Third International Conference on Computer Science and Communication Technology (ICCSCT 2022) 2022
DOI: 10.1117/12.2662581
|View full text |Cite
|
Sign up to set email alerts
|

Research and analysis on hierarchical management balancing strategy of intelligent VPN in colleges and universities under hierarchical protection 2.0 background

Abstract: With the rapid development of information technology, online office and study has been applied by more and more colleges and universities, but the convenient off-campus access has brought a great threat to the network security. In order to solve this problem, this paper proposes an efficient hierarchical management balancing strategy for complex VPN under hierarchical protection 2.0. Through the process design of VPN, unified identity authentication and reverse proxy, the practical case of this strategy has be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Prior to exploring the machine learning-based approaches, it is crucial to be aware of the conventional approaches to VPN classification. Port-based classification or flow-based analysis and Deep Packet Inspection (DPI) are frequently used in these techniques [28]. These techniques have, however, a number of drawbacks, such as the requirement for thorough payload inspection, vulnerability to evasion strategies, and reliance on wellknown port numbers [2].…”
Section: Traditional Vpn Classification Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Prior to exploring the machine learning-based approaches, it is crucial to be aware of the conventional approaches to VPN classification. Port-based classification or flow-based analysis and Deep Packet Inspection (DPI) are frequently used in these techniques [28]. These techniques have, however, a number of drawbacks, such as the requirement for thorough payload inspection, vulnerability to evasion strategies, and reliance on wellknown port numbers [2].…”
Section: Traditional Vpn Classification Methodsmentioning
confidence: 99%
“…Typical supervised algorithms include support vector machines (SVMs), decision trees, neural networks, and k-nearest neighbors (k-NNs) [3]. Without labeled data, unsupervised approaches like clustering have also been used to categorize VPN traffic [28]. To further enhance classification performance and minimize annotation work, semi-supervised techniques that make use of both labeled and unlabeled data have been proposed [7].…”
Section: Machine Learning-based Vpn Classificationmentioning
confidence: 99%