Skip to main content

Selective Application of VPN by Service Using Port Number in SSL-Based Host-to-Gateway VPN Environment

  • Conference paper
Convergence and Hybrid Information Technology (ICHIT 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7425))

Included in the following conference series:

  • 2386 Accesses

Abstract

There exist a lot of security threats in WLAN environment, therefore it is not reliable. When using a service where security is a crucial factor in WLAN environment, it is mandatory to use a virtual private network (VPN). In WLAN environment, secure socket layer (SSL)-based host-to-gateway VPN is frequently used to protect user information from various attacks that can occur in unreliable wireless access point or wireless link. However, for existing methods, a VPN is applied in block to all packets of user applications, so there is a large overhead. This paper proposes a method for a VPN client to selectively use a VPN service according to the importance of network service type and security using the packet distributed processing method provided by netfilter framework of kernel. The paper also shows its usefulness through an experiment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andrew, H.: SSL Virtual Private Networks. Computers & Security 22(5), 416–420 (2003)

    Article  Google Scholar 

  2. Sheila, F., Paul, H., Angela, O. Richard, P.: Guide to SSL VPNs: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-113 (2008)

    Google Scholar 

  3. Private Wifi, Private Communications Corporation, http://www.privatewifi.com/

  4. Daehyun, R., Seunghoon, N.: Implementation of wireless VOIP systems based on VPN. In: 7th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, pp. 182–186. WSEAS, Wisconsin (2008)

    Google Scholar 

  5. Markus, F.: OpenVPN: Building and Integrating Virtual Private Networks: Learn how to build secure VPNs using this powerful Open Source application. Packet Publishing, Birmingham (2006)

    Google Scholar 

  6. Jason, L., Yue, L., Nathanael, V., Scott, M., Keith, H.: A real-time network simulation infrastructure based on OpenVPN. Journal of Systems and Software 82(3), 473–485 (2009)

    Article  Google Scholar 

  7. Lucian, G.: Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2. NAT and I7-fliter. Packet Publishing, Birmingham (2006)

    Google Scholar 

  8. OpenVPN-Open Source VPN, OpenVPN Technologies. Inc, http://openvpn.net/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Park, KY., Kim, YS., Kim, J. (2012). Selective Application of VPN by Service Using Port Number in SSL-Based Host-to-Gateway VPN Environment. In: Lee, G., Howard, D., Kang, J.J., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2012. Lecture Notes in Computer Science, vol 7425. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32645-5_75

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32645-5_75

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32644-8

  • Online ISBN: 978-3-642-32645-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics