Skip to main content

Securing a Network: How Effective Using Firewalls and VPNs Are?

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 70))

Abstract

With the tremendous amount of increase in cyber threats on the Internet, the security of data traveling over a network has become a significant concern for all the netizens. As a result, a large number of Internet users have started using firewalls and VPN (Virtual Private Network) to ensure more protection for their data on the go. Though mostly considered as defenders of our network security, sometimes firewalls and VPNs can also pose some serious threats to its users. Our research focuses on addressing these security flaws by providing a specific illustration of the working principles and performance of the firewalls and VPNs, including the technologies behind them and their benefits, significant potential risks it may bring due to some considerable loopholes in their architecture, and the possible solutions to those security issues. We hope that our research will bring a better understanding of these security issues and their solution to help users and organizations to deal with these security threats and risks in a better way.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ma, L., Liang, H.: Application of firewall technology in computer network security. Comput. Knowl. Technol. 10, 3743–3745 (2014). Print

    Google Scholar 

  2. Jiang, C.: Research on computer network security technology and firewall technology. Ability Wisdom 235 (2017). Print

    Google Scholar 

  3. Su, J., Yuan, J.: Firewall technology and its development. Comput. Eng. Appl. 147–149 (2004)

    Google Scholar 

  4. Zhang, Z., et al.: VPN: boon or trap? A comparative study of MPLS, IPSec, and SSL virtual private network. In: ICCMC 2018 (In Press)

    Google Scholar 

  5. Sun, J., Wei, J.: Computer Network Technology and Application. Xi’an University of Electronic Science and Technology, Xi’an, China (2010)

    Google Scholar 

  6. Stateful-inspection firewall: the Netscreen way. http://www.netscreen.com/products/firewallwpaper.html

  7. Li, S., Tørresen, J., Sorensen, O.: Exploiting Stateful Inspection of Network Security in Re-Configurable Hardware

    Google Scholar 

  8. Suehring, S.: Linux Firewalls: Enhancing Security with Nftables and Beyond, Illustrated edn, p. 25. Pearson Education (2015). ISBN 0134000021

    Google Scholar 

  9. Successful case: Hanbo firewall to build a safe and efficient enterprise Intranet. Network World 2011-12-12 (021) (2011)

    Google Scholar 

  10. Qing, Y.: Shortcomings and improvements in firewall security. Sci. Technol. Eng. 14, 1009–1012 (2005)

    Google Scholar 

  11. Sun, K.: Concrete application of firewall technology in computer network security. Sci. Technol. Econ. Guide 17, 38 (2017)

    Google Scholar 

  12. Wang, D.: Research on Deep Packet Inspection Technology of Firewall. Xi’an University of Electronic Science and Technology (2005)

    Google Scholar 

  13. Zhang, T.: Design and Implementation of Firewall Based on Content Filtering Software. University of Electronic Science and Technology (2012)

    Google Scholar 

  14. Security analysis of VPN technology, 19 Sept 2014. Web. http://sec.chinabyte.com/368/13082868.shtml

  15. Comparison between professional VPN and firewall with VPN. Web. https://wenku.baidu.com/view/6e89ab1055270722192ef791.html

  16. Network security: a simple guide to firewalls. In: Network Security, pp. 2–3 (2000)

    Google Scholar 

  17. Yadav, A.S.S., et al.: Prevention of spoofing attacks in wireless networks. In: International Conference on Computing Communication Control and Automation, pp. 164–171. IEEE (2015)

    Google Scholar 

  18. Hollis, K.: The Rose Attack Explained. Retrieved on 2013-11-25

    Google Scholar 

  19. Sakurai, S., Ushirozawa, S.: Input method against Trojan horse and replay attack. In: IEEE International Conference on Information Theory and Information Security, pp. 384–389. IEEE (2010)

    Google Scholar 

  20. Chen, D., Wang, P.: Study and implementation of tunnel attack in MANET. Comput. Eng. 33(9), pp. 140–141 (2007)

    Google Scholar 

  21. What is PASV FTP (passive FTP)? 13 Jun 2018. Web. https://www.lifewire.com/definition-of-passive-mode-ftp-816441

  22. Zhao, T.F., et al.: Detecting rebound port Trojan based on network behavior analysis. Netinfo Secur. (2011)

    Google Scholar 

  23. VPN helps you scale the wall? Let’s put our privacy first, 6 Jun 2016. Web. https://www.jb51.net/hack/471867.html

  24. Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18, 2027–2051 (2016)

    Article  Google Scholar 

  25. Khan, M.M., Bakhtiari, M., Bakhtiari, S.: An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA. In: 2013 13th International Conference on Intelligent Systems Design and Applications, pp. 115–120, Dec 2013

    Google Scholar 

  26. Yang, Z., Cheng, Q.: Research of immune-based technology for the firewall system security. Microcomput. Inf. 21, 9-3

    Google Scholar 

  27. Network behavior management and the next generation of firewalls, SWG relations. Web. https://jingyan.baidu.com/article/cbf0e50095f63a2eaa2893cc.html

  28. Zhao, Y., Du, Y.: Design and implementation of embedded secure web gateway. Comput. Eng. Des. 27(4) (2006)

    Google Scholar 

  29. Sahin, M., Sogukpınar, I.: An efficient firewall for web applications (EFWA). In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 1150–1155 (2017)

    Google Scholar 

  30. Boukari, N., Aljane, A.: Security and auditing of VPN. In: Proceedings of Third International Workshop on Services in Distributed and Networked Environments, pp. 132–138, 6 Aug 1996

    Google Scholar 

  31. VPN firewall. Techopedia. 28 Jun 2017. Web. https://www.techopedia.com/definition/30753/vpn-firewall

  32. Dian, A.: Security research and improvement of mainstream VPN technology (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sonali Chandel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jingyao, S., Chandel, S., Yunnan, Y., Jingji, Z., Zhipeng, Z. (2020). Securing a Network: How Effective Using Firewalls and VPNs Are?. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_71

Download citation

Publish with us

Policies and ethics