构建动态多跳VPN链保证终端接入系统安全的方法

T. Vitalii, Budko Anna, Hvozdetska Kateryna, D. Hrebeniuk
{"title":"构建动态多跳VPN链保证终端接入系统安全的方法","authors":"T. Vitalii, Budko Anna, Hvozdetska Kateryna, D. Hrebeniuk","doi":"10.1109/PICST51311.2020.9467953","DOIUrl":null,"url":null,"abstract":"International business groups are increasingly using terminal systems as workstations. At the same time, virtual machine servers are often located in the head structure, while remote offices have to connect to them using terminals. Currently, the security of terminal access systems is ensured by the robustness of communication protocols between a terminal and a host. To improve the security of such connections, the concept of Multi-hop VPN chains has recently been used. Its essence lies in the use of a set of intermediate VPN servers, the interaction of which is organized according to a certain rule for the purpose of multiple “repackaging” of traffic between subnets or through end-to-end tunneling. At the same time, the speed of building such an overlay structure and the delay indicator between the end nodes are important tasks. Therefore, the task of fast building Multi-hop VPN chains with a given security level and the condition of the minimum allowable network delay is relevant. A method for building dynamic Multi-hop VPN chains to ensure the security of terminal access systems is proposed in the paper. The method is based on solving a set of combinatorial best choice problems. The method provides for both scheduled hopping of the route in the chain, and unscheduled one conditioned by a failure of the VPN server or exceeding the threshold network delay between a terminal and a host. The paper presents the results of comparative experiments with the well-known NeuroRouting approach. It is shown that the developed method is more flexible than NeuroRouting. By carrying out experiments, it was found that the use of the developed method allows obtaining a gain in connection security by increasing the frequency of chain hopping; reducing the time delay of data exchange between the host and the terminal through a chain of VPN servers up to 15%.","PeriodicalId":123008,"journal":{"name":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","volume":"298 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Method of Building Dynamic Multi-Hop VPN Chains for Ensuring Security of Terminal Access Systems\",\"authors\":\"T. Vitalii, Budko Anna, Hvozdetska Kateryna, D. Hrebeniuk\",\"doi\":\"10.1109/PICST51311.2020.9467953\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"International business groups are increasingly using terminal systems as workstations. At the same time, virtual machine servers are often located in the head structure, while remote offices have to connect to them using terminals. Currently, the security of terminal access systems is ensured by the robustness of communication protocols between a terminal and a host. To improve the security of such connections, the concept of Multi-hop VPN chains has recently been used. Its essence lies in the use of a set of intermediate VPN servers, the interaction of which is organized according to a certain rule for the purpose of multiple “repackaging” of traffic between subnets or through end-to-end tunneling. At the same time, the speed of building such an overlay structure and the delay indicator between the end nodes are important tasks. Therefore, the task of fast building Multi-hop VPN chains with a given security level and the condition of the minimum allowable network delay is relevant. A method for building dynamic Multi-hop VPN chains to ensure the security of terminal access systems is proposed in the paper. The method is based on solving a set of combinatorial best choice problems. The method provides for both scheduled hopping of the route in the chain, and unscheduled one conditioned by a failure of the VPN server or exceeding the threshold network delay between a terminal and a host. The paper presents the results of comparative experiments with the well-known NeuroRouting approach. It is shown that the developed method is more flexible than NeuroRouting. By carrying out experiments, it was found that the use of the developed method allows obtaining a gain in connection security by increasing the frequency of chain hopping; reducing the time delay of data exchange between the host and the terminal through a chain of VPN servers up to 15%.\",\"PeriodicalId\":123008,\"journal\":{\"name\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"volume\":\"298 2\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICST51311.2020.9467953\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST51311.2020.9467953","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

国际商业集团越来越多地使用终端系统作为工作站。同时,虚拟机服务器通常位于头部结构中,远程办公室必须使用终端与之连接。目前,终端接入系统的安全性主要取决于终端与主机之间通信协议的鲁棒性。为了提高这种连接的安全性,最近使用了多跳VPN链的概念。它的本质是使用一组中间VPN服务器,这些服务器之间按照一定的规则组织交互,目的是在子网之间多次“重新包装”流量,或者通过端到端隧道。同时,建立这种覆盖结构的速度和终端节点之间的延迟指标是重要的任务。因此,在给定的安全级别和网络允许时延最小的条件下,快速构建多跳VPN链是有意义的。为了保证终端接入系统的安全性,提出了一种构建动态多跳VPN链的方法。该方法基于求解一组组合最优选择问题。该方法既提供链中路由的计划跳,也提供由VPN服务器故障或超过终端和主机之间的阈值网络延迟所限制的非计划跳。本文给出了与著名的神经路由方法的对比实验结果。结果表明,该方法比NeuroRouting方法具有更大的灵活性。通过实验发现,使用所开发的方法可以通过增加跳链频率来获得连接安全性的增益;通过VPN服务器链,使主机与终端之间的数据交换时延降低15%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Method of Building Dynamic Multi-Hop VPN Chains for Ensuring Security of Terminal Access Systems
International business groups are increasingly using terminal systems as workstations. At the same time, virtual machine servers are often located in the head structure, while remote offices have to connect to them using terminals. Currently, the security of terminal access systems is ensured by the robustness of communication protocols between a terminal and a host. To improve the security of such connections, the concept of Multi-hop VPN chains has recently been used. Its essence lies in the use of a set of intermediate VPN servers, the interaction of which is organized according to a certain rule for the purpose of multiple “repackaging” of traffic between subnets or through end-to-end tunneling. At the same time, the speed of building such an overlay structure and the delay indicator between the end nodes are important tasks. Therefore, the task of fast building Multi-hop VPN chains with a given security level and the condition of the minimum allowable network delay is relevant. A method for building dynamic Multi-hop VPN chains to ensure the security of terminal access systems is proposed in the paper. The method is based on solving a set of combinatorial best choice problems. The method provides for both scheduled hopping of the route in the chain, and unscheduled one conditioned by a failure of the VPN server or exceeding the threshold network delay between a terminal and a host. The paper presents the results of comparative experiments with the well-known NeuroRouting approach. It is shown that the developed method is more flexible than NeuroRouting. By carrying out experiments, it was found that the use of the developed method allows obtaining a gain in connection security by increasing the frequency of chain hopping; reducing the time delay of data exchange between the host and the terminal through a chain of VPN servers up to 15%.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信