The research study is focused on
the security perspective of the VPNs. VPN means the virtual private network.
This is a security technology that provides safety to the network and develops
an encrypted connection. A VPN protocol is a design to provide better security
on the public network related to its data and information. The research study
is conducted by using qualitative research methods under the secondary source
data collection. The observation is used for conduction this study in which the
studies of the several authors have been observed in this study from which ten
studies are particularly critically analyzed that are mostly related to the
VPNs security. The publications that are used in this study are not older than
in 2015. Most of the studies are and provide the latest comments for VPNs
security. Several tools are critically analyzed in this study for ensuring the
security protocols of the VPNs. These tools are referred to as a good strategy
for analyzing the security perspectives of the VPNs.
1.
Introduction
of VPNs security
First of all, we have to know about information security and
its aspects. To prevent, detect, documents and other threats, a set of
strategies are going to utilize for managing the policies, tools and processes
is known as information security. The main responsibilities of the information
security are to develop a process for the business that protects all the asset
of information of the business in any type of condition. [1]
The information
securities have a major concern about the confidentiality, integrity and
availability of the business data and IT system. Information security is using
different tools to maintain the security of a high level. These tools include
wireless security tools, web applications and VPN. VPN means the virtual
private network. This is a security technology that provides safety to the
network and develops an encrypted connection. by using a public network named
internet the virtual private network provide a way to extend the private
network. To establish a secure connection, it makes use of tunnelling
protocols.
It is a form of technology that provides the network
securely and remotely with the help of internet. So the data should be
protected from any kind of data loss or damage in case of any illegal access on
the network. [2]
Between 2 parties or 2 VPN gateways, the VPN connection is
going to develop with the secured virtual tunnel to develop with a data
encryption capability, data integrity establish and also make sure that
communication only occurs between two parties that are authentic and have legal
access to the data.
During travelling or at home, this provides secure access to
the computer network by using the internet This is also known as remote access
to the information but provide more benefits as compared to remote access.
1.1.Problem
statement of VPNs security
Normally the private networks are not usable with the help
of any public network or internet because firewall protects the network and
block all the illegal or unrequested traffic to maintain the security of the
network. Different technology is going to use to get the remote access a
private network with the help of internet. This technology is a virtual private
network.
To encrypt the data for sent the information through the
public network. The virtual private network uses a tunnelling protocol. With
dial-up networking protocol, we may use the dial in directly to utilize the
private network. But the major issue with that protocol is charges are going to
increase when the distance is increased so it is very cost-effective. A
dedicated WAN is also utilizing for making a remote connection in two
locations. But over time, the usage of internet is going to increase and the
internet gets access by using the internet service provider in the VPN to
ensure safe and secure communication among different devices. [3]
The VPN combines the scope of WAN and internet and provide
easy access to a network without any restriction of location or distances. A
VPN protocol is a design to provide better security on the public network
related to its data and information. With many factors, the security may
determine like data origin authentication, replay protection, data integrity
and data confidentiality.
Data origin authentication means utilization of techniques
related to authentication to make sure the receiving and transmission of data
through the trusted person who acts as receiver and transmitter. Replay protection
provides detail assurance that same data never sent multiple times. When this
will happen when an attacker captures and send the data against by using the
login information that can get access on a server.
VPN protocol makes sure that data never replay by using the
sequencing technique. Data integrity means that digitally signed the data by
making sure that data never change during transmission.
A hash value of data is going to use to determine instead of
encrypting the data. The hash value of data never change in the long term and
keep the data in its original position. On the public network, the data
converted into such form that is unreadable for illegal assessors through the
internet. So the VPN help to protect the data and its transmission by using the
internet and provide assurance about the data security and its safe
transmission.
1.2.Objective
of VPNs security
The main objective of the virtual private network is to make
the security of the data possible and effect on the public network and making
the transmission of data more accurate and reliable among two or more parties.
Traditional VPN connections need manually connectivity once they lost the first
connection of VPN. When the VPN connection is lost then all operations are
going stop and they start again when the lost connection is against connected. [4]
The feature of VPN reconnect allows the clients to reconnect
the session of VPN which was disconnected in any case. VPN feature of
reconnecting connect to a server of Window VPN with the IKEv2 protocol.
And it's the disconnection is very long then the manual
connectivity should be established. For all those mobile clients who are moving
to a different network, the VPN reconnect remove this need from one network to
another to re-establish the connection of VPN. With different type of
connections like broadband or dial-up required by the VPN to maintain the valid
connection.
When the VPN connection is going to establish then first the
internet is going to settle then between two customers the VPN tunnel is set
and make the connectivity smoother. Over the VPN connection, all the data
traffic may be sent. Through the VPN connection, the clear use of default
gateway on the option of the remote network not route the internet traffic by
using the advanced setting of TCP/IP.
So the main objective of a VPN connection to make the
connectivity more effective and clear and also provide a secure path for data
transmission and prevent illegal access of data and also maintain the security
and its safety features by providing a secure path to transmit the data from
one location to another [5].
References of Abstract of VPNs security
[1]
|
S. Rahimi,
"Quantitative Evaluation of Virtual Private Networks and its
Implications for Communication Security in Industrial Protocols," vol.
1, no. 3, pp. 51-61, 2017.
|
[2]
|
M. Iqbal,
"Analysis of Security Virtual Private Network (VPN) Using
OpenVPN," vol. 8, no. 1, pp. 58-65, 2019.
|
[3]
|
M. C. NAWEJ,
"EVALUATION OF VIRTUAL PRIVATE NETWORK IMPACT ON NETWORK
PERFORMANCE," pp. 1-82, 2016.
|
[4]
|
M. Rost,
"Beyond the Stars: Revisiting Virtual Cluster Embeddings," vol.
3, no. 45, pp. 1-19, 2019.
|
[5]
|
H. Alshaer,
"An overview of network virtualization and cloud network as a
service," vol. 25, no. 1, pp. 1-23, 2018.
|