Title :
Enhancing VPN security through security policy management
Author :
Singh, Arun Kumar ; Samaddar, Shefalika Ghosh ; Misra, Arun K.
Author_Institution :
Comput. Sci. & Eng. Dept., Motilal Nehru Nat. Inst. of Technol., Allahabad, India
Abstract :
Most of the early Virtual Private Networks (VPN) connection came from the vendors of networking hardware and software to satisfy one time goal of security in communication in a remote way. The first and foremost of the solution of VPN is to introduce the security protocols like IPSec. IPSec uses cryptography in order to encrypt and authenticate the traffic flowing between point of interest. This is a large set of related protocols operating above the IP layer of the OSI stack, each represented by an RFC specification. It is required that each vendor implements these specifications exactly, in order to be able to interoperate with other vendors. The IPsec access configuration is suffered from non-standardization as the vendors have the liberty of implementing the access requirements that are not restrictive by a specific standard. This paper presents a survey of various VPN categories and some specific products. It outlines the compliance requirement as per various domain specific security policy. The paper shows a successful mechanism to incorporate the compliance requirement into the body of security protocols or firewalls of VPN enhancing the VPN security further as per standard. Such enhanced VPN security satisfies legal bindings as it satisfies the compliance rules/laws of a country. The paper also summarizes the interoperability issues that appear when configuring IPsec on different vendor devices and draws a few conclusions on the level of protocol compliance deciding which VPN solution a customer needs for his/her business.
Keywords :
authorisation; computer network security; cryptography; formal specification; open systems; protocols; virtual private networks; IPSec security protocol; IPsec access configuration; RFC specification; VPN category; VPN security; authentication; communication security; cryptography; firewall; interoperability issue; legal binding; protocol compliance; security policy management; virtual private network; Authentication; Encryption; Internet; Protocols; Virtual private networks; Cryptography; Firewall; Iptable; PKI; Security Compliance; Security and Protection; VPN security;
Conference_Titel :
Recent Advances in Information Technology (RAIT), 2012 1st International Conference on
Conference_Location :
Dhanbad
Print_ISBN :
978-1-4577-0694-3
DOI :
10.1109/RAIT.2012.6194494