Figure 1 - uploaded by Siddeeq Yousif Ameen
Content may be subject to copyright.
VPN usage within IPSec. 

VPN usage within IPSec. 

Source publication
Article
Full-text available
The paper presents the way to provide the security to one of the recent development in computing, cloud computing. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator h...

Contexts in source publication

Context 1
... IPSec and VPN have revised and well established in this way to provide the robust security standard with acceptable data confidentiality, authentication, and access control regardless of the transmission medium. "By integrating wireless LANs into an IPSec infrastructure, allows WLAN infrastructure to focus on simply transmitting wireless traffic, while the VPN would secure it," as shown in Figure 1 [8]. As shown in Fig. 1, firewall is used in conjunction with VPN. ...
Context 2
... the robust security standard with acceptable data confidentiality, authentication, and access control regardless of the transmission medium. "By integrating wireless LANs into an IPSec infrastructure, allows WLAN infrastructure to focus on simply transmitting wireless traffic, while the VPN would secure it," as shown in Figure 1 [8]. As shown in Fig. 1, firewall is used in conjunction with VPN. The firewall is a packet filtering that stands between the internal network and the world outside. The reason for the usage of firewalls with the VPN is because firewall have been employed on large public networks for many years and are a great starting place in the development of a security ...
Context 3
... traffic received and sent will reach 20.337 bytes/sec and 126.72 bytes/sec. Extra investigation have being subjected to the three scenarios but now with traffic received and sent for Email application as shown in Figures 11 and 12 ...
Context 4
... IPSec and VPN have revised and well established in this way to provide the robust security standard with acceptable data confidentiality, authentication, and access control regardless of the transmission medium. "By integrating wireless LANs into an IPSec infrastructure, allows WLAN infrastructure to focus on simply transmitting wireless traffic, while the VPN would secure it," as shown in Figure 1 [8]. As shown in Fig. 1, firewall is used in conjunction with VPN. ...
Context 5
... the robust security standard with acceptable data confidentiality, authentication, and access control regardless of the transmission medium. "By integrating wireless LANs into an IPSec infrastructure, allows WLAN infrastructure to focus on simply transmitting wireless traffic, while the VPN would secure it," as shown in Figure 1 [8]. As shown in Fig. 1, firewall is used in conjunction with VPN. The firewall is a packet filtering that stands between the internal network and the world outside. The reason for the usage of firewalls with the VPN is because firewall have been employed on large public networks for many years and are a great starting place in the development of a security ...
Context 6
... traffic received and sent will reach 20.337 bytes/sec and 126.72 bytes/sec. Extra investigation have being subjected to the three scenarios but now with traffic received and sent for Email application as shown in Figures 11 and 12 ...

Citations

... Their work introduces a user-friendly system that fosters fundamental security skills by providing remote security exercises, contributing to the development of a more secure online environment. (Ameen, 2014) delve into firewall and VPN investigations on cloud computing performance, examining the impact of VPN and firewall on throughput and delay. Their research underscores the potential trade-offs between security and performance in cloud computing environments. ...
Article
Full-text available
This article showcases a prototype VPN-based cloud strategy that uses SoftEther VPN and Microsoft Azure to manage and exchange library management systems and repositories. The prototype was tested for performance, security, and scalability, and the results suggest that the VPN-based cloud strategy is a viable solution for managing distributed library repositories. By using SoftEther VPN and Microsoft Azure, the prototype provided secure communication and scalability to handle large numbers of concurrent users. Future research can explore other VPN technologies and cloud platforms to enhance the prototype's capabilities and evaluate its performance in various scenarios.
... The performance was evaluated with different scenarios in public clouds: firewall will blocking wed access, without firewall and using with firewall. The impact of firewalls and VPNs using some of the metrics of cloud performances was assessed in [14]. The analysis of security attacks and requirements in hybrid cloud was done by Na et. ...
Article
Cloud Computing is an emerging technology that provides an enormous amount of computing resources which includes networks, servers and storages which are accessed through the internet. In addition it allows useful provisioning of the resources based on the user’s demands. A crucial aspect of cloud computing infrastructure is to provide secure and reliable services. The main challenge lies in the security issues is to reduce the impact of third party attacks in the cloud computing environment. Hence a novel Hybrid Security Framework(HSF) based on Reinforcement Learning (RL) Methodology with Vshield Firewall is proposed for securing the cloud environment. The RL method is used for deep packet inspection and VShiled based firewall is established to deny the attacks which are malicious when authenticating the signature of incoming packets. The bipartite pattern matching approach is integrated with the RL method to verify the signatures for obtaining the decisions quickly. The simulation results shows that the hybrid security framework is effective when compared with the existing methods by considering response time, resource utilization and denial of malicious attacks. This indicates that our proposed framework achieves not only better security but also attains better efficiency in cloud computing environment.
... do łączenia sieci komputerowych dwóch oddziałów firmy oddalonych o 1000 km. Jednak niektóre badania obejmują szerszy zakres kryteriów niż tylko maksymalna osiągana prędkość transmisji danych [2,3,4]. W artykule [5], mierzono wydajność protokołów VPN w dwóch wersji protokołów IP, w którym przedstawiono metody pomiaru przepustowości łącza z wykorzystaniem protokołu OpenVPN oraz WireGu-Journal of Computer Sciences Institute 27 (2023) 138-144 ard. ...
... Ostatnim przedstawionym eksperymentem [3] była analiza wydajności sieci VPN w chmurze obliczeniowej. Jest to ważne, ponieważ coraz więcej usług dużych firm korzysta z chmury publicznej. ...
... Również sprawdzono jakie opóźnienia generuje korzystanie z połączenia tunelowego. Przy okazji sprawdzono, ile procent wysłanych pakietów zostało utraconych podczas transmisji [3,14]. Okazało się, że korzystanie z połączenia VPN miało duży wpływ na jakość wysyłanych paczek danych, co miało bezpośrednie przełożenie na prędkość i opóźnienia pakietów [9,7]. ...
Article
Full-text available
The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec. The Docker applications were used for the tests, on which the VPN server configuration file was launched. The containers were running on the Amazon server. The tests were performed on a laptop and a virtual machine with Windows 10 Pro. The virtual machine has been run in the Microsoft Azure cloud. The next step was to launch three docker containers and start performance tests using three tools: ping command, Speedtest-cli and Iperf3. The result of the research is the analysis of the measurement results and drawing conclusions.
... Traditional vehicles networks rely on end-to-end communication that results in inefficiencies in vehicle data transmission [30,31]. In this letter, we present Named Data (NDN) to the vehicle network in order to utilize the benefits of NDN in order to increase the efficiency of vehicle data delivery [32,33]. ...
Article
Full-text available
Vehicular communications, referring to information exchange among vehicles, and infrastructures. It has attracted a lot of attention recently due to its great potential to support intelligent transportation, various safety applications, and on-road infotainment. The aim of technologies such as Vehicle-to-Vehicl (V2V) and Vehicle to-Every-thibg (V2X) Vehicle-to very-thing is to include models of connectivity that can be used in various application contexts by vehicles. However, the routing reliability of these ever-changing networks needs to be paid special attention. The link reliability is defined as the probability that a direct communication link between two vehicles will stay continuously available over a specified period. Furthermore, the link reliability value is accurately calculated using the location, direction and velocity information of vehicles along the road.
... Furthermore, no load-balancing methods are available in any of these situations [64]. ...
Article
Full-text available
Today, web services rapidly increased and are accessed by many users, leading to massive traffic on the Internet. Hence, the web server suffers from this problem, and it becomes challenging to manage the total traffic with growing users. It will be overloaded and show response time and bottleneck, so this massive traffic must be shared among several servers. Therefore, the load balancing technologies and server clusters are potent methods for dealing with server bottlenecks. Load balancing techniques distribute the load among servers in the cluster so that it balances all web servers. The motivation of this paper is to give an overview of the several load balancing techniques used to enhance the efficiency of web servers in terms of response time, throughput, and resource utilization. Different algorithms are addressed by researchers and get good results like the pending job, and IP hash algorithms achieve better performance.
... In general, there are two types of attacks. Firstly, an active attack tries to damage the system's resources [65,66]. This type of attack is modifying the data stream and creating false statements such as Daniel of service. ...
Article
Full-text available
Recently, computer networks faced a big challenge, which is that various malicious attacks are growing daily. Intrusion detection is one of the leading research problems in network and computer security. This paper investigates and presents Deep Learning (DL) techniques for improving the Intrusion Detection System (IDS). Moreover, it provides a detailed comparison with evaluating performance, deep learning algorithms for detecting attacks, feature learning, and datasets used to identify the advantages of employing in enhancing network intrusion detection.
... The development of an efficient IoT network is vital same time, DoS and jamming attacks undermine this service by generating unreasonable demands and keeping the network busy. to keep IoT system se accessible to user clients without interruption, a robust security protocol is needed [59,61].  Privacy: ...
Article
Full-text available
The Internet of Things (IoT) is one of today's most rapidly growing technologies. It is a technology that allows billions of smart devices or objects known as "Things" to collect different types of data about themselves and their surroundings using various sensors. They may then share it with the authorized parties for various purposes, including controlling and monitoring industrial services or increasing business services or functions. However, the Internet of Things currently faces more security threats than ever before. Machine Learning (ML) has observed a critical technological breakthrough, which has opened several new research avenues to solve current and future IoT challenges. However, Machine Learning is a powerful technology to identify threats and suspected activities in intelligent devices and networks. In this paper, various ML algorithms have been compared in terms of attack detection and anomaly detection, following a thorough literature review on Machine Learning methods and the significance of IoT security in the context of various types of potential attacks. Furthermore, possible ML-based IoT protection technologies have been introduced.
... Cloud has several complex design concerns that need extensive expertise and have an effect on the reliability and functionality of the entire system. Numerous security concerns consist of [13][14][15]: ...
Article
Full-text available
The cloud can be created, monitored, and disseminated with slight disruption or service provider involvement. Among the most rapidly evolving phenomenon, cloud computing provides users with a variety of low-cost solutions. By putting the ideas of confidentiality, authentication, encryption techniques, non-repudiation, intrusion prevention, and effectiveness into practice, the challenge of cloud information security for computers and cloud storage security has been resolved in its totality. As cloud security has become a growing problem, cloud technology is prominent throughout many emerging disciplines of study in which a significant amount of research is conducted in this field. Each of these efforts uses a cryptography approach. Current solutions to these issues have certain important drawbacks. To protect sensitive information stored in the cloud, one needs to design programs that implement hybrid cryptographic mechanisms using challenging encryption algorithms. This research elaborates on an examination of using cryptographic techniques to mitigate the integrity problems in cloud computing.
... Our motivation is to strengthen the protection of applications and data stored in this environment, and the use of authentication solutions that complicate the task of malware. For that, the main objective of our research is to improve the security in the level of authentication of the users in a multi-cloud system, knowing that the authentication is the first thing to do in all the systems clouds and, which protects the user's identity and this data [22]. For that, we will use the asymmetric encryption method, used for secure data in transmission and based on the algorithm of Rivest, Shamir and Adleman (RSA) [23], which is very reliable in terms of security of data. ...
... Secondly, we will use asymmetric data cryptography with the RSA algorithm [14,38], to provide a high level of data security in transit. And finally, recover the information from several sources (clouds) by guaranteeing the integrity of the data using the hashing algorithm [22]. The Fig. 3 illustrates these three steps. ...
... Encryption and decryption are carried out, using two different keys. The two keys was referred to as the public key (PU) and the private key (PR) [22,37,38]. If the client wants to send an authenticated message to provider, he would encrypt the message with the private key, and this message would only be decipherable with the public key, that would establish the authenticity of the message. ...
Article
Full-text available
The necessity to improve security in a multi-cloud environment has become very urgent in recent years. Although in this topic, many methods using the message authentication code had been realized but, the results of these methods are unsatisfactory and heavy to apply, which, is why the security problem remains unresolved in this environment. This article proposes a new model that provides authentication and data integrity in a distributed and interoperable environment. For that in this paper, the authors first analyze some security models used in a large and distributed environment, and then, we introduce a new model to solve security issues in this environment. Our approach consists of three steps, the first step, was to propose a private virtual network to secure the data in transit. Secondly, we used an authentication method based on data encryption, to protect the identity of the user and his data, and finally, we realize an algorithm to know the integrity of data distributed on the various clouds of the system. The model achieves both identity authentication and the ability to inter-operate between processes running on different cloud’s provider. A data integrity algorithm will be demonstrated. The results of this proposed model can efficiently and safely construct a reliable and stable system in the cross-cloud environment.
... In addition, Opnet based simulation for firewall was reported by Ameen and Nourildean [10]. The authors apply a cloud topology to investigate firewall impact on the network over Opnet simulator. ...
Chapter
Firewall administration is an important topic in network security courses. However, most teaching aids of the topic commonly deal with static firewall analyses that does not adequately covers current dynamic and variety of cyber security attacks. This study presents our approach to introduce an intelligent firewall simulator to fill the gap. The simulator is based on iNetwork software and it has three different dynamic security attacks scenarios or modules. Each module is equipped with handbook or manual to aid student performs the simulation procedures. Evaluation of intelligent firewall simulator usage is performed by expert and student. Expert evaluation is focused on the content validity of the modules and its accompanying handbook, whilst student evaluation measures the perception of students after using the simulator. Finally, both evaluations show positive results that the content and manual of intelligent firewall modules are valid and also effective to improve student skills and understanding.