Skip to main content

A Service Protection mechanism Using VPN GW Hiding Techniques

  • Conference paper
  • First Online:
Information Science and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 339))

  • 2666 Accesses

Abstract

The recent supply of smartphone and the late change in the internet environment had lead users to demand safe services. Especially, the VPN technology is being researched as a key technology for providing safe services within the cloud environment or the data-center environment. However, the openness of IP is a critical threat to the VPN technology, which provides service via sharing IP address of its gateway. The exposed IP address is venerable to many kinds of attacks, and thus VPN gateway and its service are also venerable to these threats. This paper proposes a VHSP mechanism, which prevents exposure of IP address by assigning temporal IP address for the VPN gateway and its services. VHSP assign temporal IP address per-user bases. Moreover, this paper had verified performance of VHSP and original VPN in various conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jung, Y., “Tunnel gateway satisfying mobility and security requirements of mobile and IP-based networks”, Communications and Networks, 2011

    Google Scholar 

  2. Palomares, D., Palomares, D., Migault, D., Migault, D., Velasquez, W., Velasquez, W., et al., “High Availability for IPsec VPN Platforms: ClusterIP Evaluation”, Availability, Reliability and Security (ARES), 2013

    Google Scholar 

  3. Dewan, P., Naidu, D. K. S., & Durham, D. M., “Denial of service attacks Using Internet Key Exchange protocol” Consumer Communications and Networking Conference, 2008

    Google Scholar 

  4. Kuboniwa, A., Tamura, T., Huruta, Y., Wada, Y., Satou, H., & Motono, T., “IPsec-GW redundancy method with high reliability”, Information and Telecommunication Technologies (APSITT), 2010

    Google Scholar 

  5. Y. Xie and S. Z. Yu, “A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors,” IEEE/ACM Transactions on Networking 2009

    Google Scholar 

  6. Kotuliak, I., Rybar, P., & Truchly, P., “Performance comparison of IPsec and TLS based VPN technologies”, Emerging eLearning Technologies and Applications (ICETA), 2011

    Google Scholar 

  7. Mao, H., Zhu, L., & Qin, H., “A Comparative Research on SSL VPN and IPSec VPN”, Wireless Communications, Networking and Mobile Computing (WiCOM), 2012

    Google Scholar 

  8. Kent, S., & Seo, K., “Security Architecture for the Internet protocol (RFC 4301)”, 2005

    Google Scholar 

  9. Kaufman, C., Hoffman, P., Nir, Y., & Eronen, P., “rFc 5996-Internet Key Exchange protocol Version 2 (IKEv2)”, 2010

    Google Scholar 

  10. Ding, Y., & Li, Y., “Integration of Signature Encryption and Key Exchange”, 2008

    Google Scholar 

  11. Biswas, G. P., “Diffie-hellman technique: extended to multiple two-party keys and one multi-party key”, 2008

    Google Scholar 

  12. Kuboniwa, A., Tamura, T., Huruta, Y., Wada, Y., Satou, H., & Motono, T., “IPsec-GW redundancy method with high reliability”, Information and Telecommunication Technologies (APSITT), 2010

    Google Scholar 

  13. Jiang, Z., & Xie, Y., “Study and implement of VPN penetrating NAT based on IPSec protocol”, Transportation, Mechanical, and Electrical Engineering (TMEE), 2011

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to PyungKoo Park .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, P., Ryu, H., Hong, G., Yoo, S., Park, J., Ryou, J. (2015). A Service Protection mechanism Using VPN GW Hiding Techniques. In: Kim, K. (eds) Information Science and Applications. Lecture Notes in Electrical Engineering, vol 339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46578-3_125

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46578-3_125

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46577-6

  • Online ISBN: 978-3-662-46578-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics