2012 Next Generation Networks and Services (NGNS) 2012
DOI: 10.1109/ngns.2012.6656108
|View full text |Cite
|
Sign up to set email alerts
|

VPN IPSEC & SSL technology Security and management point of view

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Lakbabi et al [20] presented the differences between protocols strengths and weaknesses from a security and management perspective of IPSEC and SSL VPN technologies. They have briefed the general overview of all the layer 2 VPN technologies which have got no encryption mechanism, and so, IPSEC and SSL VPN has been the topic of discussion in this paper.…”
Section: Firewallmentioning
confidence: 99%
“…Lakbabi et al [20] presented the differences between protocols strengths and weaknesses from a security and management perspective of IPSEC and SSL VPN technologies. They have briefed the general overview of all the layer 2 VPN technologies which have got no encryption mechanism, and so, IPSEC and SSL VPN has been the topic of discussion in this paper.…”
Section: Firewallmentioning
confidence: 99%
“…Upon of receiving of the malicious request, the receiver might lose the data or suffer from long queuing time which may lead to receiver complete fail. is made to classify the data according to the nature of connection [13]. The attack prevention model is working according to the following steps.…”
Section: Attack Repellingmentioning
confidence: 99%
“…The information transmitted between the two communicating sites through the encrypted tunnel cannot be read by anyone else because the system relies on several factors to secure the service provider's private network and the public network through which the remote user connects. There are three main network protocols for using VPN tunnels, namely IPsec, the Point-to-Point Tunneling Protocol (PPTP) and Layer Two (2) Tunneling Protocol (L2TP) [199,201,202]. Using VPNs, users' online activities (visited websites, for instance) are protected against disclosures to third parties.…”
Section: End-to-end Secure Communicationsmentioning
confidence: 99%