Downloads: 124 | Views: 257
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 9, September 2015 | Popularity: 6.1 / 10
Information Leakage Prevention in IPsec VPN
Vishnu K G, Chinchu Jacob
Abstract: Virtual Private Networks are most widely used in all over the world. According to VPN it is considered that the networks are secure. But in all cases there are some loop holes to penetrate into it. So in this paper we discussing about the most dangerous loop holes namely the covert channels. There are a lot of research is done in the field of covert channels. But all works are not practically implemented to get an idea of how to prevent the covert channel. In this we are specifying the threat model and using some algorithms to prevent the covert channels. By the use of this concept we can completely prevent the information leakage (almost 90 %).
Keywords: IPsec, VPN, Covert channel, Information Leakage, Insiders
Edition: Volume 4 Issue 9, September 2015
Pages: 556 - 562
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1303 - 1306Survey on Privacy Preservation of Sensitive Data
Uma Ashok Huljanti, Dr. Srinivas Narasim Kini
Downloads: 110
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 3216 - 3219A Survey on Security Prospects through Multicloud Computing by Adapting Data Splitting
Smita Y. Aparadh, Tejaswini H. Patil
Downloads: 112
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1079 - 1082Information Leak Detection and Prevention
Deepika. S. Patil, Dr. Sujata Terdal
Downloads: 117
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2035 - 2040A Framework for Enhancing Source Location Privacy in Wireless Sensor Networks
Parthasaradhi M, B Nagalakshmi, D Venkatesh
Downloads: 121 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 496 - 501Development of Secure Multikeyword Retrieval Methodology for Encrypted Cloud Data
Deepak I M, K.R. Shylaja, Ravinandan M E