首页> 外文会议>International Conference on Advances in Big Data, Computing and Data Communication Systems >Analyzing Generic Routing Encapsulation (GRE) and IP Security (IPSec) Tunneling Protocols for Secured Communication over Public Networks
【24h】

Analyzing Generic Routing Encapsulation (GRE) and IP Security (IPSec) Tunneling Protocols for Secured Communication over Public Networks

机译:分析通用路由封装(GRE)和IP安全(IPSec)隧道协议,用于公共网络的安全通信

获取原文

摘要

The extensive use of the Internet has created excessive demand for security and privacy in the communication channels. The increase in connected devices and the need to remotely access network resources has also amplified the need for strong security measures. Virtual Private Networks, tunneling methods, and multi-layer encryptions have all been used in different network architectures and topologies to secure end-to-end transmission of information. The increase in cyber-attacks and data breaches in the past decades is a clear indication of the concerns surrounding information security. From network flooding, Denial of Services (DoS) to sensitive data exposure, the consequences of a poorly secured network can be detrimental to an organization and end-users. With the projected IoT technology, devices communication needs to be efficiently protected if it has to pass through public networks such as the Internet. This paper analyses two of the most widely used tunnelling protocols in secured data transmission, the Generic Routing Encapsulation (GRE) and the IP Security (IPSec), establishes a comparison between them and evaluate their capabilities for security and privacy measures on the internet network, using network simulators. We use the graphical network simulator 3 (GNS3) emulator for traffic analyses.
机译:广泛使用互联网在通信渠道中为安全和隐私创造了过度的需求。连接设备的增加以及远程访问网络资源的需求也扩大了对强的安全措施的需求。虚拟私有网络,隧道方法和多层加密都已用于不同的网络架构和拓扑,以确保信息的端到端传输。过去几十年的网络攻击和数据泄露的增加是围绕信息安全的担忧的明确指示。从网络泛滥,拒绝服务(DOS)到敏感数据曝光,持久网络的后果可能对组织和最终用户有害。通过预计的物联网技术,如果必须通过诸如互联网等公共网络,则需要有效地保护设备通信。本文分析了安全数据传输中最广泛使用的两个最广泛使用的隧道协议,通用路由封装(GRE)和IP安全(IPSec),建立了它们之间的比较,并评估其在互联网网络上的安全性和隐私措施的功能,使用网络模拟器。我们使用图形网络模拟器3(GNS3)仿真器进行流量分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号