Results 231 to 240 of about 107,397 (277)
Some of the next articles are maybe not open access.

A study of cloud-based VPN establishment using network function virtualization technique

2022 3rd International Conference on Smart Electronics and Communication (ICOSEC), 2022
Network Function Virtualization is the process of moving networking functions like Firewall, Load Balancing, Virtual Private networks (VPN), Gateway Antivirus, etc. away from proprietary hardware to the virtual server.
Sankili Santhanamahalingam   +2 more
semanticscholar   +1 more source

VPN Traffic Identification Based on Tunneling Protocol Characteristics

2022 IEEE 5th International Conference on Computer and Communication Engineering Technology (CCET), 2022
Virtual Private Network (VPN) provides a secure, encrypted, and anonymous communication between remote networks. More and more people are inclined to use, with the raising network security and privacy protection awareness.
Yu Li, Fei Wang, Shuhui Chen
semanticscholar   +1 more source

VPN Traffic Analysis: A Survey on Detection and Application Identification

IEEE Access
Network traffic analysis is fundamental for cybersecurity, network management, and policy enforcement. The widespread adoption of encryption, particularly through Virtual Private Networks (VPNs), presents a significant challenge by obscuring traditional ...
Y. Razooqi, A. Pekár
semanticscholar   +1 more source

Performance Evaluation of Multimedia over MPLS VPN and IPSec Networks

2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), 2022
In this paper multimedia streaming applications is performance is evaluated over MPLS network using two VPN techniques MPLS VPN and IPSec using OPNET simulation tool.
A. M. Sllame
semanticscholar   +1 more source

Zero Trust VPN (ZT-VPN): A Systematic Literature Review and Cybersecurity Framework for Hybrid and Remote Work

Inf.
Modern organizations have migrated from localized physical offices to work-from-home environments. This surge in remote work culture has exponentially increased the demand for and usage of Virtual Private Networks (VPNs), which permit remote employees to
Syed Muhammad Zohaib   +5 more
semanticscholar   +1 more source

Research on the application of cross-domain VPN technology based on MPLS BGP

2022 6th International Conference on Wireless Communications and Applications (ICWCAPP), 2022
In order to support the exchange of VPN routing information between operators, it is necessary to extend the existing protocols and modify the MPLS VPN architecture to provide an interconnection model that is different from that provided by the basic ...
Wenhua Wu, Ting Yan, Wei Cao, Hang Li
semanticscholar   +1 more source

MAFIS Overlay Network: Towards a Secure Network for Mobile Automated Fingerprint Identification System over Virtual Private Network (VPN)

ICCBN, 2022
The Philippines is an archipelago or string of over 7,640 islands in southeastern Asia. With the community's active support, the Philippine National Police (PNP) is entrusted with upholding the law, preventing and controlling crimes, maintaining peace ...
W. Rey, M. Baccay
semanticscholar   +1 more source

Identifying VPN Servers through Graph-Represented Behaviors

The Web Conference
Identifying VPN servers is a crucial task in various situations, such as geo-fraud detection, bot traffic analysis and network attack identification. Although numerous studies that focus on network traffic detection have achieved excellent performance in
Chenxu Wang   +5 more
semanticscholar   +1 more source

A Comparative Research on SSL VPN and IPSec VPN

2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, 2012
with the development of information technology, VPN technology has been widely applied in variety of fields. In this paper, two kinds of VPN : IPSec and SSL VPN are studied in detailed, and the scope of application, security, scalability and other aspects are analyzed and compared, advantages and inadequacy are summarized, finally, VPN selection ...
Huaqing Mao, Li Zhu, Hang Qin
openaire   +1 more source

VPN-Accessories

2020
An increasing number of enterprises are opting for VPN and the vendors come out with hardware which comes along with software , such as added support for hardware based - encryptors. Some have enhanced the server capabilities to accommodate VPN related functionalities such as security in firewall based VPN's. Most specialized VPN products are hardware (
openaire   +1 more source

Home - About - Disclaimer - Privacy