skip to main content
10.1145/3449301.3449338acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicraiConference Proceedingsconference-collections
research-article

Research on VPN in Experimental Simulation Environment Based on GRE and IPSec

Published: 09 June 2021 Publication History

Abstract

With the popularization of Internet network technology, its potential network information security is also pervasive in various fields. In this paper, VPN technology is based on GRE and IPSec, and GNS3 simulator is used to simulate and test four kinds of experiment programs to realize VPN combined with routing and message analysis to testify the experiment. Finally, the comparative results are presented and the conclusions are drawn that the security of data transmission is more reliable.

References

[1]
LOCATI F A.Open Stack cloud security[M].Birmingham:Packt Publishing Ltd, 2015.
[2]
Wang Lina, Liu Yan. CE Access Internet Simulation in BGP/ MPLS VPN[J]. Laboratory Research and Exploration, 2014, 33 (03): 76-80, 97.
[3]
MELL P, GRANCE T.The NIST definition of cloud computing[R].Gaithersburg:National Institute of Standards and Technology, 2011.
[4]
BRUNETTE G, MOGULL R.Security guidance for critical areas of focus in cloud computing V3.0[R].Toronto:Cloud Security Alliance, 2011.
[5]
Tian Yuan, Hui Huang, Li Mingchu. Design and Application of Network Security Protocol Simulation Experiment Teaching Platform [J]. Experimental Technology and Management, 2013, 30 (11): 166-168+171.
[6]
SCARFONE K, SOUPPAYA M, HOFFMAN P.Guide to security for full virtualization technologies[R].Gaithersburg:National Institute of Standards and Technology, 2011.
[7]
Wang Lina, Liu Yan, He Jun. Simulation of VPN Experiment Based on IPSec and GRE [J]. Laboratory Research and Exploration, 2013 (09): 70-75.
[8]
MOSHARAF K C, RAOUF B.A survey of network virtualization[J].Computer networks, 2010, 54 (5) :862-876.

Index Terms

  1. Research on VPN in Experimental Simulation Environment Based on GRE and IPSec
        Index terms have been assigned to the content through auto-classification.

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICRAI '20: Proceedings of the 6th International Conference on Robotics and Artificial Intelligence
        November 2020
        288 pages
        ISBN:9781450388597
        DOI:10.1145/3449301
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 09 June 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. GRE
        2. IP security
        3. cyber security
        4. experimental simulation

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Funding Sources

        Conference

        ICRAI 2020

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 66
          Total Downloads
        • Downloads (Last 12 months)13
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 06 Jan 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media