Welcome to Francis Academic Press

Academic Journal of Computing & Information Science, 2023, 6(11); doi: 10.25236/AJCIS.2023.061108.

Application and Security Analysis of Virtual Private Network (VPN) in Network Communication

Author(s)

Zuhe Liu

Corresponding Author:
Zuhe Liu
Affiliation(s)

Hokuriku University, Kanazawa City, Ishikawa Prefecture, 920-0942, Japan

Abstract

Virtual Private Network (VPN) is a network technology that has been widely used in Internet communications. This paper conducts an in-depth study of the definition of VPN, the importance of Internet communication, and its practice in application fields such as privacy protection, remote office, geographical location restrictions, and public Wi-Fi security. We also provide an in-depth analysis of VPN security, including a comparison of different encryption protocols, data logging and privacy, potential vulnerabilities and attacks, and the importance of vendor selection. Through real case studies, we explore the security practices of reputable VPN providers and past VPN data breaches to provide users with insights on how to choose a trustworthy VPN provider and manage potential risks. Finally, we summarize the main findings and observations of this paper and propose future research directions, including future trends in VPN technology and further research recommendations. This dissertation all about giving users a clearer picture of how VPN tech works, and ways to boost your internet privacy and security.

Keywords

Virtual Private Network (VPN) applications; security; privacy; encryption; communication

Cite This Paper

Zuhe Liu. Application and Security Analysis of Virtual Private Network (VPN) in Network Communication. Academic Journal of Computing & Information Science (2023), Vol. 6, Issue 11: 52-59. https://doi.org/10.25236/AJCIS.2023.061108.

References

[1] Wood, D., Stoss, V., Chan-Lizardo, L., Papacostas, G. S., & Stinson, M. E. (1988, June). Virtual private networks. In 1988 International Conference on Private Switching Systems and Networks (pp. 132-136). IET.

[2] De Laet, G., & Schauwers, G. (2005). Network security fundamentals. Cisco press.

[3] Daya, B. (2013). Network security: History, importance, and future. University of Florida Department of Electrical and Computer Engineering, 4.

[4] Song, Y., & Hengartner, U. (2015, October). Privacyguard: A vpn-based platform to detect information leakage on android devices. In Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (pp. 15-26).

[5] Paulus, S., Pohlmann, N., Reimer, H., Alkassar, A., Scheibel, M., Stübel, M., ... & Winandy, M. (2006). Security architecture for device encryption and VPN. In ISSE 2006—Securing Electronic Busines Processes: Highlights of the Information Security Solutions Europe 2006 Conference (pp. 54-63). Vieweg.

[6] Thomas, R. K. (2016). Vpn Solutions: Balancing Productivity and Security For Business. Global journal of Business and Integral Security.

[7] Muir, J. A., & Oorschot, P. C. V. (2009). Internet geolocation: Evasion and counterevasion. Acm computing surveys (csur), 42(1), 1-23.

[8] Iqbal, M., & Riadi, I. (2019). Analysis of security virtual private network (VPN) using openVPN. International Journal of Cyber-Security and Digital Forensics, 8(1), 58-65.

[9] Arora, P., Vemuganti, P. R., & Allani, P. (2011). Comparison of VPN protocols–IPSec, PPTP, and L2TP. Department of Electrical and Computer Engineering George Mason University, Project Report ECE, 646.

[10] Lawas, J. B. R., Vivero, A. C., & Sharma, A. (2016, July). Network performance evaluation of VPN protocols (SSTP and IKEv2). In 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN) (pp. 1-5). IEEE.

[11] Mohaisen, A., & Ren, K. (2017). Leakage of. onion at the DNS Root: Measurements, Causes, and Countermeasures. IEEE/ACM Transactions on Networking, 25(5), 3059-3072.

[12] Hazhirpasand, M., & Ghafari, M. (2018). One Leak Is Enough to Expose Them All: From a WebRTC IP Leak to Web-Based Network Scanning. In Engineering Secure Software and Systems: 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings 10 (pp. 61-76). Springer International Publishing.

[13] Tahir, R. (2018). A study on malware and malware detection techniques. International Journal of Education and Management Engineering, 8(2), 20.

[14] Singh, A. K., Samaddar, S. G., & Misra, A. K. (2012, March). Enhancing VPN security through security policy management. In 2012 1st International Conference on Recent Advances in Information Technology (RAIT) (pp. 137-142). IEEE.

[15] Shan, R., Li, S., Wang, M., & Li, J. (2003, April). Network security policy for large-scale VPN. In International Conference on Communication Technology Proceedings, 2003. ICCT 2003. (Vol. 1, pp. 217-220). IEEE.

[16] Pasley, K. (2014). VPN Deployment and Evaluation Strategy. Information Security Management Handbook, Volume III, 3, 149.

[17] Gao, P., Li, G., Shi, Y., & Wang, Y. (2020, December). VPN traffic classification based on payload length sequence. In 2020 International Conference on Networking and Network Applications (NaNA) (pp. 241-247). IEEE.

[18] Khan, M. T., DeBlasio, J., Voelker, G. M., Snoeren, A. C., Kanich, C., & Vallina-Rodriguez, N. (2018, October). An empirical analysis of the commercial vpn ecosystem. In Proceedings of the Internet Measurement Conference 2018 (pp. 443-456).

[19] Khan, E., Sperotto, A., van der Ham, J., & van Rijswijk-Deij, R. (2023, March). Stranger VPNs: Investigating the Geo-Unblocking Capabilities of Commercial VPN Providers. In International Conference on Passive and Active Network Measurement (pp. 46-68). Cham: Springer Nature Switzerland.

[20] Rutland, D. (2022, December). The 5 Biggest Data Breaches of 2022. MakeUseOf. https://phys.org/news/2023-07-korean-team-room-temperature-ambient-pressure-superconductor.html