VPN (Virtual Private Network) is a term which provides a method for communication network which is a combination of network that focus on the secure establishment of connection tunnel by making use of unsecured network. VPN focus on the transmission of data through method of tunnelling [1]. In this method the packet is wrapped or encapsulated into a packet. This header provides routing of information so that it can be located into a shared network before its arrival at the endpoint. The logical path for the travelling of encapsulated packets is known as tunnel. At the end point it is DE capsulated and given or forwarded to final destination. Tunnelling protocol generally operate in Open system interconnection, network layer and data link layer. VPN makes use of encryption for providing confidentiality [2]. After the establishment of a network VPN makes use of tunnelling method for encryption of data into a secure network. Packets are passed over the network in such a way that they cannot provide decryption of various keys. This mainly ensures the fact data is not disclosed or any kind of changes are not done during its transmission. VPN provides a high check on data integrity which mainly ensures that data containing important information is not tampered during its transmission.
Problems related to working of VPN technology and security issues has been discussed in details. All the challenges and drawbacks VPN technology has been discussed in brief in the coming pages of report. Possible solution and future of research area has been discussed in details in coming pages of the report. All the issues like hacking attacks, authentication for user, client side risk and consideration for security has been discussed [3]. There are generally two security breaches with VPN security namely VPN hijacking and man in the middle attacks has been discussed in detail in this report. There are generally four types of VPN deployment namely remote access VPN, Intranet VPN, Extranet VPN and WAN replacement. There are mainly four types of VPN namely remote access namely firewall based VPN, hardware based VPN and software based VPN. VPN technology provides a method by which information can be easily transmitted over the internet. It generally allows user to securely enter into virtual private network so that it can easily provide accessing of data and communication by making use of insecure network like internet.
VPN stands for virtual private Network. The system of the client is ultimate target. An intruder can easily exploit misconfiguration in the system of client or any other kind of tool for hacking for launching attack. This is generally inclusive of two facts namely VPN hijacking and Man-in the middle attack. VPN hijacking is nothing but unauthorised access to the establishment of VPN connection form a distant and remote client and connection of networks [4]. Man in the middle generally stresses on the traffic which is being sent to the communication parties which is inclusive of insertion, deletion and modification of messages and redirecting of it. There are generally three type of authentication namely user authentication, risk on the side of client and lastly virus and malware infection. A VPN security should be establishment only by an authenticated user [5]. VPN client is generally connected to a network by the help of broadband connection and at the same interval of time VPN network is established by making use of split tunnelling method. Personal firewall should be properly installed and configured on the machine of client so that it can block or stop unauthorised access to the client which ensures its safety from any kinds of attacks. Many of the recent remote access to client of VPN which is generally inclusive of personal firewalls. Other configuration checks are VPN client which is generally inclusive of configuration checks like client is not being able to connect its network if anti-virus software is not running properly or signature of VPN are out of date.
VPN connection can be easily strengthened by making use of firewalls. An IDS (Intrusive Detection System) or IPS (Intrusion prevention system) is generally used for analysing and monitoring of various attacks in a more efficient way. Antivirus should be installed in remote links and networks sever so that it can easily prevent network and server from spreading [6]. Unsecured system is very simple and it should not be considered for establishment of VPN connection in an internal network. Logging and authorized function should be properly provided so that it can easily monitor authorised access in an attempt [7]. Best quality of training should be provided to network administrator and other staff so that they can easily check the best practices and policies for its implementation. Guidelines and policies of security ensures to makes use of VPN and network support so that it can properly distributed to following parities for controlling and governing of VPN [8]. Proper placing of VPN at entry point can be placed in demilitarised zone which is used for protection in an internal network. It is not advised for splitting of tunnel for accessing internet or any other kind of insecure network at the time of establishment of VPN connection [9]. If split tunnelling mechanism is used to accessing internet a firewall and IDS can be detected and prevented from any kind of potential attack from different kinds of insecure networks.
There are some kind of additional security consideration for the deployment of extranet VPN. Strong user authentication mechanism should be followed. The entry point of VPN can be placed in a DMZ for the prevention of various partners from accessing various internal networks. Accessing the rights should be taken as per the needs [7]. Proper necessary resources should be provided to external networks. Owners of this resource should be provided on a regular basis. There are certain of number of consideration which must be taken like making use of certificates and tokens, secondly making use of add on authentication system. Personal firewalls should be considered or taken into account for installation and configuration properly for various kinds of client. VPN system are generally used for blocking authorized access to the client which mainly helps in ensuring its safety from any other kinds of factors [5]. The system of client should have an antivirus installed in it. The user should be aware about the various kinds of physical security.
There are certain number of security measures for choosing of VPN product. It claims to provide support for strong authentication. It is generally industry based strong encryption of algorithm which comes with a long value of key for support for the protection of confidentiality of data at the time of its transmission. It generally supports anti-virus and intrusion detection methods [4]. Digital certificate support is generally used for certification for various kinds of sites for its authentication. It claims to provide site to site authentication. Support for address management like the capability for address of client on any network can be ensured that the various kinds of address are kept to be private nature.
This report has been prepared after gathering the response from the various journals about few of the questions that has been asked to them. The first part of analysing the problems was done successfully by the use of information gathered from the review of various kinds of journals [3]. A broad scope of the literature has been done by the use of the electronic database. The scope was limited to the peer reviewed journal articles published in English between 2012 and 2017.
Findings and Conclusion
The above discussion helps to conclude that the company is facing various problems since its establishment. Various issues in relation to VPN method has been discussed in detail in coming pages of the report. A literature review has been done which focus on the various kinds of issue related to VPN security has been discussed in above pages of the report. In the above pages of the report a brief idea has been provided regarding VPN (Virtual Private Network). A list of question regarding this topic like challenges, drawbacks and solution has been discussed. The objectives of this research like improvisation of security, close integration, overview of VPN security has been discussed in the above pages of the report. A literature review has been provided regarding the topics like problems faced by VPN security, consideration of VPN, extranet VPN security of consideration has been discussed in details in the above pages of the report.
References
[1]K. Grewal and R. Dangi, “Comparative Analysis of QoS VPN Provisioning Algorithm on Traditional IP based VPN and MPLS VPN using NS-2”, International Journal of Computer Applications, vol. 48, no. 1, pp. 43-46, 2012.
[2]T. Caldwell, “Locking down the VPN”, Network Security, vol. 2012, no. 6, pp. 14-18, 2012.
[3]”QOS Capabilities for Building MPLS VPN”, International Journal of Science and Research (IJSR), vol. 5, no. 5, pp. 2247-2251, 2016.
[4]G. Zhang, “The Solution and Management of VPN Based IPSec Technology”, Applied Mechanics and Materials, vol. 686, pp. 210-219, 2014.
[5]V. Perta, M. Barbera, G. Tyson, H. Haddadi and A. Mei, “A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients”, Proceedings on Privacy Enhancing Technologies, vol. 2015, no. 1, 2015.
[6]V. Perta, M. Barbera, G. Tyson, H. Haddadi and A. Mei, “A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients”, Proceedings on Privacy Enhancing Technologies, vol. 2015, no. 1, 2015.
[7]B. B?NU??, “Security Technologies Implemented in MPLS VPN Networks”, International Journal of Information Security and Cybercrime, vol. 1, no. 2, pp. 9-16, 2012.
[8]M. Liyanage, P. Kumar, M. Ylianttila and A. Gurtov, “Novel secure VPN architectures for LTE backhaul networks”, Security and Communication Networks, vol. 9, no. 10, pp. 1198-1215, 2016.
[9]I. Ketut, “Methods Usage Computer for Secuity and User Compvenience”, International Journal of Computer Applications, vol. 160, no. 1, pp. 1-4, 2017.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download