Abstract
The recent supply of smartphone and the late change in the internet environment had lead users to demand safe services. Especially, the VPN technology is being researched as a key technology for providing safe services within the cloud environment or the data-center environment. However, the openness of IP is a critical threat to the VPN technology, which provides service via sharing IP address of its gateway. The exposed IP address is venerable to many kinds of attacks, and thus VPN gateway and its service are also venerable to these threats. This paper proposes a VHSP mechanism, which prevents exposure of IP address by assigning temporal IP address for the VPN gateway and its services. VHSP assign temporal IP address per-user bases. Moreover, this paper had verified performance of VHSP and original VPN in various conditions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jung, Y., “Tunnel gateway satisfying mobility and security requirements of mobile and IP-based networks”, Communications and Networks, 2011
Palomares, D., Palomares, D., Migault, D., Migault, D., Velasquez, W., Velasquez, W., et al., “High Availability for IPsec VPN Platforms: ClusterIP Evaluation”, Availability, Reliability and Security (ARES), 2013
Dewan, P., Naidu, D. K. S., & Durham, D. M., “Denial of service attacks Using Internet Key Exchange protocol” Consumer Communications and Networking Conference, 2008
Kuboniwa, A., Tamura, T., Huruta, Y., Wada, Y., Satou, H., & Motono, T., “IPsec-GW redundancy method with high reliability”, Information and Telecommunication Technologies (APSITT), 2010
Y. Xie and S. Z. Yu, “A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors,” IEEE/ACM Transactions on Networking 2009
Kotuliak, I., Rybar, P., & Truchly, P., “Performance comparison of IPsec and TLS based VPN technologies”, Emerging eLearning Technologies and Applications (ICETA), 2011
Mao, H., Zhu, L., & Qin, H., “A Comparative Research on SSL VPN and IPSec VPN”, Wireless Communications, Networking and Mobile Computing (WiCOM), 2012
Kent, S., & Seo, K., “Security Architecture for the Internet protocol (RFC 4301)”, 2005
Kaufman, C., Hoffman, P., Nir, Y., & Eronen, P., “rFc 5996-Internet Key Exchange protocol Version 2 (IKEv2)”, 2010
Ding, Y., & Li, Y., “Integration of Signature Encryption and Key Exchange”, 2008
Biswas, G. P., “Diffie-hellman technique: extended to multiple two-party keys and one multi-party key”, 2008
Kuboniwa, A., Tamura, T., Huruta, Y., Wada, Y., Satou, H., & Motono, T., “IPsec-GW redundancy method with high reliability”, Information and Telecommunication Technologies (APSITT), 2010
Jiang, Z., & Xie, Y., “Study and implement of VPN penetrating NAT based on IPSec protocol”, Transportation, Mechanical, and Electrical Engineering (TMEE), 2011
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, P., Ryu, H., Hong, G., Yoo, S., Park, J., Ryou, J. (2015). A Service Protection mechanism Using VPN GW Hiding Techniques. In: Kim, K. (eds) Information Science and Applications. Lecture Notes in Electrical Engineering, vol 339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46578-3_125
Download citation
DOI: https://doi.org/10.1007/978-3-662-46578-3_125
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-46577-6
Online ISBN: 978-3-662-46578-3
eBook Packages: EngineeringEngineering (R0)