Effective and Extensive Virtual Private Network
Tarek S. Sobh, Yasser Aly
DOI: 10.4236/jis.2011.21004   PDF    HTML     7,130 Downloads   15,337 Views   Citations


A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment.

Share and Cite:

Sobh, T. and Aly, Y. (2011) Effective and Extensive Virtual Private Network. Journal of Information Security, 2, 39-49. doi: 10.4236/jis.2011.21004.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] D. L. Clark, “IT Manger’s Guide to Virtual Private Networks,” McGraw-Hill, New York, 1999.
[2] S. Badr, “Security Architecture for Internet Protocols,” Ph.D. Thesis, Military Technical College, Cairo, 2001.
[3] A. Farouk, “Intrusion Detection in a War a Game Web Based Application,” Master of Science Thesis, Ain Shams University, Cairo, 2004.
[4] A. E. Taha, “Secured Access Control in Web Based War Game Application,” Master of Science Thesis, Ain -Shams University, Cairo, Egypt, October 2002.
[5] N. Malheiros, E. Madeira, F. L. Verdi and M. Magalhaesb, “Managing Layer 1 VPN Services,” Optical Switching and Networking, Vol. 5, No. 4, 2008, pp. 196-218. doi:10.1016/j.osn.2008.02.002
[6] P. Juste, D. Wolinsky, P. Boykin, M. Covington and R. Figueiredo, “SocialVPN: Enabling Wide-Area Collaboration with Integrated Social and Overlay Networks,” Computer Networks, Vol. 54, No. 12, August 2010, pp. 1926-1938. doi:10.1016/j.comnet.2009.11.019
[7] A. G. Yay1ml1, “Selective Survivability with Disjoint Nodes and Disjoint Lightpaths for Layer 1 VPN,” Optical Switching and Networking, Vol. 6, No. 1, 2009, pp. 3-9. doi:10.1016/j.osn.2008.05.002
[8] C. Xenakis, C. Ntantogian and I. Stavrakakis, “A Networkassisted Mobile VPN for Securing Users Data in UMTS,” Computer Communications, Vol. 31, No. 14, 2008, pp. 3315-3327. doi:10.1016/j.comcom.2008.05.018
[9] M. N. Ismail and M. T. Ismail, “Analyzing of Virtual Private Network over Open Source Application and Hardware Device Performance,” European Journal of Scientific Research, Vol. 28, No. 2, 2009, pp: 215-226.
[10] R. Bolla, R. Bruschi, F. Davoli and M. Repetto, “Hybrid Optimization for QoS Control in IP Virtual Private Networks,” Computer Networks, Vol. 52, No. 3, 2008, pp. 563-580. doi:10.1016/j.comnet.2007.10.006
[11] S. Gold, “Pirate Bay Develops Anonymous VPN User Protection,” Infosecurity, Vol. 6, No. 3, 2009, pp. 8. doi:10.1016/S1754-4548(09)70045-2
[12] D. Forte et al., “SSL VPN and Return on Investment: A Possible Combination,” Network Security, Vol. 10, No. 10, 2009, pp. 17-19. doi:10.1016/S1353-4858(09)70112-6
[13] T. Rowan, “VPN Technology: IPSEC vs SSL,” Network Security, Vol. 2007, No. 12, December 2007, pp. 13-17. doi: 10.1016/S1353-4858(07)70104-6
[14] J. F. Dunnigan, “Wargames Handbook: How to Play and Design Commercial and Professional Wargames,” Writer’s Club Press, 2000.
[15] Y. Dakroury, I. A. El-ghafar and A. Taha, “Secured Web-Based War Game Application Using Combined Smart Certificate and Secure Cookies Techniques,” Proceeding of the 1st IEEE International Symposium on Signal Processing and Information Technology, Cairo, December 2001, pp. 447-453.
[16] Downloading rpm’s for VPN, http://sourceforge.net/pro- jects
[17] G. F. Luger, “Artificial Intelligence Structures and Strategies for Complex Problem Solving,” 4th Edition, Addison Wesley, New York, 2001.
[18] K. Heller, K. Svore, A. Keromytis and S. Stolfo, “One Class Support Vector Machines for Detecting Anomalous Window Registry Accesses,” 3rd IEEE Conference and Data Mining Workshop on Data Mining for Computer Security, Florida, November 2003.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.