The virtual private network or simply VPN can be stated as the technology, which is responsible for creating the safe as well as encrypted connection over the lesser secured network like the Internet connectivity [12]. This technology of virtual private network is subsequently developed as the methodology for the purpose of allowing the respective remote users or the branch divisions for securely accessing the corporate resources or applications. For ensuring safety, the sensitive data travels through the secured tunnels. The users of virtual private networks should utilize the authenticated and authorized methods such as passwords, unique identifying processes and tokens for gaining proper access to the servers of virtual private networks [15].
The virtual private networks are also utilized by the remote workers, who require the access to the corporate resources and consumers, who might require downloading the files or the business travellers, who wish to log into the sites, which are substantially restricted geographically. The VPN services are extremely critical conduits, by which the data could be transported securely and safely. The two extremely common virtual private network types are site to site VPNs and remote access VPNs [3]. The remote access virtual private network utilizes the infrastructure of public telecommunication such as the Internet for providing remote users with the safe and secured access to the organizational network. The client of virtual private network on the computer or mobile device of the remote user is connected to the gateway of virtual private network within the network of the organization.
The following report will be outlining a brief discussion regarding the replacement technologies of virtual private networks. The gateway of these virtual private networks usually needs a device for the purpose of authenticating the identity [20]. Next, this gateway could eventually create the network links back into the devices, which allow them in reaching to the resources of internal network like the printers, intranets and servers, since it is registered to the network locally. The legacy virtual private network generally relies on the IPsec or IP security as well as SSL or secure sockets layer for the purpose of securing the connection. However, the secure socket layered virtual private networks are completely focused on the supply of secured access to one application and not on the complete internal networks [1].
Few of the legacy VPNs give the layer 2 access for the targeted network and they need the tunnelling protocols such as the point to point tunnelling protocols and layer 2 tunnelling protocols that could run across the basic connection of IPsec. There are some of the major problems or drawbacks of the legacy VPNs. These problems or issues might be extremely dangerous for the users; however some of the solutions are also present that could easily resolve them. Hence, few of the technologies are implemented as the alternatives [9]. The most popular and significant technologies are SoftEther VPN and Microsoft DirectAccess. The report will be providing the detailed review of the VPN technologies and their issues with relevant and suitable solutions.
According to Regola and Nitesh [5], the legacy virtual private networks often undergo some of the most important and significant issues that could be quite distracting for the users of this technology. The major limitation of the legacy VPN is that most of the reliable virtual private networks are not of free charges. A monthly subscription is to be paid for the safety reasons. The data could be sold out from the online activities to the respective ad providers [19].
Another specific limitation of the legacy VPN would be that connection speed often becomes less than the usual range. Although, there is scope for better data transmission, the intake of resources is extremely slower and thus this technology is often avoided by the users [1]. However, with the help of paid connection, this particular issue of legacy VPN is solved eventually.
Security is the next noteworthy drawback of the legacy virtual private networks. As per Kahate [16], the blacklisting of the IP address and the IP spoofing are the major examples of this security issue of VPN. Thus, it is extremely important for subscribing to only to the trustworthy as well as reputable virtual private networks. The complexity of the legacy VPNs is yet another significant drawback of this technology. The intricate combination of hardware equipment, network topologies and protocols help the service providers to make up the distinct channel of virtual private network [13]. The extra stress is given to these channels of VPN and the components also play an important role here.
Figure 1: Remote Access VPN
(Sources: Kahate [16])
The above figure provides a clear image of the remote access of the VPN and respective networks.
Wang et al. [10] state that, there are some of the most suitable and relevant solutions of the issues faced by the legacy virtual private networks. The implementation of firewalls is one of the major solution for such limitations. The Internet firewall is responsible for protecting the network. It utilizes few techniques as the examination of Internet addresses on the ports or packets as per request on the incoming connections for deciding which traffic should be allowed and which traffic should be eradicated [7]. Most of the legacy VPN packages do not comprise of any firewall; however with the proper implementation of packet filtration firewall, the specific IP services get blocked from crossing the gateway routers.
The routers could support the technologies of VPN like the SoftEther VPN and Cisco Private Internet Exchange from supporting the packet filtration. Moreover, the proxy servers are also an important solution for running on the top of the network operating system like Novell Netware, Windows NT and UNIX. Liyanage and Andrei [6] have described that authentication is the next important solution to such issues faced in the legacy VPNs. This authentication technique ensures that the communicating parties are eventually exchanging the confidential data with the correct users and hosts. The CHAP or Challenge Handshake Authentication Protocol is the best example of this authentication technique. Moreover, data integrity is also ensured with the help of authentication technique [22]. The legacy VPNs also support the types of encryption technology and the data packages are sent to the secured envelope. These mentioned solutions hence could easily resolve the various issues of legacy VPNs.
The IPsec based virtual private networks or SoftEther virtual private networks are completely familiar with the various types of firewalls. The SoftEther VPNs do not need any type of costly Cisco or any other devices of hardware [2]. The Cisco as well as Open VPN could be replaced with the SoftEther virtual private network. Virtual private networks are extremely important and noteworthy networks for the entire technological world. There are some of the major and the most important advantages of these private network extensions. The first and the foremost advantage of the virtual private network is the enhanced security. When the network is being connected through a virtual private network, the sensitive data is being kept secured, safe and encrypted [8]. Hence, the information is kept away from the attackers or hackers. The second important advantage of this technology of virtual private network is the remote control. The information that could be accessed remotely form any specific location. As a result, VPN increments the overall productivity of any organization. Moreover, the service of virtual private network could also be used, if any group is present, which require sharing of data for the extended time period [11].
The next significant advantage of this virtual private network is that the user could browse the Internet with the help of VPN in entire anonymity. In comparison to encrypt the web proxies or IP software, the major advantage of the service of virtual private network is that it enables the user in accessing both the web sites and web application within absolute anonymity. VPN is also useful for changing the IP addresses and providing better performances to the users by increasing the efficiency and bandwidth [21]. The expenses are also reduced when the virtual private network is being created. Since, the cost of maintenance is extremely low, the network set up or the surveillance is not at all a concern.
In spite of having all the above mentioned advantages, there are some of the specific disadvantages or drawbacks that make the technology quite problematic for the users [17]. The major and one of the most important limitation of the virtual private network is security. The security of the service of legacy virtual private network is often quite dangerous for all the users. Since, the virtual private networks utilize the technology of encryption for providing confidentiality of data or information [4]. Whenever the connection is being made, this technology of virtual private network makes the proper utilization of tunnelling mechanism for the purpose of encapsulating the encrypted data to a secured tunnel. The openly reading headers could cross the public network eventually and hence the packets that are being passed over the public network are unreadable without the proper decryption of messages [7]. As a result, the confidential data is ensured not to be changed or disclosed in any method while transmission.
This virtual private network could even provide the proper check of data integrity and is then performed for ensuring that the data is not getting tampered at any cost. Furthermore, the legacy VPNs do not provide as well as enforce the strong users’ authentication [14]. The users would enter the username as well as password for gaining access to the internal private networks from all types of insecure networks. Moreover, another limitation of the legacy VPN is that it subsequently supports the mechanism of add on authentication like RADIUS, tokens and smart cards. The next important and noteworthy drawback of the legacy virtual private network is KillSwitch. For assuring the overall safety of the network connection, the virtual private network provides features for enhancing the security level [18]. Two types of KillSwitches are present. The first type is the Internet KillSwitch that would block the internet traffic for the drops of virtual private network. The second type of KillSwitch is the Application KillSwitch that could ensure the fact that a series of selected applications would be closed.
Another significant and noteworthy limitation of the legacy VPN would be the performance issues. As the connection of the private network eventually works by the connection of network to the private server, it often creates a major performance issue in the process [12]. Some of the legacy VPNs even undertake longer time for connecting to the private servers and this leads to loading of website for a longer time, while accessing it. The connection speed is much lower while utilizing the private connection. The other significant drawback of this legacy VPN is that this service could monitor the activity and then use the data. There are certain cases, where the legacy virtual private networks can monitor the data from the data for their own advantages from the users [3]. Thus, security is lost completely and the users does not get any idea regarding the data.
The various above mentioned limitations or drawbacks could be solved with the help of some of the technology replacements [20]. The first and the most important solution to all the limitations of VPN is using P2P servers. This type of VPN services would allow the users in avoiding all problems related to ISP. The replacement of technologies is the next significant and important solution for VPN technology. The proper utilization of Double VPN technology is another effective and efficient solution for the several limitation of legacy VPNs. This particular technology replacement enables the users in browsing anonymously by subsequently connecting to the series of the VPN servers [5]. The Double VPN technology allows the level of security as well as VPN tunnel with proper encryption. Another important solution for these limitations is the proper utilization of SSTP as well as stealth VPN protocols. These two protocols of the legacy virtual private network are of quite higher speed and is extremely secured. Thus, the security issues are solved easily. The replacement of the legacy VPN technologies with VPN+Tor is yet another specific solution for the limitations of legacy virtual private networks [10]. Tor could be utilized for masking the sensitive data and hence the frequent utilization of this browser would allow to secure the ISP of users.
Figure 2: Site to Site VPN Connection
(Source: Bari et al. [13])
Conclusion
Therefore, from the above discussion, it can be concluded that the VPN or virtual private network is the respective encrypted connection on the Internet from the device to any network. The specific encrypted connection is responsible for helping to ensure that the sensitive data is securely and safely getting transmitted. This type of private network extension eventually prevents the unauthorized or unauthenticated individuals from eavesdropping over the network traffic and then enables the users in conducting the specific work remotely. The technology virtual private network is properly utilized in the corporate environments. The virtual private network extends the corporate network from the encrypted connections that are being made on the Internet. As the respective network traffic is being encrypted within the network as well as the device, this network traffic stays private when it is travelling. The secured remote access could provide the safe and secured method for connecting the devices and users remotely to the corporate network. This remote access involves the VPN technology for authenticating the devices or users. The virtual private network technology is available for checking whether the device is meeting the various requirements and is allowed for connecting remotely. The traffic of the VPN is then sent securely and safely by the establishment of the encrypted connection in the Internet and is termed as tunnel. The above report has properly demonstrated the virtual private networks and their limitations. Security is the major drawback of the legacy VPNs and this could become extremely dangerous for the networks. The secured authentication methods could be utilized with the stronger passwords. Moreover, there are some other technologies as well that help in securing the VPN.
Virtual private network is one of the most important and significant private networks that has become quite popular for the technological world [3]. The future virtual private networks could majorly focus on the network access control and then assess the connecting devices for determining the fact that whether it is in the correct state to get connected or not. Moreover, there is other scope of these virtual private networks in future like they would be focusing on the multi factor authentication for the devices or users. The future virtual private networks is also expected to be built within the operating system and they would be invisible to the various end users [20]. The other expectations from the future virtual private networks would be that all the required things would become completely automated over the client of virtual private network and even on the management side. The network administrators would not require to take care of the technologies related to the virtual private networks and the efficiency or effectiveness would be improved [9]. Regarding security, VPN would be extremely advanced and the future technology would be having in-built firewalls within the networks for providing better security.
References:
[1] Gong, Li-Hua, Ye Liu, and Nan-Run Zhou. “Novel quantum virtual private network scheme for PON via quantum secure direct communication.” International Journal of Theoretical Physics 52, no. 9 (2013): 3260-3268.
[2] Jain, Raj, and Subharthi Paul. “Network virtualization and software defined networking for cloud computing: a survey.” IEEE Communications Magazine 51, no. 11 (2013): 24-31.
[3] Ismail, Mohd Nazri. “Study the best approach implementation and codec selection for VoIP over virtual private network.” (2013).
[4] Chung, Chun-Jen, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang. “NICE: Network intrusion detection and countermeasure selection in virtual network systems.” IEEE transactions on dependable and secure computing 10, no. 4 (2013): 198-211.
[5] Regola, Nathan, and Nitesh V. Chawla. “Storing and using health data in a virtual private cloud.” Journal of medical Internet research 15, no. 3 (2013).
[6] Liyanage, Madhusanka, and Andrei Gurtov. “Securing virtual private LAN service by efficient key management.” Security and Communication Networks 7, no. 1 (2014): 1-13.
[7] Bennacer, Leila, Yacine Amirat, Abdelghani Chibani, Abdelhamid Mellouk, and Laurent Ciavaglia. “Self-diagnosis technique for virtual private networks combining Bayesian networks and case-based reasoning.” IEEE Transactions on Automation Science and Engineering 12, no. 1 (2015): 354-366.
[8] Banikazemi, Mohammad, David Olshefski, Anees Shaikh, John Tracey, and Guohui Wang. “Meridian: an SDN platform for cloud network services.” IEEE Communications Magazine51, no. 2 (2013): 120-127.
[9] Sharkh, Mohamed Abu, Manar Jammal, Abdallah Shami, and Abdelkader Ouda. “Resource allocation in a network-based cloud computing environment: design challenges.” IEEE Communications Magazine 51, no. 11 (2013): 46-52.
[10] Wang, Anjing, Mohan Iyer, Rudra Dutta, George N. Rouskas, and Ilia Baldine. “Network virtualization: Technologies, perspectives, and frontiers.” Journal of Lightwave Technology31, no. 4 (2013): 523-537.
[11] FCMI, Sabah Nassir Hussein, and Abdul HadiQais Abdul Hadi. “The Impact Of Using Security Protocols In Dedicated Private Network And Virtual Private Network.” International Journal of Scientific & Technology Research 2, no. 11 (2013): 170-175.
[12] Liyanage, Madhusanka, Jude Okwuibe, Mika Ylianttila, and Andrei Gurtov. “Secure Virtual Private LAN Services: An Overview with Performance Evaluation.” In Communication Workshop (ICCW), 2015 IEEE International Conference on, pp. 2231-2237. IEEE, 2015.
[13] Bari, Md Faizul, Raouf Boutaba, Rafael Esteves, Lisandro Zambenedetti Granville, Maxim Podlesny, Md Golam Rabbani, Qi Zhang, and Mohamed Faten Zhani. “Data center network virtualization: A survey.” IEEE Communications Surveys & Tutorials 15, no. 2 (2013): 909-928.
[14] Daya, Bhavya. “Network security: History, importance, and future.” University of Florida Department of Electrical and Computer Engineering 4 (2013).
[15] Perlman, Radia, Charlie Kaufman, and Mike Speciner. Network security: private communication in a public world. Pearson Education India, 2016.
[16] Kahate, Atul. Cryptography and network security. Tata McGraw-Hill Education, 2013.
[17] Manshaei, Mohammad Hossein, Quanyan Zhu, Tansu Alpcan, Tamer Bac?ar, and Jean-Pierre Hubaux. “Game theory meets network security and privacy.” ACM Computing Surveys (CSUR) 45, no. 3 (2013): 25.
[18] Tokuyoshi, Brian. “The security implications of BYOD.” Network Security 2013, no. 4 (2013): 12-13.
[19] Knapp, Eric D., and Joel Thomas Langill. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress, 2014.
[20] Chen, Gaojie, Yu Gong, Pei Xiao, and Jonathon A. Chambers. “Physical layer network security in the full-duplex relay system.” IEEE transactions on information forensics and security 10, no. 3 (2015): 574-583.
[21] Kizza, Joseph Migga. Guide to computer network security. London: Springer, 2013.
[22] White, Gregory B., Eric A. Fisch, and Udo W. Pooch. Computer system and network security. CRC press, 2017.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download