Virtual Private Network Research Papers (original) (raw)

This paper discusses the pedagogical grounds of E-learning in Distributed Data Network Laboratory –project (Edinet). The Edinet-project aims at to establish an e-learning environment which is based on the ideas of life-long learning. In... more

This paper discusses the pedagogical grounds of E-learning in Distributed Data Network Laboratory –project (Edinet). The Edinet-project aims at to establish an e-learning environment which is based on the ideas of life-long learning. In the project seven European universities create semi-virtual campus in the field of Information Technology to support development of modern competences of students, teachers, researchers and other experts. The paper introduces the technical solutions for the semi virtual campus and the pedagogical principles that guide the piloting phase and development of the modules in the partner universities.

Despite a plethora of research in the area, none of the mechanisms proposed so far for Denial-of-Service (DoS) mitigation has been widely deployed. We argue in this paper that these deployment difficulties are primarily due to economic... more

Despite a plethora of research in the area, none of the mechanisms proposed so far for Denial-of-Service (DoS) mitigation has been widely deployed. We argue in this paper that these deployment difficulties are primarily due to economic inefficiency, rather than to technical shortcomings of the proposed DoS-resilient technologies. We identify economic phenomena, negative externality---the benefit derived from adopting a technology depends on the action of others---and economic incentive misalignment---the party who suffers from an economic loss is different from the party who is in the best position to prevent that loss---as the main stumbling blocks of adoption. Our main contribution is a novel DoS mitigation architecture, Burrows, with an economic incentive realignment property. Burrows is obtained by re-factoring existing key DoS mitigation technologies, and can increase the "social welfare," i.e., economic benefit, of the entire Internet community---both infrastructure ...

Abstract: Problem statement: Virtual private networks have provided customers with a secure and low-cost communication environment. Approach: The COVPA, the provisioning algorithm for a Virtual Private Network service, which built and... more

Abstract: Problem statement: Virtual private networks have provided customers with a secure and low-cost communication environment. Approach: The COVPA, the provisioning algorithm for a Virtual Private Network service, which built and managed VPNs on demand. Results: The COVPA allowed each VPN to have guaranteed resources and customized control and supported a highly dynamic VPN service where creation and modification operations took place on fast timescales at reduced cost. Also, it allowed the sharing of bandwidth on the links to reduce the cost. A design process is described, that attempts to satisfy the goals of both the customer and the VPN Service Provider (VSP). Conclusion/Recommendations: The performance of the proposed algorithm is analyzed in terms of cost, the number of nodes, the number of VPN nodes, asymmetric ratio and rejection ratio with the breadth first search, steiner tree and primal dual algorithms. With the enhancement on the design process, the COVPA performs b...

Nowadays, the solutions of virtualizing network infrastructure have become one of the most preoccupations of small, medium and large enterprises. These solutions make the extension of companies' sites possible and easier with a... more

Nowadays, the solutions of virtualizing network infrastructure have become one of the most preoccupations of small, medium and large enterprises. These solutions make the extension of companies' sites possible and easier with a transparent and flexible manner. these solutions allow also the remote access to personal data, stored on several distributed sites, securely. Dynamic and Multipoint Virtual Private Network, stands for DMVPN, is considered as a main component of these solutions, this technology involves a suite of protocols for a smooth functioning, such as : IPsec, mGRE and NHRP. Nonetheless, even the considerable security and modularity level of DMVPN solution, this latter suffers from several security issues linked to each components' protocol, which might threaten availability, confidentiality, authentication and integrity of communications. In this article, we will discuss the key vulnerabilities related to DMVPN technology and the possible countermeasures.

We investigate a network design problem under traffic uncertainty that arises when provisioning Virtual Private Networks (VPNs): given a set of terminals that must communicate with one another, and a set of possible traffic matrices,... more

We investigate a network design problem under traffic uncertainty that arises when provisioning Virtual Private Networks (VPNs): given a set of terminals that must communicate with one another, and a set of possible traffic matrices, sufficient capacity has to be reserved on the links of the large underlying public network to support all possible traffic matrices while minimizing the total reservation cost. The problem admits several versions depending on the desired topology of the reserved links, and the nature of the ...

Abstrak Virtual Private Network Internet Protocol (VPN IP) merupakanjaringan private secara virtual diatas jaringan public (umum) seperti internet dan merupakan jaringan point to point. VPN berkembang dikarenakan adanya perkembangan yang... more

Abstrak
Virtual Private Network Internet Protocol (VPN IP) merupakanjaringan private secara virtual diatas jaringan public (umum) seperti internet dan merupakan jaringan point to point. VPN berkembang dikarenakan adanya perkembangan yang pesat pada perusahaan-perusahaan besar yang ingin tetap memperluas jaringan bisnisnya.Pada penelitian ini akan dibahas simulasi jaringan VPN IP dalam mengirimkan paket data kepada user dari server. Pembuatan VPN IP ini memerlukan routingprotocol yaitu PointtoPointProtocol (PPTP), Layer 2 Tunneling Protocol (L2TP), atau IP Sec.
Kemudian menggunakan algoritma kripthography tertentu seperti DES, 3DES, atau AES. Dan hasil yang didapatkan dari simulasi ini dapat diimplementasikan dengan baik. yang biasa digunakan dalam suatu institusi perusahaan yang ingin mengembangkan bisnisnya khususnya melalui jalur komunikasi.
Kata Kunci : VPN IP, 3DES, DES, AES, PROTOCOL VPN IP
Abstrack
Virtual Private Network Internet Protocol (VPN IP) is a virtual private network over a public network (general) such as the Internet and is a point-to-point network. VPN growing due to rapid development in large companies who want to keep expanding its business network. This Final Project will be discussed in a simulation of an IP VPN network to send data packets to the user from the server. This requires making a VPN IP routing protocols, namely Point to Point Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), or IP Sec.
Then, using algorithms such as DES kripthography, 3DES, or AES. And the results obtained from these simulations can be implemented properly. commonly used in institutions that want to develop their business enterprise particularly through the communication line.
Key Words : VPN IP, 3DES, DES, AES, PROTOCOL VPN IP

The purpose of the following white paper is to present a set of well- investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product... more

The purpose of the following white paper is to present a set of well- investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product ratings. While most, if not all of the following guidelines apply to all Internet-connected devices, the presented guidelines focus on internet traffic security best practices for wired or wireless networks. They detail security mechanisms necessary for consideration at the manufacturing design phase rather than after deployment of devices to internet service providers and end users. The paper leads with the assertion that a thorough study on protecting Internet traffic does not yet exist, and proposes, based on our findings, that existing technology is not yet sufficient to meet the goal of protecting Internet traffic. The best practices presented are centered around countering and preventing malicious activity. By setting up a secure network with industry standard security protocols, the risk and potential legal liabilities associated with an unsecured network can be proactively addressed.

In this paper, we worry about investigating the use of Virtual Private Networks for the commission of crimes involving pedophilia. Recent political decisions in China seem to point at the world leaders connecting it to organized crime.... more

In this paper, we worry about investigating the use of Virtual Private Networks for the commission of crimes involving pedophilia. Recent political decisions in China seem to point at the world leaders connecting it to organized crime. The overall impression of professionals from Information Technology is that Virtual Private Networks are excellent tools for any sort of establishment or individual that depend on non-physical communications. The Australian government seems to have no concerns whatsoever with pedophilia and the use of VPNs. We here want to determine the effects on non-criminalization of the use of VPNs in what comes to pedophilia. On the way to that, we provide a good introduction to the topic and a good collection of intelligence tokens.

Elliptic Curve Cryptography (ECC) is fast becoming a viable alternative to traditional public-key cryptosystems (RSA, DSA, DH). Although ECC algorithms have been available for quite some time, most of the work in this field has been... more

Elliptic Curve Cryptography (ECC) is fast becoming a viable alternative to traditional public-key cryptosystems (RSA, DSA, DH). Although ECC algorithms have been available for quite some time, most of the work in this field has been theoretical in nature, with few actual ...

Data integrity assurance and data origin authentication are essential security services in financial transactions, electronic commerce, electronic mail, software distribution, data storage and so on. The broadest definition of... more

Data integrity assurance and data origin authentication are essential security services in financial transactions, electronic commerce, electronic mail, software distribution, data storage and so on. The broadest definition of authentication within computing systems encompasses ...

Cloud storages are becoming popular due to raising privacy concern regarding the available public cloud services. The main concern was to prevent data loss that occur due to various problems. Although it is challenging to embrace hybrid... more

Cloud storages are becoming popular due to raising privacy concern regarding the available public cloud services. The
main concern was to prevent data loss that occur due to various problems. Although it is challenging to embrace hybrid cloud
solutions for personal use. People tend to use Network-Attached Storage (NAS) and hybrid cloud solutions which are available
for enterprise usage. Currently, NAS is classified as two types, Storage NAS and Platform NAS. The research of this paper
focuses on Storage NAS, which is connected to a network that allows storage and retrieval of data from a central location for
authorised user and clients to effectively develop the system architecture for Small and Medium Enterprise (SME) businesses.
This solution provides the users with expected privacy for content and features of remote file browsing, shareable link
generation, robust synchronization among personal cloud devices, simple user management similar to cloud services and remote
file uploading/downloading facilities. The results and evaluation of the paper demonstrate the real world and practical business
cases under the NAS server, in which it significantly shows the contribution of the System architecture development and
amortization of the affordable business costs, that leads to reasonable and flexible operational security for SME sectors in the
commercial cities in developing countries such as India in Asia.

For too long, surveillance has been caught up in explanations that rely on Foucault and panopticon. However, contemporary electronic communication systems are active beyond the metaphorical workings of nineteenth century prison. We are... more

For too long, surveillance has been caught up in explanations that rely on Foucault and panopticon. However, contemporary electronic communication systems are active beyond the metaphorical workings of nineteenth century prison. We are witnessing massive information and data gathering systems online, thus, I believe the metaphor of rhizotamic expansion is appropriate to capture the essence of surveillance today. The world has discovered that freedom to connect comes at a very high price, namely surveillance. Thanks to whistle blower Edward Snowden, people have enraged that their privacy has been violated for years. Therefore, it is no accident that interest in online privacy has grown by leaps and bounds within the past years. With Snowden revelations, the issues related to the online freedom have become a paramount concern in today's Big Data era, which resulted in popularisation of employing alternative technologies such as Virtual Private Networks (VPNs). Nowadays, VPNs can be seen as a natural resistance against the rhizotamic surveillance. Although this tendency maps onto the increased level of pervasive monitoring in online setting, VPN technologies have been present for years, and also intensely utilised specifically for circumventing and geo-blocking purposes....

A novel improved VPN (Virtual Private Network) system based on SSL (Secure Socket Layer) protocol is discussed to overwhelm the defect of traditional SSL VPN. The concept, critical technique and working process of the geo-secured SSL... more

A novel improved VPN (Virtual Private Network) system based on SSL (Secure Socket Layer) protocol is discussed to overwhelm the defect of traditional SSL VPN. The concept, critical technique and working process of the geo-secured SSL based VPN are presented in details because they are very important to meet enhanced security requirement which is originally a traditional SSL VPN. Based on the GPS (Global Position System) technology a new scheme to improve the security of SSL VPN is proposed. This scheme enhances current security applications granting access to sensible information and privileges to execute orders only to entities that are in a trusted location. Moreover this system authenticate authorized user but also location of the authorized user.

This article examines the recent move by many television sports broadcasters of streaming their content online behind geographically restricted “geofences.” Despite the increasing use of this distribution method, we argue that Internet... more

This article examines the recent move by many television sports broadcasters of streaming their content online behind geographically restricted “geofences.” Despite the increasing use of this distribution method, we argue that Internet users are increasingly bypassing geofences that center sports consumption within a nationalized television broadcasting framework through the use of VPN (virtual private network) technologies. Importantly, the geographic fluidity of the Internet often allows users to do this legally—producing meaningful ruptures in the logic that seeks to replicate the structures of mediation central to the television broadcast model within the space of the Internet. We argue that the streaming of sports content, then, should be understood and analyzed as an enforcement of corporate media strategies and reflection of telecommunication policy, as well as a cultural practice and tactic. Large transnational media corporations, typically the holders of popular sporting rights, attempt to bend digital sports content consumption to the broadcast models that they have historically employed. Yet, amidst this emerging model of digital broadcasting lie the problems of digital geography and the cultural practice of a streaming culture within the conditions of post-convergence. This practice often rejects the restrictions and stipulations of digital broadcasting in favor of a globetrotting, station-hopping exercise of content hunting.

The high-performance networking requirements for next generation large-scale applications belong to two broad classes: (a) high bandwidths, typically multiples of 10Gbps, to support bulk data transfers, and (b) stable bandwidths,... more

The high-performance networking requirements for next generation large-scale applications belong to two broad classes: (a) high bandwidths, typically multiples of 10Gbps, to support bulk data transfers, and (b) stable bandwidths, typically at much lower bandwidths, to support computational steering, remote visualization, and remote control of instrumentation. Current Internet technologies, however, are severely limited in meeting these demands because such bulk

Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Cloud platform services,... more

Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Cloud platform services, delivers a computing platform and/or solution stack as service, often consuming cloud infrastructure and sustaining cloud applications. In future cloud computing architecture enables many cloud services to connect

Mahatma Gandhi University central library has established an SSH-based Virtual Private Network (VPN) to share information resources with libraries located outside the campus. Off-Campus libraries of Mahatma Gandhi University are... more

Mahatma Gandhi University central library has established an SSH-based Virtual Private Network (VPN) to share information resources with libraries located outside the campus. Off-Campus libraries of Mahatma Gandhi University are extensively using by faculty members and research scholars from affiliated colleges. An SSH protocol based encrypted communication tunnel is the main component of VPN service. Open Source software and standards have adopted to reduce total cost ownership of the system. Mahatma Gandhi University Library VPN service ensures seamless access to online resources to the academic community away from the main campus through Off-Campus libraries. Introduction Information resources especially scholarly literature act as fuel for education and research activities. The process of the literature review is a very important activity of academic and research community. Academic and research community working on novel inventions and discoveries have to go through the literature on previous works. The expression of Isaac Newton "If I have seen further, it is by standing on the shoulders of giants" (Newton, 1675) confirm the importance of the previous works for ongoing scholarly activities.

This article describes the architecture of two broadband satellite communication systems using a very small aperture terminal which have been installed on two Spanish oceanographic research vessels. The potential use, equipment and their... more

This article describes the architecture of two broadband satellite communication systems using a very small aperture terminal which have been installed on two Spanish oceanographic research vessels. The potential use, equipment and their characteristics are studied and compared. Analysing four parameters (jitter, round time trip, package loss and throughput), system configuration has been modified from the launch until the final optimization in order to improve TCP/IP based communications. The hardware selection is fundamental to the successful implantation of the systems, which has to guarantee the quality of satellite services. Satellite channels can affect TCP/IP protocols, but these difficulties were overcome with correct system configuration. Despite the service being operated correctly, several tests had to be done periodically to improve it and check the satellite service conditions. After the optimization of equipment configuration and network parameters on VSAT links of both vessels, effective and stable links have been obtained for Web navigation and VPN communication.

Sophie De Maesschalck, Didier Colle, Bart Puype, Qiang Yan, Mario Pickavet, Piet Demeester Department of Information Tecltnology (INTEC) Ghent University - IMEC Ghent, Belgium { sophie.demaesschalck, didier.colle, han.puype }... more

Sophie De Maesschalck, Didier Colle, Bart Puype, Qiang Yan, Mario Pickavet, Piet Demeester Department of Information Tecltnology (INTEC) Ghent University - IMEC Ghent, Belgium { sophie.demaesschalck, didier.colle, han.puype } @intec.rug.ac.be

Here my localnet VPN Server. Using Virtual box - Debian Server 7.1.0