Abstract
With the tremendous amount of increase in cyber threats on the Internet, the security of data traveling over a network has become a significant concern for all the netizens. As a result, a large number of Internet users have started using firewalls and VPN (Virtual Private Network) to ensure more protection for their data on the go. Though mostly considered as defenders of our network security, sometimes firewalls and VPNs can also pose some serious threats to its users. Our research focuses on addressing these security flaws by providing a specific illustration of the working principles and performance of the firewalls and VPNs, including the technologies behind them and their benefits, significant potential risks it may bring due to some considerable loopholes in their architecture, and the possible solutions to those security issues. We hope that our research will bring a better understanding of these security issues and their solution to help users and organizations to deal with these security threats and risks in a better way.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ma, L., Liang, H.: Application of firewall technology in computer network security. Comput. Knowl. Technol. 10, 3743–3745 (2014). Print
Jiang, C.: Research on computer network security technology and firewall technology. Ability Wisdom 235 (2017). Print
Su, J., Yuan, J.: Firewall technology and its development. Comput. Eng. Appl. 147–149 (2004)
Zhang, Z., et al.: VPN: boon or trap? A comparative study of MPLS, IPSec, and SSL virtual private network. In: ICCMC 2018 (In Press)
Sun, J., Wei, J.: Computer Network Technology and Application. Xi’an University of Electronic Science and Technology, Xi’an, China (2010)
Stateful-inspection firewall: the Netscreen way. http://www.netscreen.com/products/firewallwpaper.html
Li, S., Tørresen, J., Sorensen, O.: Exploiting Stateful Inspection of Network Security in Re-Configurable Hardware
Suehring, S.: Linux Firewalls: Enhancing Security with Nftables and Beyond, Illustrated edn, p. 25. Pearson Education (2015). ISBN 0134000021
Successful case: Hanbo firewall to build a safe and efficient enterprise Intranet. Network World 2011-12-12 (021) (2011)
Qing, Y.: Shortcomings and improvements in firewall security. Sci. Technol. Eng. 14, 1009–1012 (2005)
Sun, K.: Concrete application of firewall technology in computer network security. Sci. Technol. Econ. Guide 17, 38 (2017)
Wang, D.: Research on Deep Packet Inspection Technology of Firewall. Xi’an University of Electronic Science and Technology (2005)
Zhang, T.: Design and Implementation of Firewall Based on Content Filtering Software. University of Electronic Science and Technology (2012)
Security analysis of VPN technology, 19 Sept 2014. Web. http://sec.chinabyte.com/368/13082868.shtml
Comparison between professional VPN and firewall with VPN. Web. https://wenku.baidu.com/view/6e89ab1055270722192ef791.html
Network security: a simple guide to firewalls. In: Network Security, pp. 2–3 (2000)
Yadav, A.S.S., et al.: Prevention of spoofing attacks in wireless networks. In: International Conference on Computing Communication Control and Automation, pp. 164–171. IEEE (2015)
Hollis, K.: The Rose Attack Explained. Retrieved on 2013-11-25
Sakurai, S., Ushirozawa, S.: Input method against Trojan horse and replay attack. In: IEEE International Conference on Information Theory and Information Security, pp. 384–389. IEEE (2010)
Chen, D., Wang, P.: Study and implementation of tunnel attack in MANET. Comput. Eng. 33(9), pp. 140–141 (2007)
What is PASV FTP (passive FTP)? 13 Jun 2018. Web. https://www.lifewire.com/definition-of-passive-mode-ftp-816441
Zhao, T.F., et al.: Detecting rebound port Trojan based on network behavior analysis. Netinfo Secur. (2011)
VPN helps you scale the wall? Let’s put our privacy first, 6 Jun 2016. Web. https://www.jb51.net/hack/471867.html
Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18, 2027–2051 (2016)
Khan, M.M., Bakhtiari, M., Bakhtiari, S.: An HTTPS approach to resist man in the middle attack in secure SMS using ECC and RSA. In: 2013 13th International Conference on Intelligent Systems Design and Applications, pp. 115–120, Dec 2013
Yang, Z., Cheng, Q.: Research of immune-based technology for the firewall system security. Microcomput. Inf. 21, 9-3
Network behavior management and the next generation of firewalls, SWG relations. Web. https://jingyan.baidu.com/article/cbf0e50095f63a2eaa2893cc.html
Zhao, Y., Du, Y.: Design and implementation of embedded secure web gateway. Comput. Eng. Des. 27(4) (2006)
Sahin, M., Sogukpınar, I.: An efficient firewall for web applications (EFWA). In: 2017 International Conference on Computer Science and Engineering (UBMK), pp. 1150–1155 (2017)
Boukari, N., Aljane, A.: Security and auditing of VPN. In: Proceedings of Third International Workshop on Services in Distributed and Networked Environments, pp. 132–138, 6 Aug 1996
VPN firewall. Techopedia. 28 Jun 2017. Web. https://www.techopedia.com/definition/30753/vpn-firewall
Dian, A.: Security research and improvement of mainstream VPN technology (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Jingyao, S., Chandel, S., Yunnan, Y., Jingji, Z., Zhipeng, Z. (2020). Securing a Network: How Effective Using Firewalls and VPNs Are?. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_71
Download citation
DOI: https://doi.org/10.1007/978-3-030-12385-7_71
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12384-0
Online ISBN: 978-3-030-12385-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)