief discussion
regarding the replacement technologies of virtual private
networks. The gateway of these virtual private networks
usually needs a device for the purpose of authenticating
the identity [20]. Next, this gateway could eventually
create the network links back into the devices, which
allow them in reaching to the resources of internal
network like the printers, intranets and servers, since it
is registered to the network locally. The legacy virtual
private network generally relies on the IPsec or IP
security as well as SSL or secure sockets layer for the
purpose of securing the connection. However, the
secure socket layered virtual private networks are
completely focused on the supply of secured access to
one application and not on the complete internal
networks [1].
1.1.3. Legacy Virtual Private Networks
Few of the legacy VPNs give the layer 2 access for the
targeted network and they need the tunnelling protocols
such as the point to point tunnelling protocols and layer
2 tunnelling protocols that could run across the basic
connection of IPsec. There are some of the major
problems or drawbacks of the legacy VPNs. These
problems or issues might be extremely dangerous for
the users; however some of the solutions are also
present that could easily resolve them. Hence, few of the
technologies are implemented as the alternatives [9].
The most popular and significant technologies are
SoftEther VPN and Microsoft DirectAccess. The report
will be providing the detailed review of the VPN
technologies and their issues with relevant and suitable
solutions.
ABSTRACT – The main aim of this report is to understand about the virtual private network replacement
technologies. The virtual private network or VPN is the extension of private network across the public network.
This type of private network extension is majorly responsible for enabling the users in sending as well as receiving
the confidential data, across the shared or the public networks. The computing devices of these users are directly
connected to the respective private network. The applications that are running across the virtual private network
are extremely advantageous in respect to the functionalities, security as well as management of the specified
private networks. This technology of virtual private network is developed for allowing the remote users or branch
offices and providing access to the corporate resources and applications. The legacy virtual private networks or
VPNs comprises of some of the major and the most significant issues or problems. The IPsec based protocols of
VPN have now become completely obsolete. These specific IPsec based protocols of VPN are not at all familiar
with the firewalls, proxies or NATs. This report has properly explained about the several limitations or problems
that are previously existing in the legacy VPNs and even relevant or suitable solutions for these issues. Moreover,
the VPN security issue is also addressed in the report properly.
1. INTRODUCTION
The virtual private network or simply VPN can be
stated as the technology, which is responsible for
creating the safe as well as encrypted connection over
the lesser secured network like the Internet connectivity
[12]. This technology of virtual private network is
subsequently developed as the methodology for the
purpose of allowing the respective remote users or the
branch divisions for securely accessing the corporate
resources or applications. For ensuring safety, the
sensitive data travels through the secured tunnels. The
users of virtual private networks should utilize the
authenticated and authorized methods such as
passwords, unique identifying processes and tokens for
gaining proper access to the servers of virtual private
networks [15].
1.1 VIRTUAL PRIVATE NETWORKS
1.1.1. Background
The virtual private networks are also utilized by the
remote workers, who require the access to the
corporate resources and consumers, who might require
downloading the files or the business travellers, who
wish to log into the sites, which are substantially
restricted geographically. The VPN services are
extremely critical conduits, by which the data could be
transported securely and safely. The two extremely
common virtual private network types are site to site
VPNs and remote access VPNs [3]. The remote access
virtual private network utilizes the infrastructure of
public telecommunication such as the Internet for
providing remote users with the safe and secured access
to the organizational network. The client of virtual
private network on the computer or mobile device of the
remote user is connected to the gateway of virtual
private network within the network of the organization.
1.1.2. Details of Virtual Private Network
The following report will be outlining a brief discussion
regarding the replacement technologies of virtual private
networks. The gateway of these virtual private networks
usually needs a device for the purpose of authenticating
the identity [20]. Next, this gateway could eventually
create the network links back into the devices, which
allow them in reaching to the resources of internal
network like the printers, intranets and servers, since it
is registered to the network locally. The legacy virtual
private network generally relies on the IPsec or IP
security as well as SSL or secure sockets layer for the
purpose of securing the connection. However, the
secure socket layered virtual private networks are
completely focused on the supply of secured access to
one application and not on the complete internal
networks [1].
1.1.3. Legacy Virtual Private Networks
Few of the legacy VPNs give the layer 2 access for the
targeted network and they need the tunnelling protocols
such as the point to point tunnelling protocols and layer
2 tunnelling protocols that could run across the basic
connection of IPsec. There are some of the major
problems or drawbacks of the legacy VPNs. These
problems or issues might be extremely dangerous for
the users; however some of the solutions are also
present that could easily resolve them. Hence, few of the
technologies are implemented as the alternatives [9].
The most popular and significant technologies are
SoftEther VPN and Microsoft DirectAccess. The report
will be providing the detailed review of the VPN
technologies and their issues with relevant and suitable
solutions.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

2. BACKGROUND/LITERATURE REVIEW
2.1. Drawbacks of Legacy VPNs
2.1.1 Lack of Reliability of VPN
According to Regola and Nitesh [5], the legacy virtual
private networks often undergo some of the most
important and significant issues that could be quite
distracting for the users of this technology. The major
limitation of the legacy VPN is that most of the reliable
virtual private networks are not of free charges. A
monthly subscription is to be paid for the safety reasons.
The data could be sold out from the online activities to
the respective ad providers [19].
2.1.2 Lesser Speed
Another specific limitation of the legacy VPN would be
that connection speed often becomes less than the usual
range. Although, there is scope for better data
transmission, the intake of resources is extremely slower
and thus this technology is often avoided by the users
[1]. However, with the help of paid connection, this
particular issue of legacy VPN is solved eventually.
2.1.3 Security
Security is the next noteworthy drawback of the
legacy virtual private networks. As per Kahate [16], the
blacklisting of the IP address and the IP spoofing are the
major examples of this security issue of VPN. Thus, it is
extremely important for subscribing to only to the
trustworthy as well as reputable virtual private
networks. The complexity of the legacy VPNs is yet
another significant drawback of this technology. The
intricate combination of hardware equipment, network
topologies and protocols help the service providers to
make up the distinct channel of virtual private network
[13]. The extra stress is given to these channels of VPN
and the components also play an important role here.
Figure 1: Remote Access VPN
(Sources: Kahate [16])
The above figure provides a clear image of the remote
access of the VPN and respective networks.
2.1.2 Solutions for the Drawbacks
Wang et al. [10] state that, there are some of the most
suitable and relevant solutions of the issues faced by the
legacy virtual private networks. The implementation of
firewalls is one of the major solution for such limitations.
The Internet firewall is responsible for protecting the
network. It utilizes few techniques as the examination of
Internet addresses on the ports or packets as per
request on the incoming connections for deciding which
traffic should be allowed and which traffic should be
eradicated [7]. Most of the legacy VPN packages do not
comprise of any firewall; however with the proper
implementation of packet filtration firewall, the specific
IP services get blocked from crossing the gateway
routers.
The routers could support the technologies of VPN like
the SoftEther VPN and Cisco Private Internet Exchange
from supporting the packet filtration. Moreover, the
proxy servers are also an important solution for running
on the top of the network operating system like Novell
Netware, Windows NT and UNIX. Liyanage and Andrei
[6] have described that authentication is the next
important solution to such issues faced in the legacy
VPNs. This authentication technique ensures that the
communicating parties are eventually exchanging the
confidential data with the correct users and hosts. The
CHAP or Challenge Handshake Authentication Protocol is
the best example of this authentication technique.
Moreover, data integrity is also ensured with the help of
authentication technique [22]. The legacy VPNs also
support the types of encryption technology and the data
packages are sent to the secured envelope. These
mentioned solutions hence could easily resolve the
various issues of legacy VPNs.
3. DISCUSSION
The IPsec based virtual private networks or SoftEther
virtual private networks are completely familiar with the
various types of firewalls. The SoftEther VPNs do not
need any type of costly Cisco or any other devices of
hardware [2]. The Cisco as well as Open VPN could be
replaced with the SoftEther virtual private network.
Virtual private networks are extremely important and
noteworthy networks for the entire technological world.
There are some of the major and the most important
advantages of these private network extensions. The
first and the foremost advantage of the virtual private
network is the enhanced security. When the network is
being connected through a virtual private network, the
sensitive data is being kept secured, safe and encrypted
[8]. Hence, the information is kept away from the
attackers or hackers. The second important advantage of
this technology of virtual private network is the remote
control. The information that could be accessed
remotely form any specific location. As a result, VPN
increments the overall productivity of any organization.
Moreover, the service of virtual private network could
also be used, if any group is present, which require
sharing of data for the extended time period [11].
The next significant advantage of this virtual private
network is that the user could browse the Internet with
the help of VPN in entire anonymity. In comparison to
encrypt the web proxies or IP software, the major
2.1. Drawbacks of Legacy VPNs
2.1.1 Lack of Reliability of VPN
According to Regola and Nitesh [5], the legacy virtual
private networks often undergo some of the most
important and significant issues that could be quite
distracting for the users of this technology. The major
limitation of the legacy VPN is that most of the reliable
virtual private networks are not of free charges. A
monthly subscription is to be paid for the safety reasons.
The data could be sold out from the online activities to
the respective ad providers [19].
2.1.2 Lesser Speed
Another specific limitation of the legacy VPN would be
that connection speed often becomes less than the usual
range. Although, there is scope for better data
transmission, the intake of resources is extremely slower
and thus this technology is often avoided by the users
[1]. However, with the help of paid connection, this
particular issue of legacy VPN is solved eventually.
2.1.3 Security
Security is the next noteworthy drawback of the
legacy virtual private networks. As per Kahate [16], the
blacklisting of the IP address and the IP spoofing are the
major examples of this security issue of VPN. Thus, it is
extremely important for subscribing to only to the
trustworthy as well as reputable virtual private
networks. The complexity of the legacy VPNs is yet
another significant drawback of this technology. The
intricate combination of hardware equipment, network
topologies and protocols help the service providers to
make up the distinct channel of virtual private network
[13]. The extra stress is given to these channels of VPN
and the components also play an important role here.
Figure 1: Remote Access VPN
(Sources: Kahate [16])
The above figure provides a clear image of the remote
access of the VPN and respective networks.
2.1.2 Solutions for the Drawbacks
Wang et al. [10] state that, there are some of the most
suitable and relevant solutions of the issues faced by the
legacy virtual private networks. The implementation of
firewalls is one of the major solution for such limitations.
The Internet firewall is responsible for protecting the
network. It utilizes few techniques as the examination of
Internet addresses on the ports or packets as per
request on the incoming connections for deciding which
traffic should be allowed and which traffic should be
eradicated [7]. Most of the legacy VPN packages do not
comprise of any firewall; however with the proper
implementation of packet filtration firewall, the specific
IP services get blocked from crossing the gateway
routers.
The routers could support the technologies of VPN like
the SoftEther VPN and Cisco Private Internet Exchange
from supporting the packet filtration. Moreover, the
proxy servers are also an important solution for running
on the top of the network operating system like Novell
Netware, Windows NT and UNIX. Liyanage and Andrei
[6] have described that authentication is the next
important solution to such issues faced in the legacy
VPNs. This authentication technique ensures that the
communicating parties are eventually exchanging the
confidential data with the correct users and hosts. The
CHAP or Challenge Handshake Authentication Protocol is
the best example of this authentication technique.
Moreover, data integrity is also ensured with the help of
authentication technique [22]. The legacy VPNs also
support the types of encryption technology and the data
packages are sent to the secured envelope. These
mentioned solutions hence could easily resolve the
various issues of legacy VPNs.
3. DISCUSSION
The IPsec based virtual private networks or SoftEther
virtual private networks are completely familiar with the
various types of firewalls. The SoftEther VPNs do not
need any type of costly Cisco or any other devices of
hardware [2]. The Cisco as well as Open VPN could be
replaced with the SoftEther virtual private network.
Virtual private networks are extremely important and
noteworthy networks for the entire technological world.
There are some of the major and the most important
advantages of these private network extensions. The
first and the foremost advantage of the virtual private
network is the enhanced security. When the network is
being connected through a virtual private network, the
sensitive data is being kept secured, safe and encrypted
[8]. Hence, the information is kept away from the
attackers or hackers. The second important advantage of
this technology of virtual private network is the remote
control. The information that could be accessed
remotely form any specific location. As a result, VPN
increments the overall productivity of any organization.
Moreover, the service of virtual private network could
also be used, if any group is present, which require
sharing of data for the extended time period [11].
The next significant advantage of this virtual private
network is that the user could browse the Internet with
the help of VPN in entire anonymity. In comparison to
encrypt the web proxies or IP software, the major

advantage of the service of virtual private network is
that it enables the user in accessing both the web sites
and web application within absolute anonymity. VPN is
also useful for changing the IP addresses and providing
better performances to the users by increasing the
efficiency and bandwidth [21]. The expenses are also
reduced when the virtual private network is being
created. Since, the cost of maintenance is extremely low,
the network set up or the surveillance is not at all a
concern.
3.1 Limitations of Legacy Virtual Private Networks
In spite of having all the above mentioned
advantages, there are some of the specific disadvantages
or drawbacks that make the technology quite
problematic for the users [17]. The major and one of the
most important limitation of the virtual private network
is security. The security of the service of legacy virtual
private network is often quite dangerous for all the
users. Since, the virtual private networks utilize the
technology of encryption for providing confidentiality of
data or information [4]. Whenever the connection is
being made, this technology of virtual private network
makes the proper utilization of tunnelling mechanism for
the purpose of encapsulating the encrypted data to a
secured tunnel. The openly reading headers could cross
the public network eventually and hence the packets
that are being passed over the public network are
unreadable without the proper decryption of messages
[7]. As a result, the confidential data is ensured not to be
changed or disclosed in any method while transmission.
This virtual private network could even provide the
proper check of data integrity and is then performed for
ensuring that the data is not getting tampered at any
cost. Furthermore, the legacy VPNs do not provide as
well as enforce the strong users’ authentication [14]. The
users would enter the username as well as password for
gaining access to the internal private networks from all
types of insecure networks. Moreover, another
limitation of the legacy VPN is that it subsequently
supports the mechanism of add on authentication like
RADIUS, tokens and smart cards. The next important and
noteworthy drawback of the legacy virtual private
network is KillSwitch. For assuring the overall safety of
the network connection, the virtual private network
provides features for enhancing the security level [18].
Two types of KillSwitches are present. The first type is
the Internet KillSwitch that would block the internet
traffic for the drops of virtual private network. The
second type of KillSwitch is the Application KillSwitch
that could ensure the fact that a series of selected
applications would be closed.
Another significant and noteworthy limitation of the
legacy VPN would be the performance issues. As the
connection of the private network eventually works by
the connection of network to the private server, it often
creates a major performance issue in the process [12].
Some of the legacy VPNs even undertake longer time for
connecting to the private servers and this leads to
loading of website for a longer time, while accessing it.
The connection speed is much lower while utilizing the
private connection. The other significant drawback of
this legacy VPN is that this service could monitor the
activity and then use the data. There are certain cases,
where the legacy virtual private networks can monitor
the data from the data for their own advantages from
the users [3]. Thus, security is lost completely and the
users does not get any idea regarding the data.
3.2. Solutions for Limitations of Legacy VPNs
The various above mentioned limitations or
drawbacks could be solved with the help of some of the
technology replacements [20]. The first and the most
important solution to all the limitations of VPN is using
P2P servers. This type of VPN services would allow the
users in avoiding all problems related to ISP. The
replacement of technologies is the next significant and
important solution for VPN technology. The proper
utilization of Double VPN technology is another effective
and efficient solution for the several limitation of legacy
VPNs. This particular technology replacement enables
the users in browsing anonymously by subsequently
connecting to the series of the VPN servers [5]. The
Double VPN technology allows the level of security as
well as VPN tunnel with proper encryption. Another
important solution for these limitations is the proper
utilization of SSTP as well as stealth VPN protocols. These
two protocols of the legacy virtual private network are of
quite higher speed and is extremely secured. Thus, the
security issues are solved easily. The replacement of the
legacy VPN technologies with VPN+Tor is yet another
specific solution for the limitations of legacy virtual
private networks [10]. Tor could be utilized for masking
the sensitive data and hence the frequent utilization of
this browser would allow to secure the ISP of users.
Figure 2: Site to Site VPN Connection
(Source: Bari et al. [13])
4. CONCLUSION
Therefore, from the above discussion, it can be
concluded that the VPN or virtual private network is the
respective encrypted connection on the Internet from
the device to any network. The specific encrypted
connection is responsible for helping to ensure that the
sensitive data is securely and safely getting transmitted.
This type of private network extension eventually
prevents the unauthorized or unauthenticated
that it enables the user in accessing both the web sites
and web application within absolute anonymity. VPN is
also useful for changing the IP addresses and providing
better performances to the users by increasing the
efficiency and bandwidth [21]. The expenses are also
reduced when the virtual private network is being
created. Since, the cost of maintenance is extremely low,
the network set up or the surveillance is not at all a
concern.
3.1 Limitations of Legacy Virtual Private Networks
In spite of having all the above mentioned
advantages, there are some of the specific disadvantages
or drawbacks that make the technology quite
problematic for the users [17]. The major and one of the
most important limitation of the virtual private network
is security. The security of the service of legacy virtual
private network is often quite dangerous for all the
users. Since, the virtual private networks utilize the
technology of encryption for providing confidentiality of
data or information [4]. Whenever the connection is
being made, this technology of virtual private network
makes the proper utilization of tunnelling mechanism for
the purpose of encapsulating the encrypted data to a
secured tunnel. The openly reading headers could cross
the public network eventually and hence the packets
that are being passed over the public network are
unreadable without the proper decryption of messages
[7]. As a result, the confidential data is ensured not to be
changed or disclosed in any method while transmission.
This virtual private network could even provide the
proper check of data integrity and is then performed for
ensuring that the data is not getting tampered at any
cost. Furthermore, the legacy VPNs do not provide as
well as enforce the strong users’ authentication [14]. The
users would enter the username as well as password for
gaining access to the internal private networks from all
types of insecure networks. Moreover, another
limitation of the legacy VPN is that it subsequently
supports the mechanism of add on authentication like
RADIUS, tokens and smart cards. The next important and
noteworthy drawback of the legacy virtual private
network is KillSwitch. For assuring the overall safety of
the network connection, the virtual private network
provides features for enhancing the security level [18].
Two types of KillSwitches are present. The first type is
the Internet KillSwitch that would block the internet
traffic for the drops of virtual private network. The
second type of KillSwitch is the Application KillSwitch
that could ensure the fact that a series of selected
applications would be closed.
Another significant and noteworthy limitation of the
legacy VPN would be the performance issues. As the
connection of the private network eventually works by
the connection of network to the private server, it often
creates a major performance issue in the process [12].
Some of the legacy VPNs even undertake longer time for
connecting to the private servers and this leads to
loading of website for a longer time, while accessing it.
The connection speed is much lower while utilizing the
private connection. The other significant drawback of
this legacy VPN is that this service could monitor the
activity and then use the data. There are certain cases,
where the legacy virtual private networks can monitor
the data from the data for their own advantages from
the users [3]. Thus, security is lost completely and the
users does not get any idea regarding the data.
3.2. Solutions for Limitations of Legacy VPNs
The various above mentioned limitations or
drawbacks could be solved with the help of some of the
technology replacements [20]. The first and the most
important solution to all the limitations of VPN is using
P2P servers. This type of VPN services would allow the
users in avoiding all problems related to ISP. The
replacement of technologies is the next significant and
important solution for VPN technology. The proper
utilization of Double VPN technology is another effective
and efficient solution for the several limitation of legacy
VPNs. This particular technology replacement enables
the users in browsing anonymously by subsequently
connecting to the series of the VPN servers [5]. The
Double VPN technology allows the level of security as
well as VPN tunnel with proper encryption. Another
important solution for these limitations is the proper
utilization of SSTP as well as stealth VPN protocols. These
two protocols of the legacy virtual private network are of
quite higher speed and is extremely secured. Thus, the
security issues are solved easily. The replacement of the
legacy VPN technologies with VPN+Tor is yet another
specific solution for the limitations of legacy virtual
private networks [10]. Tor could be utilized for masking
the sensitive data and hence the frequent utilization of
this browser would allow to secure the ISP of users.
Figure 2: Site to Site VPN Connection
(Source: Bari et al. [13])
4. CONCLUSION
Therefore, from the above discussion, it can be
concluded that the VPN or virtual private network is the
respective encrypted connection on the Internet from
the device to any network. The specific encrypted
connection is responsible for helping to ensure that the
sensitive data is securely and safely getting transmitted.
This type of private network extension eventually
prevents the unauthorized or unauthenticated

individuals from eavesdropping over the network traffic
and then enables the users in conducting the specific
work remotely. The technology virtual private network is
properly utilized in the corporate environments. The
virtual private network extends the corporate network
from the encrypted connections that are being made on
the Internet. As the respective network traffic is being
encrypted within the network as well as the device, this
network traffic stays private when it is travelling. The
secured remote access could provide the safe and
secured method for connecting the devices and users
remotely to the corporate network. This remote access
involves the VPN technology for authenticating the
devices or users. The virtual private network technology
is available for checking whether the device is meeting
the various requirements and is allowed for connecting
remotely. The traffic of the VPN is then sent securely and
safely by the establishment of the encrypted connection
in the Internet and is termed as tunnel. The above report
has properly demonstrated the virtual private networks
and their limitations. Security is the major drawback of
the legacy VPNs and this could become extremely
dangerous for the networks. The secured authentication
methods could be utilized with the stronger passwords.
Moreover, there are some other technologies as well
that help in securing the VPN.
5. FUTURE WORKS
Virtual private network is one of the most important
and significant private networks that has become quite
popular for the technological world [3]. The future
virtual private networks could majorly focus on the
network access control and then assess the connecting
devices for determining the fact that whether it is in the
correct state to get connected or not. Moreover, there
is other scope of these virtual private networks in future
like they would be focusing on the multi factor
authentication for the devices or users. The future
virtual private networks is also expected to be built
within the operating system and they would be invisible
to the various end users [20]. The other expectations
from the future virtual private networks would be that
all the required things would become completely
automated over the client of virtual private network and
even on the management side. The network
administrators would not require to take care of the
technologies related to the virtual private networks and
the efficiency or effectiveness would be improved [9].
Regarding security, VPN would be extremely advanced
and the future technology would be having in-built
firewalls within the networks for providing better
security.
References:
[1] Gong, Li-Hua, Ye Liu, and Nan-Run Zhou. "Novel
quantum virtual private network scheme for PON via
quantum secure direct communication." International
Journal of Theoretical Physics 52, no. 9 (2013): 3260-
3268.
[2] Jain, Raj, and Subharthi Paul. "Network virtualization
and software defined networking for cloud computing: a
survey." IEEE Communications Magazine 51, no. 11
(2013): 24-31.
[3] Ismail, Mohd Nazri. "Study the best approach
implementation and codec selection for VoIP over virtual
private network." (2013).
[4] Chung, Chun-Jen, Pankaj Khatkar, Tianyi Xing,
Jeongkeun Lee, and Dijiang Huang. "NICE: Network
intrusion detection and countermeasure selection in
virtual network systems." IEEE transactions on
dependable and secure computing 10, no. 4 (2013): 198-
211.
[5] Regola, Nathan, and Nitesh V. Chawla. "Storing and
using health data in a virtual private cloud." Journal of
medical Internet research 15, no. 3 (2013).
[6] Liyanage, Madhusanka, and Andrei Gurtov. "Securing
virtual private LAN service by efficient key
management." Security and Communication Networks 7,
no. 1 (2014): 1-13.
[7] Bennacer, Leila, Yacine Amirat, Abdelghani Chibani,
Abdelhamid Mellouk, and Laurent Ciavaglia. "Self-
diagnosis technique for virtual private networks
combining Bayesian networks and case-based
reasoning." IEEE Transactions on Automation Science
and Engineering 12, no. 1 (2015): 354-366.
[8] Banikazemi, Mohammad, David Olshefski, Anees
Shaikh, John Tracey, and Guohui Wang. "Meridian: an
SDN platform for cloud network services." IEEE
Communications Magazine51, no. 2 (2013): 120-127.
[9] Sharkh, Mohamed Abu, Manar Jammal, Abdallah
Shami, and Abdelkader Ouda. "Resource allocation in a
network-based cloud computing environment: design
challenges." IEEE Communications Magazine 51, no. 11
(2013): 46-52.
[10] Wang, Anjing, Mohan Iyer, Rudra Dutta, George N.
Rouskas, and Ilia Baldine. "Network virtualization:
Technologies, perspectives, and frontiers." Journal of
Lightwave Technology31, no. 4 (2013): 523-537.
[11] FCMI, Sabah Nassir Hussein, and Abdul HadiQais
Abdul Hadi. "The Impact Of Using Security Protocols In
Dedicated Private Network And Virtual Private
Network." International Journal of Scientific &
Technology Research 2, no. 11 (2013): 170-175.
[12] Liyanage, Madhusanka, Jude Okwuibe, Mika
Ylianttila, and Andrei Gurtov. "Secure Virtual Private LAN
and then enables the users in conducting the specific
work remotely. The technology virtual private network is
properly utilized in the corporate environments. The
virtual private network extends the corporate network
from the encrypted connections that are being made on
the Internet. As the respective network traffic is being
encrypted within the network as well as the device, this
network traffic stays private when it is travelling. The
secured remote access could provide the safe and
secured method for connecting the devices and users
remotely to the corporate network. This remote access
involves the VPN technology for authenticating the
devices or users. The virtual private network technology
is available for checking whether the device is meeting
the various requirements and is allowed for connecting
remotely. The traffic of the VPN is then sent securely and
safely by the establishment of the encrypted connection
in the Internet and is termed as tunnel. The above report
has properly demonstrated the virtual private networks
and their limitations. Security is the major drawback of
the legacy VPNs and this could become extremely
dangerous for the networks. The secured authentication
methods could be utilized with the stronger passwords.
Moreover, there are some other technologies as well
that help in securing the VPN.
5. FUTURE WORKS
Virtual private network is one of the most important
and significant private networks that has become quite
popular for the technological world [3]. The future
virtual private networks could majorly focus on the
network access control and then assess the connecting
devices for determining the fact that whether it is in the
correct state to get connected or not. Moreover, there
is other scope of these virtual private networks in future
like they would be focusing on the multi factor
authentication for the devices or users. The future
virtual private networks is also expected to be built
within the operating system and they would be invisible
to the various end users [20]. The other expectations
from the future virtual private networks would be that
all the required things would become completely
automated over the client of virtual private network and
even on the management side. The network
administrators would not require to take care of the
technologies related to the virtual private networks and
the efficiency or effectiveness would be improved [9].
Regarding security, VPN would be extremely advanced
and the future technology would be having in-built
firewalls within the networks for providing better
security.
References:
[1] Gong, Li-Hua, Ye Liu, and Nan-Run Zhou. "Novel
quantum virtual private network scheme for PON via
quantum secure direct communication." International
Journal of Theoretical Physics 52, no. 9 (2013): 3260-
3268.
[2] Jain, Raj, and Subharthi Paul. "Network virtualization
and software defined networking for cloud computing: a
survey." IEEE Communications Magazine 51, no. 11
(2013): 24-31.
[3] Ismail, Mohd Nazri. "Study the best approach
implementation and codec selection for VoIP over virtual
private network." (2013).
[4] Chung, Chun-Jen, Pankaj Khatkar, Tianyi Xing,
Jeongkeun Lee, and Dijiang Huang. "NICE: Network
intrusion detection and countermeasure selection in
virtual network systems." IEEE transactions on
dependable and secure computing 10, no. 4 (2013): 198-
211.
[5] Regola, Nathan, and Nitesh V. Chawla. "Storing and
using health data in a virtual private cloud." Journal of
medical Internet research 15, no. 3 (2013).
[6] Liyanage, Madhusanka, and Andrei Gurtov. "Securing
virtual private LAN service by efficient key
management." Security and Communication Networks 7,
no. 1 (2014): 1-13.
[7] Bennacer, Leila, Yacine Amirat, Abdelghani Chibani,
Abdelhamid Mellouk, and Laurent Ciavaglia. "Self-
diagnosis technique for virtual private networks
combining Bayesian networks and case-based
reasoning." IEEE Transactions on Automation Science
and Engineering 12, no. 1 (2015): 354-366.
[8] Banikazemi, Mohammad, David Olshefski, Anees
Shaikh, John Tracey, and Guohui Wang. "Meridian: an
SDN platform for cloud network services." IEEE
Communications Magazine51, no. 2 (2013): 120-127.
[9] Sharkh, Mohamed Abu, Manar Jammal, Abdallah
Shami, and Abdelkader Ouda. "Resource allocation in a
network-based cloud computing environment: design
challenges." IEEE Communications Magazine 51, no. 11
(2013): 46-52.
[10] Wang, Anjing, Mohan Iyer, Rudra Dutta, George N.
Rouskas, and Ilia Baldine. "Network virtualization:
Technologies, perspectives, and frontiers." Journal of
Lightwave Technology31, no. 4 (2013): 523-537.
[11] FCMI, Sabah Nassir Hussein, and Abdul HadiQais
Abdul Hadi. "The Impact Of Using Security Protocols In
Dedicated Private Network And Virtual Private
Network." International Journal of Scientific &
Technology Research 2, no. 11 (2013): 170-175.
[12] Liyanage, Madhusanka, Jude Okwuibe, Mika
Ylianttila, and Andrei Gurtov. "Secure Virtual Private LAN
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Services: An Overview with Performance Evaluation."
In Communication Workshop (ICCW), 2015 IEEE
International Conference on, pp. 2231-2237. IEEE, 2015.
[13] Bari, Md Faizul, Raouf Boutaba, Rafael Esteves,
Lisandro Zambenedetti Granville, Maxim Podlesny, Md
Golam Rabbani, Qi Zhang, and Mohamed Faten Zhani.
"Data center network virtualization: A survey." IEEE
Communications Surveys & Tutorials 15, no. 2 (2013):
909-928.
[14] Daya, Bhavya. "Network security: History,
importance, and future." University of Florida
Department of Electrical and Computer Engineering 4
(2013).
[15] Perlman, Radia, Charlie Kaufman, and Mike
Speciner. Network security: private communication in a
public world. Pearson Education India, 2016.
[16] Kahate, Atul. Cryptography and network security.
Tata McGraw-Hill Education, 2013.
[17] Manshaei, Mohammad Hossein, Quanyan Zhu,
Tansu Alpcan, Tamer Bacşar, and Jean-Pierre Hubaux.
"Game theory meets network security and
privacy." ACM Computing Surveys (CSUR) 45, no. 3
(2013): 25.
[18] Tokuyoshi, Brian. "The security implications of
BYOD." Network Security 2013, no. 4 (2013): 12-13.
[19] Knapp, Eric D., and Joel Thomas Langill. Industrial
Network Security: Securing critical infrastructure
networks for smart grid, SCADA, and other Industrial
Control Systems. Syngress, 2014.
[20] Chen, Gaojie, Yu Gong, Pei Xiao, and Jonathon A.
Chambers. "Physical layer network security in the full-
duplex relay system." IEEE transactions on information
forensics and security 10, no. 3 (2015): 574-583.
[21] Kizza, Joseph Migga. Guide to computer network
security. London: Springer, 2013.
[22] White, Gregory B., Eric A. Fisch, and Udo W.
Pooch. Computer system and network security. CRC
press, 2017.
In Communication Workshop (ICCW), 2015 IEEE
International Conference on, pp. 2231-2237. IEEE, 2015.
[13] Bari, Md Faizul, Raouf Boutaba, Rafael Esteves,
Lisandro Zambenedetti Granville, Maxim Podlesny, Md
Golam Rabbani, Qi Zhang, and Mohamed Faten Zhani.
"Data center network virtualization: A survey." IEEE
Communications Surveys & Tutorials 15, no. 2 (2013):
909-928.
[14] Daya, Bhavya. "Network security: History,
importance, and future." University of Florida
Department of Electrical and Computer Engineering 4
(2013).
[15] Perlman, Radia, Charlie Kaufman, and Mike
Speciner. Network security: private communication in a
public world. Pearson Education India, 2016.
[16] Kahate, Atul. Cryptography and network security.
Tata McGraw-Hill Education, 2013.
[17] Manshaei, Mohammad Hossein, Quanyan Zhu,
Tansu Alpcan, Tamer Bacşar, and Jean-Pierre Hubaux.
"Game theory meets network security and
privacy." ACM Computing Surveys (CSUR) 45, no. 3
(2013): 25.
[18] Tokuyoshi, Brian. "The security implications of
BYOD." Network Security 2013, no. 4 (2013): 12-13.
[19] Knapp, Eric D., and Joel Thomas Langill. Industrial
Network Security: Securing critical infrastructure
networks for smart grid, SCADA, and other Industrial
Control Systems. Syngress, 2014.
[20] Chen, Gaojie, Yu Gong, Pei Xiao, and Jonathon A.
Chambers. "Physical layer network security in the full-
duplex relay system." IEEE transactions on information
forensics and security 10, no. 3 (2015): 574-583.
[21] Kizza, Joseph Migga. Guide to computer network
security. London: Springer, 2013.
[22] White, Gregory B., Eric A. Fisch, and Udo W.
Pooch. Computer system and network security. CRC
press, 2017.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.