Security assessment and evaluation of VPNs: a comprehensive survey

H Abbas, N Emmanuel, MF Amjad, T Yaqoob… - ACM Computing …, 2023 - dl.acm.org
The use of Virtual Private Networks (VPNs) has witnessed an outstanding rise as they aim to
provide confidentiality and anonymity to communication. Despite this enormous and …

[PDF][PDF] Study on virtual private network (VPN), VPN's protocols and security

KK Jyothi, BI Reddy - … Journal of Scientific Research in Computer …, 2018 - researchgate.net
When an access-desired network is constructed using public network infrastructure such as
global Internet to connect remote users or regional offices to company's private network is …

Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol

A Abdulazeez, B Salim, D Zeebaree, D Doghramachi - 2020 - learntechlib.org
The key point of this paper is to assess and look over the top of the line network layer-based
VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in …

VPN: a boon or trap?: a comparative study of MPLs, IPSec, and SSL virtual private networks

Z Zhipeng, S Chandel, S Jingyao… - 2018 Second …, 2018 - ieeexplore.ieee.org
In today's world, the security and privacy of data that travels through the cyberspace have
become an essential concern for the individual users and the organizations. Apart from this …

Futuristic Challenges in Blockchain Technologies

AK Singh, S Saxena, A Tripathi… - Blockchain and Deep …, 2023 - Wiley Online Library
Summary Internet of Things (IoT)‐based services have grown rapidly worldwide, and IoT is
evolving at a very fast pace in industry and research, yet it is still not able to address privacy …

[HTML][HTML] A new cyber risk: how teens expose corporations in WFH era

Z Siyed - Journal of Information Security, 2023 - scirp.org
We analyze the risks associated with teenagers' online activities and the potential migration
of cyber threats originating from teenagers to their parents' work-from-home (WFH) devices …

Mvpn: A defense architecture against VPN traffic hijacking based on MTD

Z Gao, F Chen, Y Wang, W He, X Shi, G Xie - Electronics, 2023 - mdpi.com
With the increasing awareness of privacy protection, Virtual Private Networks (VPNs) are
widely used to build a more secure communication tunnel. However, a traffic hijacking attack …

Securing VPN from insider and outsider bandwidth flooding attack

S Shunmuganathan, RD Saravanan… - Microprocessors and …, 2020 - Elsevier
Globalization is the order of the day. Linking globally dispersed corporate offices and
securing the data transferred between them is a critical activity. Virtual Private Network …

Dynamic access control method for SDP-based network environments

H You, D Ko, D Kim, R Wong, I Joe - EURASIP Journal on Wireless …, 2023 - Springer
With online work environments and other distributed computing systems—such as cloud
technologies or Internet of Things systems—becoming increasingly popular today due to the …

Cybersecurity of remote work migration: A study on the VPN security landscape post covid-19 outbreak

L Einler Larsson, K Qollakaj - 2023 - diva-portal.org
Background. The pandemic outbreak commenced a large migration of employees from all
kinds of industries from previously working in an industrial or office environment to working …