VPN Packet Loss-Oriented Dynamic Control

Article Preview

Abstract:

Through security protocols and virtual private network tunneling for data confidentiality, message integrity, and endpoint authentication. Users can access anywhere Internet VPN service within the group. VPN tunneling technology VPN gateway group is exposed to internal services in the Internet, malicious users are using client terminal allows officers to attack the internal services group. So we must study to the control is based on the model, combined with VPN network traffic characteristics, the topological feature model of security and safety technology and related technologies. Study on dynamic access control packet loss model in this article, you can study can greatly increase VPN security, confidentiality of data on. Due to the introduction of the concept of dynamic control, we can more accurately control the packet loss and improve system performance.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

710-714

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Banga Gaurav, C. Jeffrey, Druschel Peter (1999) A scalable and explicit event delivery mechanism for UNIX. Proceedings of the 1999 USENIX Annual Technical Conference. Monterey, CA: USENIX 1: 253-265.

Google Scholar

[2] William Stallings (2000) Network Security Essentials: Application and Standards. Prentice-Hall Inc 1: 55-87.

Google Scholar

[3] Dorothy E. Denning (1987) An intrusion-detection model. IEEE Transactions on SoftwareEngineering 13(2): 222-232.

Google Scholar

[4] E. Nahum, D.J. Yates, S. O'Malley, etal (1996) Parallelized network security protocols. In: Proceedings of the Symposium on Network and Distributed System Security. Washington: IEEE Computer Society Press 22-23.

DOI: 10.1109/ndss.1996.492421

Google Scholar

[5] LU Han-yu, LIAN Hong, WANG He-chuang, WANG Hua-jun, WANG Xuben (2010) DDoS attack source tracing technology research Based on IPv6. IEEE International Conference on Internet Technology and Applications (ITAP 2010) 1: 67-72.

DOI: 10.1109/itapp.2010.5566634

Google Scholar

[6] Th. Ruppelt, G. Wirtz (1992) Automatic Extraction of Functional Parallelism fromOrdinary Programs. IEEE Transactions on Parallel and Distributed Systems 3(2): 166-178.

DOI: 10.1109/71.127258

Google Scholar