远程工作迁移的网络安全:新冠疫情爆发后VPN安全格局研究

IF 4.5 Q2 COMPUTER SCIENCE, THEORY & METHODS
Array Pub Date : 2025-06-28 DOI:10.1016/j.array.2025.100437
Kushtrim Qollakaj, Lukas Einler Larsson, Suejb Memeti
{"title":"远程工作迁移的网络安全:新冠疫情爆发后VPN安全格局研究","authors":"Kushtrim Qollakaj,&nbsp;Lukas Einler Larsson,&nbsp;Suejb Memeti","doi":"10.1016/j.array.2025.100437","DOIUrl":null,"url":null,"abstract":"<div><div>The Covid-19 pandemic led to an unprecedented reliance on Virtual Private Networks (VPNs) for remote work, exposing critical vulnerabilities in global cybersecurity infrastructures. As organizations rapidly transitioned to remote operations, many lacked the necessary security measures to protect their VPN systems, making them prime targets for cybercriminals. This study synthesizes findings from 106 studies (2020–2023) to analyze the evolution of VPN-targeted cyberattacks, the tactics employed by threat actors, and effective mitigation strategies.</div><div>Our analysis reveals that the widespread adoption of remote work triggered a 238% surge in VPN-targeted attacks between 2020 and 2022, as adversaries exploited vulnerabilities, misconfigurations, and inadequate security policies. Both independent cybercriminals and state-sponsored actors leveraged phishing, ransomware, and advanced persistent threats (APTs) to gain unauthorized access to corporate networks. In many cases, organizations struggled with outdated VPN protocols, weak authentication mechanisms, and insufficient network segmentation, allowing attackers to infiltrate systems with minimal resistance.</div><div>To address these challenges, we propose a VPN Hardening Framework incorporating strong authentication, robust encryption, secure configurations, and continuous monitoring, expected to significantly reduce breach risks and enhance VPN resilience in the post-pandemic era. Additionally, we highlight emerging cybersecurity trends, including the role of zero-trust architectures, quantum-resistant encryption, and AI-driven intrusion detection in fortifying VPN security against evolving threats.</div></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"27 ","pages":"Article 100437"},"PeriodicalIF":4.5000,"publicationDate":"2025-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cybersecurity of remote work migration: A study on the VPN security landscape post Covid-19 outbreak\",\"authors\":\"Kushtrim Qollakaj,&nbsp;Lukas Einler Larsson,&nbsp;Suejb Memeti\",\"doi\":\"10.1016/j.array.2025.100437\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The Covid-19 pandemic led to an unprecedented reliance on Virtual Private Networks (VPNs) for remote work, exposing critical vulnerabilities in global cybersecurity infrastructures. As organizations rapidly transitioned to remote operations, many lacked the necessary security measures to protect their VPN systems, making them prime targets for cybercriminals. This study synthesizes findings from 106 studies (2020–2023) to analyze the evolution of VPN-targeted cyberattacks, the tactics employed by threat actors, and effective mitigation strategies.</div><div>Our analysis reveals that the widespread adoption of remote work triggered a 238% surge in VPN-targeted attacks between 2020 and 2022, as adversaries exploited vulnerabilities, misconfigurations, and inadequate security policies. Both independent cybercriminals and state-sponsored actors leveraged phishing, ransomware, and advanced persistent threats (APTs) to gain unauthorized access to corporate networks. In many cases, organizations struggled with outdated VPN protocols, weak authentication mechanisms, and insufficient network segmentation, allowing attackers to infiltrate systems with minimal resistance.</div><div>To address these challenges, we propose a VPN Hardening Framework incorporating strong authentication, robust encryption, secure configurations, and continuous monitoring, expected to significantly reduce breach risks and enhance VPN resilience in the post-pandemic era. Additionally, we highlight emerging cybersecurity trends, including the role of zero-trust architectures, quantum-resistant encryption, and AI-driven intrusion detection in fortifying VPN security against evolving threats.</div></div>\",\"PeriodicalId\":8417,\"journal\":{\"name\":\"Array\",\"volume\":\"27 \",\"pages\":\"Article 100437\"},\"PeriodicalIF\":4.5000,\"publicationDate\":\"2025-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Array\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2590005625000645\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Array","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2590005625000645","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0

摘要

2019冠状病毒病大流行导致人们前所未有地依赖虚拟专用网络(vpn)进行远程工作,暴露了全球网络安全基础设施的关键漏洞。随着组织迅速过渡到远程操作,许多组织缺乏必要的安全措施来保护他们的VPN系统,使其成为网络犯罪分子的主要目标。本研究综合了106项研究(2020-2023年)的结果,分析了以vpn为目标的网络攻击的演变、威胁行为者采用的策略以及有效的缓解策略。我们的分析显示,在2020年至2022年期间,远程工作的广泛采用引发了针对vpn的攻击激增238%,原因是攻击者利用了漏洞、错误配置和不充分的安全策略。独立的网络犯罪分子和国家支持的行为者都利用网络钓鱼、勒索软件和高级持续性威胁(apt)来获得对企业网络的未经授权访问。在许多情况下,组织与过时的VPN协议、薄弱的身份验证机制和不充分的网络分段作斗争,使攻击者能够以最小的阻力渗透系统。为了应对这些挑战,我们提出了一个VPN加固框架,该框架结合了强大的身份验证、稳健的加密、安全配置和持续监控,有望显著降低泄露风险,并增强VPN在后大流行时代的弹性。此外,我们还强调了新兴的网络安全趋势,包括零信任架构、抗量子加密和人工智能驱动的入侵检测在加强VPN安全抵御不断发展的威胁方面的作用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cybersecurity of remote work migration: A study on the VPN security landscape post Covid-19 outbreak
The Covid-19 pandemic led to an unprecedented reliance on Virtual Private Networks (VPNs) for remote work, exposing critical vulnerabilities in global cybersecurity infrastructures. As organizations rapidly transitioned to remote operations, many lacked the necessary security measures to protect their VPN systems, making them prime targets for cybercriminals. This study synthesizes findings from 106 studies (2020–2023) to analyze the evolution of VPN-targeted cyberattacks, the tactics employed by threat actors, and effective mitigation strategies.
Our analysis reveals that the widespread adoption of remote work triggered a 238% surge in VPN-targeted attacks between 2020 and 2022, as adversaries exploited vulnerabilities, misconfigurations, and inadequate security policies. Both independent cybercriminals and state-sponsored actors leveraged phishing, ransomware, and advanced persistent threats (APTs) to gain unauthorized access to corporate networks. In many cases, organizations struggled with outdated VPN protocols, weak authentication mechanisms, and insufficient network segmentation, allowing attackers to infiltrate systems with minimal resistance.
To address these challenges, we propose a VPN Hardening Framework incorporating strong authentication, robust encryption, secure configurations, and continuous monitoring, expected to significantly reduce breach risks and enhance VPN resilience in the post-pandemic era. Additionally, we highlight emerging cybersecurity trends, including the role of zero-trust architectures, quantum-resistant encryption, and AI-driven intrusion detection in fortifying VPN security against evolving threats.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Array
Array Computer Science-General Computer Science
CiteScore
4.40
自引率
0.00%
发文量
93
审稿时长
45 days
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信