Results 1 to 10 of about 14,303 (202)
P4-IPsec: Site-to-Site and Host-to-Site VPN With IPsec in P4-Based SDN
In this work, we present P4-IPsec, a concept for IPsec in software-defined networks (SDN) using P4 programmable data planes. The prototype implementation features ESP in tunnel mode and supports different cipher suites. P4-capable switches are programmed
Frederik Hauser +2 more
exaly +3 more sources
The introduction of IPsec into software-defined networking (SDN) can secure communication in an SDN southbound interface, i.e., communication between the controllers and the switches.
Ximin Yang, Deqiang Wang, Wan Tang
exaly +3 more sources
Model Learning and Model Checking of IPSec Implementations for Internet of Things
With the development of Internet of Things (IoT) technology, the demand for secure communication by smart devices has dramatically increased, and the security of the IoT protocol has become the focus of cyberspace.
Jiaxing Guo, Chunxiang Gu, 熹 陈
exaly +3 more sources
IPsec is the standard suite of protocols for network-layer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how protected traffic should be handled at security end points. This article introduces an efficient policy management scheme for IPsec, based on the principles of trust ...
Blaze, Matt +2 more
exaly +4 more sources
Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel
In the near future, commercially accessible quantum computers are anticipated to revolutionize the world as we know it. These advanced machines are predicted to render traditional cryptographic security measures, deeply ingrained in contemporary ...
Daniel Lawo, José Luis Imaña Pascual
exaly +3 more sources
Analysis and Verification of IPSec VPN Security Vulnerability [PDF]
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj +1 more source
Implementasi GRE Over IPSec Tunnel VPN menggunakan Fortigate
VPN adalah sebuah teknologi komunikasi yang menggunakan jaringan private (pribadi) yang dapat terhubung ke sebuah jaringan publik. Dengan cara tersebut, maka akan didapatkan hak dan pengaturan yang sama seperti halnya berada didalam jaringan lokal itu ...
Yuli Fitrisia, Maruf Alfiando Setianto
doaj +3 more sources
IPSec VPN Closure Detection Method Based on Side-channel Features [PDF]
IPSec VPN can be divided into closed networks and open networks according to different application scenarios.Closed networks are generally used to customize virtual private networks,and open network proxies are commonly used to avoid network auditing ...
SUN Yunxiao, LI Jun, WANG Bailing
doaj +1 more source
Implementasi Jaringan Internet Site To Site VPN Dengan Metode IPSec Pada PT Telkom Akses
Virtual Private Network (VPN) is a local communication network that is connected through a public network, with a private data security network, the closure of data transfer from illegal access and network scalability are the main standards in a Virtual ...
Try Budi Septiandoko +2 more
doaj +1 more source
NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements.
Ilies Benhabbour, Marc Dacier
doaj +1 more source

