2012 1st International Conference on Recent Advances in Information Technology (RAIT) 2012
DOI: 10.1109/rait.2012.6194494
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing VPN security through security policy management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 3 publications
0
12
0
Order By: Relevance
“…A list of threats and potential attacks on the Transport Layer Security (TLS) and Secure Shell protocols is available [14]. However, while Virtual Private Networks (VPNs) usually call upon the L2TP protocol, reference [15] this alone does not suffice to meet with the LHSs' requirements: There are threats like traffic fingerprinting attacks, possible unencrypted intermediate texts (metadata added during transit of network packets), and potentially leaked client identity keys allowing the identification of the sender for a given message [16].…”
Section: Related Workmentioning
confidence: 99%
“…A list of threats and potential attacks on the Transport Layer Security (TLS) and Secure Shell protocols is available [14]. However, while Virtual Private Networks (VPNs) usually call upon the L2TP protocol, reference [15] this alone does not suffice to meet with the LHSs' requirements: There are threats like traffic fingerprinting attacks, possible unencrypted intermediate texts (metadata added during transit of network packets), and potentially leaked client identity keys allowing the identification of the sender for a given message [16].…”
Section: Related Workmentioning
confidence: 99%
“…However, the ones are still informative [3]. Some researches talk about security methods of a VPN [13], while many others focus on the amazingly accurate performance of VPNs [15][16][17]. However, no academic research doesn't really seems to compare IP Sec [8,10] to a more highly state VPNs procedure such as Wire Guard [18,19] and GRE [20].…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…VPN gives users the opportunity to be in contact with a closed network while using the Internet in a safe way as well as securely. VPN produces converted data and information into codes that prevent interrelation, which is known as a VPN tunnel, and every Internet traffic and communication is taken into the safe tunnel [13,28]. VPN is practically made of two different kinds:…”
Section: Types Of a Virtual Private Network (Vpn)mentioning
confidence: 99%
See 2 more Smart Citations