Securing a Network: How Effective Using Firewalls and VPNs Are?

  • Sun Jingyao
  • Sonali ChandelEmail author
  • Yu Yunnan
  • Zang Jingji
  • Zhang Zhipeng
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 70)


With the tremendous amount of increase in cyber threats on the Internet, the security of data traveling over a network has become a significant concern for all the netizens. As a result, a large number of Internet users have started using firewalls and VPN (Virtual Private Network) to ensure more protection for their data on the go. Though mostly considered as defenders of our network security, sometimes firewalls and VPNs can also pose some serious threats to its users. Our research focuses on addressing these security flaws by providing a specific illustration of the working principles and performance of the firewalls and VPNs, including the technologies behind them and their benefits, significant potential risks it may bring due to some considerable loopholes in their architecture, and the possible solutions to those security issues. We hope that our research will bring a better understanding of these security issues and their solution to help users and organizations to deal with these security threats and risks in a better way.


Firewall VPN Network security 


  1. 1.
    Ma, L., Liang, H.: Application of firewall technology in computer network security. Comput. Knowl. Technol. 10, 3743–3745 (2014). PrintGoogle Scholar
  2. 2.
    Jiang, C.: Research on computer network security technology and firewall technology. Ability Wisdom 235 (2017). PrintGoogle Scholar
  3. 3.
    Su, J., Yuan, J.: Firewall technology and its development. Comput. Eng. Appl. 147–149 (2004)Google Scholar
  4. 4.
    Zhang, Z., et al.: VPN: boon or trap? A comparative study of MPLS, IPSec, and SSL virtual private network. In: ICCMC 2018 (In Press)Google Scholar
  5. 5.
    Sun, J., Wei, J.: Computer Network Technology and Application. Xi’an University of Electronic Science and Technology, Xi’an, China (2010)Google Scholar
  6. 6.
    Stateful-inspection firewall: the Netscreen way.
  7. 7.
    Li, S., Tørresen, J., Sorensen, O.: Exploiting Stateful Inspection of Network Security in Re-Configurable HardwareGoogle Scholar
  8. 8.
    Suehring, S.: Linux Firewalls: Enhancing Security with Nftables and Beyond, Illustrated edn, p. 25. Pearson Education (2015). ISBN 0134000021Google Scholar
  9. 9.
    Successful case: Hanbo firewall to build a safe and efficient enterprise Intranet. Network World 2011-12-12 (021) (2011)Google Scholar
  10. 10.
    Qing, Y.: Shortcomings and improvements in firewall security. Sci. Technol. Eng. 14, 1009–1012 (2005)Google Scholar
  11. 11.
    Sun, K.: Concrete application of firewall technology in computer network security. Sci. Technol. Econ. Guide 17, 38 (2017)Google Scholar
  12. 12.
    Wang, D.: Research on Deep Packet Inspection Technology of Firewall. Xi’an University of Electronic Science and Technology (2005)Google Scholar
  13. 13.
    Zhang, T.: Design and Implementation of Firewall Based on Content Filtering Software. University of Electronic Science and Technology (2012)Google Scholar
  14. 14.
    Security analysis of VPN technology, 19 Sept 2014. Web.
  15. 15.
    Comparison between professional VPN and firewall with VPN. Web.
  16. 16.
    Network security: a simple guide to firewalls. In: Network Security, pp. 2–3 (2000)Google Scholar
  17. 17.
    Yadav, A.S.S., et al.: Prevention of spoofing attacks in wireless networks. In: International Conference on Computing Communication Control and Automation, pp. 164–171. IEEE (2015)Google Scholar
  18. 18.
    Hollis, K.: The Rose Attack Explained. Retrieved on 2013-11-25Google Scholar
  19. 19.
    Sakurai, S., Ushirozawa, S.: Input method against Trojan horse and replay attack. In: IEEE International Conference on Information Theory and Information Security, pp. 384–389. IEEE (2010)Google Scholar
  20. 20.
    Chen, D., Wang, P.: Study and implementation of tunnel attack in MANET. Comput. Eng. 33(9), pp. 140–141 (2007)Google Scholar
  21. 21.
    What is PASV FTP (passive FTP)? 13 Jun 2018. Web.
  22. 22.
    Zhao, T.F., et al.: Detecting rebound port Trojan based on network behavior analysis. Netinfo Secur. (2011)Google Scholar
  23. 23.
    VPN helps you scale the wall? Let’s put our privacy first, 6 Jun 2016. Web.
  24. 24.
    Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18, 2027–2051 (2016)CrossRefGoogle Scholar
  25. 25.
    Khan, M.M., Bakhtiari, M., Bakhtiari, S.: An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA. In: 2013 13th International Conference on Intelligent Systems Design and Applications, pp. 115–120, Dec 2013Google Scholar
  26. 26.
    Yang, Z., Cheng, Q.: Research of immune-based technology for the firewall system security. Microcomput. Inf. 21, 9-3Google Scholar
  27. 27.
    Network behavior management and the next generation of firewalls, SWG relations. Web.
  28. 28.
    Zhao, Y., Du, Y.: Design and implementation of embedded secure web gateway. Comput. Eng. Des. 27(4) (2006)Google Scholar
  29. 29.
    Sahin, M., Sogukpınar, I.: An efficient firewall for web applications (EFWA). In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 1150–1155 (2017)Google Scholar
  30. 30.
    Boukari, N., Aljane, A.: Security and auditing of VPN. In: Proceedings of Third International Workshop on Services in Distributed and Networked Environments, pp. 132–138, 6 Aug 1996Google Scholar
  31. 31.
    VPN firewall. Techopedia. 28 Jun 2017. Web.
  32. 32.
    Dian, A.: Security research and improvement of mainstream VPN technology (2009)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Sun Jingyao
    • 1
  • Sonali Chandel
    • 1
    Email author
  • Yu Yunnan
    • 1
  • Zang Jingji
    • 1
  • Zhang Zhipeng
    • 1
  1. 1.New York Institute of TechnologyNanjingChina

Personalised recommendations