• Title/Summary/Keyword: Virtual Private Network(VPN)

Search Result 122, Processing Time 0.032 seconds

Analyses of Network Performance Based on VPN Protocols (VPN 프로토콜에 기반한 네트워크 성능 분석)

  • Jang, Chang-Whan;Lee, Min-Suk;Jo, Sung-Ho;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.589-590
    • /
    • 2016
  • Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. This is important matters because these networks can be set-up with a lower cost of ownership compared to other means of securing communications. VPN is a proven technology that does provide security strong enough for business use. However, performance of these networks is also important in that lowering network and server resources can lower costs and improve user satisfaction. We analyzed network performance analysis of VPN protocols.

  • PDF

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

Embedded Home Network System Security using VPN (VPN을 이용한 Embedded 홈 네트워크 시스템 보안)

  • Jin, Seon-Il;Jeong, Jin-Gyu;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.701-704
    • /
    • 2003
  • The home network system of ubiquitous computing concept is changing present our home life as more comfortable and safe. Also, it permits that we can connect the home network system and control the appliance which is linked to the home network system without limitation in time and place. But, as other systems that use the public network like the Internet, remote control/monitoring of the home network system that use the Internet includes problems such as user's access which is not admitted and information changing. This paper presents the efficient solution about the security problem that is recognized to important problem of the home network system. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

  • PDF

An Implement TLS VPN Client for Gooroom OS (국산 개방형 구름 OS를 위한 TLS VPN Client)

  • Park, J.P.
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.452-454
    • /
    • 2018
  • 본 논문에서는 국내 OS시장의 편중화 현상을 해결하기 위해 개발된 개방형 OS 인 구름 플랫폼에서 동작 할 수 있는 가상사설망(Virtual Private Network, VPN) Client를 암호화 기술, 터널링 기술을 적용한 사용자 인증 기반의 안전한 통신망을 제공하는 목적에서 TLS[1](Transport Layer Security,TLS 1.2) 프로토콜을 사용하여 원천기술을 개발하며 이의 고도화를 추구한다.

  • PDF

An Implement TLS VPN for Internet of Things (IoT기기를 위한 TLS VPN 구현)

  • Park, J.P
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.191-192
    • /
    • 2015
  • 본 논문에서는 최근 급성장하는 사물인터넷(Internet of Things, IoT) 시장의 안전한 원격 네트워크 통신을 위한 가상사설망(Virtual Private Network, VPN) 구축을 TLS(Transport Layer Security, TLS 1.0 또는 SSL 3.0) 프로토콜을 사용하여 암호화 기술, 터널링 기술을 적용한 인증 기반의 안전한 통신망을 제공하는 목적에서 기술개발의 고도화를 추구한다.

  • PDF

IPSec VPNs vs. SSL VPNs

  • 윤재호;권태경;천동현;임선간
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.24-30
    • /
    • 2003
  • 인터넷을 비롯한 대부분의 패킷스위칭 네트워크는 IP(Internet Protocol)을 기반으로 하고 있다. 그러나, IP는 기본적으로 보안에 취약하게 설계되어 보안이 필요한 통신에 사용하는데는 어려움이 있다. IPSec(IP Security)은 IP 트래픽에 대한 이러한 보안문제를 극복하기 위해 생겨났으며, 방화벽과 결합된 형태로 가장 널리 쓰이고 있는 VPN(Virtual Private Network) 제품의 하나이다. 그러나 IPSec의 문제점이 대두되고, Web-based Service가 영역을 넓혀가면서 기존의 웹보안프로토콜인 SSL이 VPN의 새로운 형식으로 나타나고 있다. 본 고에서는 IPSec VPN과 SSL VPN의 차이점의 분석하여 정리하고자 한다.

A Study of Virtual Private Network On based Environment IP Security Simulations Quality of Service Guarantee (IPSec 기반 환경하에서 QoS 보장 가상 사설망 구현 방안 연구)

  • Kim, Jeong-Hun;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.150-153
    • /
    • 2001
  • Today Internet is only Best-Effort service. During the past few years, new types of internet applications which require performance beyond the best-effort service that is provided by the current internet have emerged. These applications required QoS(Quality of Services) guarantee and Security between end-to-end. In this paper simulations Differentiated Services that IETF(Internet Engineering Task Forte) has proposed one of QoS(Quality of Services) guarantee VPN(Virtual private Network) using QoS(Quality of Services) guarantee and IP Security between end-to-end.

  • PDF

A Case Study on e-Transformation of Kolon Glotech, Inc. (e-Transformation 수행 방안에 관한 코오롱글로텍(주)의 사례연구)

  • Yoon, Cheol-Ho;Kim, Sang-Hoon
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.23-36
    • /
    • 2003
  • This study proposed the approaches to business process redesign and business network redesign in e-business environment through the case analysis of e-Transformation performed in Kolon Gloteck, Inc. which has been managed and operated in a traditional mode. The proposed e-Transformation approaches of the traditional firm in this study were as following: 1) Network-focused business process redesign; 2) Introducing ERP(Enterprise Resource Planning) as e-Business backbone; 3) Establishing transparence of business functions through using shared database; 4) Understanding customer and constructing IT(Information Technology) infrastructure for customer satisfaction; 5) Performing data and process standardization; 6) Applying the best suitable IT(Information Technology) such as JSP(Java Server Pages) and VPN(Virtual Private Network). The findings of this case study are thought to be useful as a practical guideline in carrying, out e-Transformation of the typical traditional firm and to provide significant basis for constructing the theoretical framework of e-Transformation methodology.

Implementation and performance evaluation of the ONU&OLT supporting VPN in the ATM-PON (ATM-PON 환경에서 VPN지원을 위한 ONU와 OLT 기능 구현 및 성능 분석)

  • 박미리;장성호;이대봉;장종옥
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.306-310
    • /
    • 2002
  • Today, corporations are approach to inside information using public network such as Internet groping economical way to utilize public network to corporation information network without buying equipment. But, special quality of internet, Virtual Private Net (VPN) that it uses net that is observed as technology that can be guaranteed public safety division transmission and data securitybecause of can not secure data transmission. In this paper. add VPN function ONU&OLT of ATM-PON system and propose SCB (Single Copy Broadcasting). When there is VPN function to ATM network, the speed can be fast, and reduce rain track pick quantity during time more. Performance analysis network simulation that use NS-2.

  • PDF

A Study of VPN Performance on HFC Network (HFC망에서의 VPN성능에 관한 연구)

  • 김선희;문종섭;임종인
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.691-700
    • /
    • 2003
  • 어디서나 접속할 수 있는 인터넷의 광역성과 최근 들어 인터넷을 통한 전자상거래의 급진전, 네트웍을 통한 다양한 형태의 원격 접속 확대 등으로 이제 많은 기업들이 통신비가 상대적으로 저렴하면 서도 기밀성이 보장되는 인터넷을 기반으로 하는 Internet Protocol Virtual Private Network(IP VPN) 도입을 서두르고 있다 VPN은 공중망 인프라를 공유하여 구축된 가상 사설망을 의미한다. IP VPN으로 기업은 본사와 지사를 연결하는 Intranet, 협력사와 연결되는 Extranet 그리고 최근 들어 급증하고 있는 이동 근무자와 재택 근무자를 회사에 안전하게 연결시킬 수 있는 원격 접속 등을 경제적으로 구축할 수 있다. 또한 광케이블과 동축케이블이 혼합된 Hybrid Fiber & Coaxial(HFC)망이 초고속인터넷, 디지털방송, 주문형비디오(VOD) 등의 멀티미디어 서비스를 수용하기에 가장 좋은 방안으로 최근 각광을 받고 있다. HFC망은 기존의 CATV망을 기반으로 하므로 신규 투자비가 적게 들면서도 다양한 형태의 고속 데이터 통신이 가능하다. 이에 본 논문에서는 HFC망에서의 IP VPN의 성능을 전송 프로토콜과 암호화 알고리즘을 달리 하면서 어떤 요소가 성능에 얼마나 영향을 주는지와 요소간 상호작용이 어떻게 일어나는지, 또한 어떤 조합으로 VPN 통신을 할 때 가장 좋은 성능을 보이는지를 비교 분석한다.

  • PDF