Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Comparing L2TP, IPsec, TLS, & OpenVPN for Secure VPNs, Study notes of Communication

An in-depth analysis of secure network protocols, including L2TP, IPsec, TLS, and OpenVPN, and their role in ensuring confidentiality, authentication, and integrity in virtual private networks. The document also discusses the advantages and disadvantages of each protocol and their history of security breaches.

Typology: Study notes

2021/2022

Uploaded on 09/27/2022

tarquin
tarquin 🇺🇸

4.3

(15)

260 documents

1 / 10

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Issues in Information Systems
Volume 20, Issue 3, pp. 37-46, 2019
37
SECURE PROTOCOLS AND VIRTUAL PRIVATE NETWORKS: AN EVALUATION
Raymond Angelo, Quinnipiac University, raymond.angelo @quinnipiac.edu
ABSTRACT
Network protocols are by their design insecure and open to threats from cybercriminals. Secure network protocols,
such as L2TP, IPsec, TLS, and OpenVPN need to be implemented to assure confidentiality, authentication, and
integrity. The advantages and disadvantages of these protocols are discussed. A preferred choice of these protocols
for implementation in a virtual private network is presented in the context of the Open Systems Interconnection or
Interface (OSI) Model. Secure protocols are discussed with reference to the implementation of e-commerce and the
Internet of Things (IoT).
Keywords: secure protocols, security, virtual private networks, encryption, tunneling.
INTRODUCTION
For effective communication there need to be well-defined structures that describe the rules of that interchange. For
computers and networks, protocols have been developed for successful and effective exchange of information (Frank,
2017). Protocols articulate the rules, syntax, and message formats that define communication exchanges (Singer &
Friedman, 2014). The inventors of data communications and the Internet developed open standards so that
communication would be predictable, reliable and easy. However, they could not foresee the malicious intent of
cybercriminals to penetrate and steal information from network data communications (Frank, 2017; Pandey & Misra,
2016; Zhipeng et al., 2018). This has led to the development of secure protocols that enhance the safety of data
exchange through networks, by using advanced techniques that will be described and evaluated in this paper (Garge
& Hegde, 2011).
In order to appreciate the protocols discussed here, it is helpful and necessary to view them in the context of two
landmark models. The International Standards Organization (ISO), the world’s largest developer of international
standards for a wide variety of products and services, developed the Open Systems Interconnection reference model.
The OSI model is a layered framework for developing networking protocols, and provides a foundation for protocols
to be used for the Internet and all computer hardware and software communications (Elezia & Raufia, 2015; Frank,
2017; Salman, 2017; Zhipeng et al., 2018). In addition, the TCP/IP protocol stack, which pre-dates the OSI Model,
was developed to provide definition to protocols that are popular in data communications. It is characterized as
protocol model because it established a hierarchical set of related protocols in a suite required to interface with humans
and data networks, as well as describing the functions that occur at each layer of protocols within the suite (Frank,
2017). In contrast, the OSI Reference model is less descriptive at the protocol layers, but provides a sufficient level of
detail to define precisely the services of the network architecture. Both the OSI and TCP/IP have defined the functions
at the layers in a stack. The stack interaction moves encapsulated or enveloped information in the way that paper mail
moves from one person to another. Encapsulation is a key concept for security, since it requires a protocol to envelope
data from higher-level protocols, and provides opportunity for encryption.
Privacy of communication implies that the data transmitted on a link is readable only by the intended recipients and
no one else. This is done by encrypting the transmitted message. Encryption requires keys that perform the encryption
and the two end-points require that they have the right keys to encrypt as well as decrypt. Exchange of keys between
the two end-points is a challenge. Many privacy schemes involve either single key (shared) or dual key cryptography.
Encryption uses a complex algorithm called a cipher in order to turn normalized data (plaintext) into a series of
seemingly random characters (cipher text) that is unreadable by those without a special key in which to decrypt it.
Hashing may also be used to mask variable length text into a fixed length (Frank, 2017).
https://doi.org/10.48009/3_iis_2019_37-46
pf3
pf4
pf5
pf8
pf9
pfa

Partial preview of the text

Download Comparing L2TP, IPsec, TLS, & OpenVPN for Secure VPNs and more Study notes Communication in PDF only on Docsity!

Issues in Information Systems

Volume 20, Issue 3, pp. 37-46, 2019

SECURE PROTOCOLS AND VIRTUAL PRIVATE NETWORKS: AN EVALUATION

Raymond Angelo, Quinnipiac University, raymond.angelo @quinnipiac.edu

ABSTRACT

Network protocols are by their design insecure and open to threats from cybercriminals. Secure network protocols, such as L2TP, IPsec, TLS, and OpenVPN need to be implemented to assure confidentiality, authentication, and integrity. The advantages and disadvantages of these protocols are discussed. A preferred choice of these protocols for implementation in a virtual private network is presented in the context of the Open Systems Interconnection or Interface (OSI) Model. Secure protocols are discussed with reference to the implementation of e-commerce and the Internet of Things (IoT).

Keywords: secure protocols, security, virtual private networks, encryption, tunneling.

INTRODUCTION

For effective communication there need to be well-defined structures that describe the rules of that interchange. For computers and networks, protocols have been developed for successful and effective exchange of information (Frank, 2017). Protocols articulate the rules, syntax, and message formats that define communication exchanges (Singer & Friedman, 2014). The inventors of data communications and the Internet developed open standards so that communication would be predictable, reliable and easy. However, they could not foresee the malicious intent of cybercriminals to penetrate and steal information from network data communications (Frank, 2017; Pandey & Misra, 2016; Zhipeng et al., 2018). This has led to the development of secure protocols that enhance the safety of data exchange through networks, by using advanced techniques that will be described and evaluated in this paper (Garge & Hegde, 2011).

In order to appreciate the protocols discussed here, it is helpful and necessary to view them in the context of two landmark models. The International Standards Organization (ISO), the world’s largest developer of international standards for a wide variety of products and services, developed the Open Systems Interconnection reference model. The OSI model is a layered framework for developing networking protocols, and provides a foundation for protocols to be used for the Internet and all computer hardware and software communications (Elezia & Raufia, 2015; Frank, 2017; Salman, 2017; Zhipeng et al., 2018). In addition, the TCP/IP protocol stack, which pre-dates the OSI Model, was developed to provide definition to protocols that are popular in data communications. It is characterized as protocol model because it established a hierarchical set of related protocols in a suite required to interface with humans and data networks, as well as describing the functions that occur at each layer of protocols within the suite (Frank, 2017). In contrast, the OSI Reference model is less descriptive at the protocol layers, but provides a sufficient level of detail to define precisely the services of the network architecture. Both the OSI and TCP/IP have defined the functions at the layers in a stack. The stack interaction moves encapsulated or enveloped information in the way that paper mail moves from one person to another. Encapsulation is a key concept for security, since it requires a protocol to envelope data from higher-level protocols, and provides opportunity for encryption.

Privacy of communication implies that the data transmitted on a link is readable only by the intended recipients and no one else. This is done by encrypting the transmitted message. Encryption requires keys that perform the encryption and the two end-points require that they have the right keys to encrypt as well as decrypt. Exchange of keys between the two end-points is a challenge. Many privacy schemes involve either single key (shared) or dual key cryptography. Encryption uses a complex algorithm called a cipher in order to turn normalized data (plaintext) into a series of seemingly random characters (cipher text) that is unreadable by those without a special key in which to decrypt it. Hashing may also be used to mask variable length text into a fixed length (Frank, 2017).

https://doi.org/10.48009/3_iis_2019_37-

Volume 20 , Issue 3 , pp. 37 - 46 , 2019

Security protocols address security goals, including authentication or confidentiality. They attempt to forego attacks. In particular, authentication, or logging in, enables verification of identity. Authentication is accomplished through verification of the transmitted password (Frank, 2017).

The OSI Model does a better job at detailing the functions at each layer. It is helpful to this discussion to understand the functional level of the OSI stack to appreciate the work and responsibilities toward security of the protocols at those levels. For Example, IP is a Network protocol, which means it produces a packet that contains address information between devices communicating on a network and can provide routing information between networks. In general the lower in the stack that a security protocol works, the better. This is because it is preferable for protocols to prevent access to computers on a network (Layer 3), for example, rather than at layers that deal with applications and data (Layers 4-7).

For the purposes of discussing and illustrating the roles of the secure protocols presented, we will categorize the protocols by using the OSI reference model. There are seven layers in the Reference Model: Application, Presentation, Session, Transport, Network, Data Link, and Physical. Column one represents the OSI Layer, and a brief description of the job that each layer accomplishes. Column two shows some well-known TCP/IP protocols. Column three shows the secure protocols that will be discussed in this paper.

Table 1. Map of Secure Protocols to the OSI Model OSI Model Layer TCP/IP Protocols Secure Protocols

  1. Application Services the end user

FTP, HTTP

  1. Presentation Data and Encryption
  2. Session Host to host communication

L2TP

  1. Transport End to End reliability

TCP, UDP TLS

  1. Network Logical Addressing

IP IPsec, OpenVPN

  1. Data Link Physical Addressing 1.Physical Media and Transmission

Ethernet, Token Passing

Our discussion around secure protocols will center on Layers, 3 and 4, and 5 of the OSI model, as they describe, network or device addressing and communication, application port access, and encryption.

Why we need Secure Protocols Jyothi and Reddy (2018) stated the fundamental problem with data communications by indicating that “data packets traveling the Internet are transported in clear text. Consequently, anyone who can see Internet traffic can also read the data contained in the packets (p. 920)”. Elezia and Raufia (2015) indicated that the most common protocol, the Internet Protocol (IP), is not secure, since it makes all hosts on the network discoverable. The protocol does not provide confidentiality and creates opportunity for outside attacks. By being able to access the IP address of a device, hackers can potentially take control of that device, and by reading information from the TCP segment from the Transport Layer, they can reach into the application data, and steal information, such as social security numbers, credit card information, and bank account information, to name a few.

Volume 20 , Issue 3 , pp. 37 - 46 , 2019

The key to a secure VPN is to provide an encrypted tunnel through a clear text network (Salman, 2017; Zhipeng et al., 2018). A VPN is a virtual encrypted tunnel between the user and a remote server operated by a VPN service. All external internet traffic is routed through this tunnel, making information safe from cybercriminals (Salman, 2017). Ali, Hossain, and Parvez (2015) pointed out that VPNs join networks of all sizes and eliminate the complexity of hardware and software required to segment networks.

Finally, Patel and Sistani (201 8 ) differentiated between two distinct types of VPNs: Site-to-Site VPNs and Remote Access VPNs. The basic difference between the two is that remote access VPNs provide access using a mix of virtual circuits from a provider, as well as through the convenience of internet access, whereas site-to-site VPNs, while still using virtual circuits, limit accessibility to geographically dispersed offices of an organization. In today’s computing environment, most organizations utilize home based or “teleworkers”, so it is important to understand that virtual private networks can provide secure networks if an individual connects to one from home. VPNs are affordable options for secure computing to small companies and individuals.

SECURE VPN PROTOCOLS

Layer 2 Tunneling Protocol (L2TP) and IPsec Puthal et al. ( 2017 ) pointed out that Transmission Control Protocol (TCP) and Internet Protocol (IP) are still the prevailing protocols for network communication involving private and public networks (i.e., the Internet). Since these protocols do not present security options, other protocols must be introduced to ensure confidentiality, authentication, and integrity.

Although separate protocols, L2TP and IPsec are usually discussed in a pair, since L2TP provides tunneling for VPNs, but no real security. IPsec provides network layer or IP address security, and can encrypt information about L2TP. As previously described, IP protocol, in its raw form, identifies the logical address associated with an interface (computer, router, storage device) connected to a network in clear text. IPsec provides data encryption at the network layer of the OSI Model.

L2TP Yadav ( 2016 ) indicated that L2TP was developed in cooperation between Cisco and Microsoft. Layer 2 Tunneling Protocol provides physical and logical tunneling. This action creates a virtual path through various intranet and internet connections to create the effect of physical tunnel between network nodes. L2TP is used by Internet service providers (ISPs) to enable virtual private networks. L2TP is similar to the Data Link Layer Protocol in the OSI reference model, in that it connects physical devices as if they are in the same local area network. However since it uses authentication (log in), it actually more resembles a session layer protocol. (Salman, 2017 ).

A major advantage of L2TP is that it uses UDP (broadcast) ports, which frees it from the overhead of Transmission Control Protocol (TCP), and therefore is fast and efficient. L2TP becomes encrypted as service of IPsec, which we will discuss below. It provides a secure tunnel, reliable, scalable, fast, and flexible, is an established industry standard, and has the best authorization policy for users with VPN authentication. (“Layer 2 Tunneling”, 2019). L2TP does not supply encryption or protection from the traffic that passes through the connection. (Salman, 2017; Zhiyong et al., 2013 ); this is supplied by IPsec.

Singh and Gupta (2016) pointed out that this tunneling protocol provides a first step in secure mode of transport. A VPN encapsulates the IP datagram into a tunneling protocol, thus hiding the original data from intruder or hackers. This establishes a point-to-point or multipoint link between the communicating parties in a public or shared communication network. Traditional VPNs uses DES (Data Encryption Standard), AES (Advance Encryption Standard), which uses 128 or 256 encryption bit algorithms, and are very secure. With IPsec encapsulation, the resultant message is further enclosed with an IPsec header. IPsec is designed to specify security in between communication channel of two communication devices, such as computers, gateways, routers and firewalls.

Jahan, Rahman, and Saha (2017) indicated that 63% of the companies uses site-to-site VPN to connect their branch offices, and 90% of the workers from home uses remote access VPN to communicate. For remote access, L2TP is

Volume 20 , Issue 3 , pp. 37 - 46 , 2019

more preferable than other point-to-point protocol, especially applicable for the bandwidth, time, and security sensitive applications.

Advantages and Disadvantages of L2TP Singh and Gupta (2016) discussed the advantages of L2TP to include the following: support for both IP and Non-IP networks and protocols; support of multiple tunnels; and compatibility with network address translation (NAT). NAT involves remapping IP protocols from public to private addresses to build firewall protection and save on IP address depletion. L2TP eliminates the network traffic by flow control mechanism to address congestion and keeps overhead to minimum. Disadvantages of L2TP include the fact that VPNs tunneling adds an overhead to IP packets size, that effects bandwidth utilization in network specifically if the data packet size is short (Salman, 2017).

IPsec Often paired with L2TP, the Network Layer protocol IPsec offers data integrity, data confidentiality, and authentication of data. IPsec provides an end-to-end approach designed by IETF (Internet Engineering Task Force). It provides a bundle of protocols such as IPsec Key Exchange and Management Protocol (ISAKMP) for key management, which specifies the negotiation and establishment of security. Internet Key Exchange (IKE) is used for key exchange, which creates a secure channel to protect the negotiation in the set up the IPsec tunnel for traffic protection. Authentication Header (AH) offers authentication originality and integrity Encapsulated Security Payload (ESP) offers authentication originality, connectionless integrity, anti-replay service, and data confidentiality, to assure cryptography based security to the information that is transmitted over the network (Salman, 2017; Zhipeng et al., 2018 ).

Advantages and Disadvantages of IPsec Patil and Korde ( 2018 ) indicated that IPsec has been criticized for its complexity with encryption key usage, and hash algorithms. Elezia and Raufia (2015) defended this complexity as a strength of the keys used, ensuring that there are no ways to bypass the security of the overall system. IPsec provides confidentiality by encrypting the data payload, integrity by calculating at each communicating endpoint the checksum or hash value of the data exchanged, and it provides authentication through signatures and certificates. IPsec protects against vulnerability to attacks like spoofing and session hijacking, IPsec can offer confidentiality, integrity, authentication services, as well as (optionally) by utilizing the Encapsulating Security Payload (ESP) and Authentication Header (AH) protocols (Geneiatakis et al., 2006; Sridevi, 2018 ). Gupta and Jha ( 2015 ) reported that IPsec may be vulnerable to login cracking. This attack involves recovering of Internet Protocol Security (IPsec) Pre-shared secret key (PSK) by using brute force attacks on VPN authentication protocols. The authors add that these attacks are easily discoverable and manageable.

Transport Layer Security Protocol (TLS) TLS, and its predecessor secure socket layer (SSL), are the most common encryption protocols in use today. All HTTPS websites are protected with SSL/TLS (Patel & Sistani, 201 8 ). Zhipeng et al. ( 2018 ) described TLS as VPN technology that works between the Layer 4 (Transport layer) and Layer 7 (Application layer) of OSI layers. To establish secure connection for communication between application tiers, TLS uses the certificate-based authentication, data encryption, and message integrity verification mechanisms. The use of SSL VPN is mostly in Web-based remote security access.

Patel and Sistani (201 8 ) discussed how for authentication purposes, TLS uses an eight step Handshake protocol to establish the identity of a peer, using a combination of public and private keys to initiate encryption. Khan and Deshmukh ( 2014 ) stated that encryption with TLS helps prevent such exploits as man-in-the-middle (MITM), spoofed attacks, and session hijacking, using keys and hashing techniques. Ja ( 2019 ) described how TLS uses a Public key infrastructure (PKI) provides a solution for registering and managing a trustworthy public key. Government agencies or standard organizations manage registrar’s keys. The authors point out that the most utilized application-layer protocol, the Hyper Text Transfer Protocol (HTTP), was designed without any security considerations. The popularity of HTTP and its wide adoption for ecommerce necessitated strict security requirements. A secure version called HTTPS was introduced by using security services from the transport layer, which allows the URL, content, forms and cookies to be encrypted during communication. Application using Secure HTTP (HTTPS) use TLS as a security protocol.

Volume 20 , Issue 3 , pp. 37 - 46 , 2019

As far as weakness, OpenVPN is not IPsec compatible, and IPsec is the standard VPN solution. Many popular network devices, such as Cisco or Bintec routers, use IPsec and can connect to applications of other manufacturers or software IPsec clients. Although OpenVPN can be simple to implement, industry knowledge of this protocol, which was introduced in 2001, is somewhat limited. With respect to disadvantages, it should be noted that OpenVPN is not a multi-thread application, which limits its rate of operating network connections (approximately up to 100 connections). In case more connections are needed, additional processes, different ports or IP addresses need to be deployed (Skendzic & Kovacic, 2017).

RESULTS

The evolution of virtual private networks secure protocols continues to develop, and offer choices for low cost connections, telecommuting, and ubiquitous security. Whether organizations deploy their own virtual private network, or use vendors, there are several options. Along with modifications and upgrades to secure protocols such as L2TP, IPsec, TLS, and OpenVPN, we have discussed advantages and limitations, as well history of security breaches, in an effort to evaluate the protocols.

Research question #1: is there a preferred choice of protocols for implementation in a virtual private network as evaluated in the context of the Open Systems Interface?

To begin with, this is not an assessment of the functionally of the protocol, installation, maintenance, and performance, rather it is an analysis of strength of network defense. It begins with analysis with respect to the OSI Model. All of the protocols reviewed provide security solutions, and are production in production network environments.

The protocols IPsec and OpenVPN both operate at Layer 3 of the model, the lowest level of the sample of protocols that have been examined here. TLS operates at Layer 4 of the OSI Model. See Table 1: Map of Secure Protocols to the OSI Model (above).

However, IPsec cannot provide physical and logical tunneling, a requirement for virtual private networks. It relies on L2TP protocol to perform this. L2TP requires authentication/login, so is operating a Layer 5 of the OSI Model, and does not provide machine level security. This makes OpenVPN a clear choice on this dimension.

In addition, a single protocol, OpenVPN, that can provide the same layer of protection as an alternative with two protocols, will require less overhead than a two-protocol solution. Furthermore, OpenVPN allows configuration of the TCP port that it uses to tunnel to applications, whereas IPsec does not (Hoffman, 2018). For these reasons, OpenVPN would be the clear protocol of choice. Since OpenVPN and L2TP/IPsec are not compatible, vigilance is needed to assess the implementation of these protocols in a new or existing virtual private network.

SUMMARY AND FUTURE CONSIDERATIONS

Many commercial analysts espouse the virtues of OpenVPN (Bishchoff, 2019; Hoffman, 2018). However, the landscape continues to change, as scientists today are embracing new protocol development. For example, WireGuard was recently proposed as a replacement for existing secure communications protocols like IPsec and OpenVPN. It has numerous benefits, including its simplicity and ease of configuration, high performance software, and small codebase, making it relatively easy to audit compared to large, complex code bases typically encountered with other protocols (Donenfeld, 2017; Dowling & Paterson 2018; Lipp et al., 2019).

Stallings ( 2011 ) commented that virtually all businesses, most government agencies, and many individuals now have websites, and the proliferation of the Internet for electronic commerce continues to be rapid. However, as we have seen, the vulnerability of insecure web sites can pose significant problems, even in the largest companies.As we commonly use credit cards for e-commerce activity, the threat of stolen information is tangible for everyone.

Airehrour, Gutierrez, and Ray (2016) pointed to the propagation of the Internet of Things, which promises to connect billions of connected devices, including cars, mobile phones, and household devices and entry systems. The Internet

Volume 20 , Issue 3 , pp. 37 - 46 , 2019

of Things also holds the promise for more successful management of hospitals, smart grids, and smart buildings (Kumar, Vealey, & Srivastava, 2016 ; Soceanu, Vasylenko, & Gradinaru, 2017). Security is fundamental to the success deployment of the IoT. Network professional and students of networks need to be proficient in the evaluation and deployment of secure network protocols to make a secure IoT. For example, evaluators and implementers of secure protocols must understand the consequences of decommissioning of TLS and IPsec, when considering the implementation of OpenVPN. Vendors are available to help, but small to medium size companies need to understand the working of the protocols to make or implement informed choices in their security strategies.

REFERENCES

Airehrour, D., Gutierrez, J., & Ray, S. (2016). Secure routing for internet of things: a survey. Journal of Network and Computer Applications, 66, 198 – 213.

Ali, M., Hossain, M. & Parvez, M. (2015). Design and Implementation of a Secure Campus Network. International Journal of Emerging Technology and Advanced Engineering, 5 (7), 370-374.

American Express, IBM Sign $4B Deal. (2002, February 25). Retrieved from https://www.informationweek.com/american-express-ibm-sign-$4b-deal/d/d-id/

American Express, IBM Set Technology Outsourcing Deal. (2002, February 25). Retrieved from https://www.wsj.com/articles/SB

Bishchoff, P. (2019, February 2). VPN protocols explained and compared. Retrieved from https://www.comparitech.com/vpn/protocols/

Blackshaw, B. (2015). Secure Network Protocols. How SSL/TLS, SSH, SFTP and FTPS work. Yeronga, Australia: Enterprise Distributed Technology Pty Ltd.

Cirincione G., Pham, T., Ladas, A., Stanton, B., & Fisher, G. (2019, May 10). Design and implementation of the U.S. Army Artificial Intelligence Innovation Institute, Proc. SPIE 11006, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications. Retrieved from https://doi.org/10.1117/12.

Donenfeld. J. (2017). WireGuard: Next Generation Kernel Network Tunnel. Proceedings of the 2017 Network and Distributed System Security Symposium. San Diego, CA, Feb. 26 - March 6, 2017, 1 - 17.

Dowling, B., & Paterson, K. (2018). A cryptographic analysis of the WireGuard protocol. Retrieved from https://eprint.iacr.org/2018/080.

Elezia, M. & Raufia, B. (2015). Conception of Virtual Private Networks using IPsec suite of protocols, comparative analysis of distributed database queries using different IPsec modes of encryption. Procedia - Social and Behavioral Sciences, 195, 1938 – 1948.

Feilner, M. (2006). OpenVPN: Building and Integrating Virtual Private Networks. Birmingham UK: PACKT Publishing.

Frank, M. (2017). Introduction to networks v6: Companion guide. Indianapolis, IN: Cisco Press.

Garge, K. & Hegde, M. (2011). Network security. New Delhi: Barry Art Press.

Geneiatakis, D., Dagiuklas, T., Kambourakis, G., Lambrinoudakis, G., Gritzalis, S., Karlovassi, S., & Sisalem, D. (2006). Survey of security vulnerabilities in session initiation protocol. IEEE Communications Surveys , 8(3), 69-81.

Gupta, A. & Jha, R. (2015). Security Threats of Wireless Networks: A Survey. Paper presented at International Conference on Computing, Communication and Automation. Greater Noida, India, May 15 - 16, 2015.

Volume 20 , Issue 3 , pp. 37 - 46 , 2019

Singh, K. & Gupta, H. (2016). A New Approach for the security of VPN. Proceedings of the Second International conference on Information and Communication Technology for Competitive Strategies, Udaipur, India, March 4 - 5, 2016.

Skendzic, A. & Kovacic, B. (2017). Open source system OpenVPN in a function of Virtual Private Network. Asia- Pacific Journal of Information Technology and Multimedia, 5( 1), 15 – 30.

Soceanu, A., Vasylenko, M. & Gradinaru, A. (2017). Improving Cybersecurity Skills Using Network Security Virtual Labs. Proceedings of the International MultiConference of Engineers and Computer Scientists. Hong Kong. March 15 - 17, 2017.

Sridevi, C. (201 8 ). A Survey of Network Security. Global Journal of Computer Science and Technology, 17 (5), 29-

Stallings, W. (2011). Network security essentials: applications and standards 4th ed. Upper Saddle River, NJ: Prentice Hall.

Vachon, R., & Graziani, R. (2008). Accessing the WAN, CCNA Exploration Companion Guide. Indianapolis, IN: Cisco Press.

Yadav, A. (2016). Security Structure of VPN. A Survey. International Journal of Recent Innovation in Engineering and Research (1) 1 , 19 - 24.

Zameer, A, Pandow, B.A. & Singh B. (2017). Economic hurdle for implementation of cloud computing in higher education in Sultanate of Oman. Paper presented at Infocom Technologies and Unmanned Systems (Trends and Future Directions). Dubai, United Arab Emirates, December 18-20, 2017.

Zhipeng, Z, Chandel, S., Jingyao, J., Shilin, Y., Yunnan, Y., & Zang, J. (2018). A Comparative Study of MPLS, IPsec, and SSL Virtual Private Networks. Proceedings of the Second International Conference on Computing Methodologies and Communication. Rayapalayam, India, February 16-18, 2018.

Zhiyong, L., Guixin, Y., & Hongzhuo, Q. (2013). Research of A VPN Secure Networking model. Proceedings of 2013 2nd International Conference on Measurement, Information and Control. Harbin, China, 567-569.