{"id":"https://openalex.org/W4313451615","doi":"https://doi.org/10.1109/iccr56254.2022.9996015","title":"Classification and Analysis of Virtual Private Network","display_name":"Classification and Analysis of Virtual Private Network","publication_year":2022,"publication_date":"2022-10-06","ids":{"openalex":"https://openalex.org/W4313451615","doi":"https://doi.org/10.1109/iccr56254.2022.9996015"},"language":"en","primary_location":{"id":"doi:10.1109/iccr56254.2022.9996015","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9996015","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049025305","display_name":"Nikhil Barya","orcid":null},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Nikhil Barya","raw_affiliation_strings":["Chandigarh University,Department of Computer Science,Gharuan,Punjab,India","Department of Computer Science, Chandigarh University, Gharuan, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India","institution_ids":["https://openalex.org/I101407740"]},{"raw_affiliation_string":"Department of Computer Science, Chandigarh University, Gharuan, Punjab, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036628465","display_name":"Azhar Ashraf","orcid":null},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Azhar Ashraf","raw_affiliation_strings":["Chandigarh University,Department of Computer Science,Gharuan,Punjab,India","Department of Computer Science, Chandigarh University, Gharuan, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India","institution_ids":["https://openalex.org/I101407740"]},{"raw_affiliation_string":"Department of Computer Science, Chandigarh University, Gharuan, Punjab, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101921565","display_name":"Maninder Kaur","orcid":"https://orcid.org/0000-0003-3006-4673"},"institutions":[{"id":"https://openalex.org/I2800404181","display_name":"Guru Gobind Singh Medical College and Hospital","ror":"https://ror.org/01m7pan94","country_code":"IN","type":"education","lineage":["https://openalex.org/I2800404181"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Maninder Kaur","raw_affiliation_strings":["Guru Gobind Singh College for Women,Department of Computer Science,Gharuan,Punjab,India","Department of Computer Science, Guru Gobind Singh College for Women, Gharuan, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Guru Gobind Singh College for Women,Department of Computer Science,Gharuan,Punjab,India","institution_ids":["https://openalex.org/I2800404181"]},{"raw_affiliation_string":"Department of Computer Science, Guru Gobind Singh College for Women, Gharuan, Punjab, India","institution_ids":["https://openalex.org/I2800404181"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070485485","display_name":"Shikha Uniyal Gairola","orcid":"https://orcid.org/0000-0001-5271-9349"},"institutions":[{"id":"https://openalex.org/I3132702812","display_name":"Uttaranchal University","ror":"https://ror.org/00ba6pg24","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132702812"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Shikha Uniyal Gairola","raw_affiliation_strings":["Uttaranchal University,Dehradun,India,248007"],"affiliations":[{"raw_affiliation_string":"Uttaranchal University,Dehradun,India,248007","institution_ids":["https://openalex.org/I3132702812"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5049025305"],"corresponding_institution_ids":["https://openalex.org/I101407740"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20175195,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"51","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7958366870880127},{"id":"https://openalex.org/keywords/private-network","display_name":"Private network","score":0.7853876352310181},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6574828028678894},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5624030232429504},{"id":"https://openalex.org/keywords/enterprise-private-network","display_name":"Enterprise private network","score":0.5577051043510437},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5026540756225586},{"id":"https://openalex.org/keywords/tunneling-protocol","display_name":"Tunneling protocol","score":0.49790072441101074},{"id":"https://openalex.org/keywords/network-address","display_name":"Network address","score":0.45490723848342896},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.4516635239124298},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.45066770911216736},{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.44108232855796814},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.4319143295288086},{"id":"https://openalex.org/keywords/subnet","display_name":"Subnet","score":0.43118977546691895},{"id":"https://openalex.org/keywords/local-area-network","display_name":"Local area network","score":0.42723333835601807},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18832355737686157}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7958366870880127},{"id":"https://openalex.org/C117387248","wikidata":"https://www.wikidata.org/wiki/Q11186","display_name":"Private network","level":2,"score":0.7853876352310181},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6574828028678894},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5624030232429504},{"id":"https://openalex.org/C149859251","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Enterprise private network","level":2,"score":0.5577051043510437},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5026540756225586},{"id":"https://openalex.org/C76885553","wikidata":"https://www.wikidata.org/wiki/Q957589","display_name":"Tunneling protocol","level":4,"score":0.49790072441101074},{"id":"https://openalex.org/C2776599810","wikidata":"https://www.wikidata.org/wiki/Q4418000","display_name":"Network address","level":2,"score":0.45490723848342896},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.4516635239124298},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.45066770911216736},{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.44108232855796814},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.4319143295288086},{"id":"https://openalex.org/C21099817","wikidata":"https://www.wikidata.org/wiki/Q7631721","display_name":"Subnet","level":2,"score":0.43118977546691895},{"id":"https://openalex.org/C137471899","wikidata":"https://www.wikidata.org/wiki/Q11381","display_name":"Local area network","level":2,"score":0.42723333835601807},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18832355737686157}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccr56254.2022.9996015","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9996015","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2000621514","https://openalex.org/W2049533161","https://openalex.org/W2052454384","https://openalex.org/W2088506653","https://openalex.org/W2115416957","https://openalex.org/W2117016241","https://openalex.org/W2165190425","https://openalex.org/W2165464232","https://openalex.org/W2309535820","https://openalex.org/W2909726747","https://openalex.org/W2995485526","https://openalex.org/W3048149989","https://openalex.org/W3120125045","https://openalex.org/W3153101709","https://openalex.org/W3188013982","https://openalex.org/W4292622093"],"related_works":["https://openalex.org/W1957178914","https://openalex.org/W2364420495","https://openalex.org/W2292971014","https://openalex.org/W2367254319","https://openalex.org/W1529205706","https://openalex.org/W3091898511","https://openalex.org/W1760272954","https://openalex.org/W4231735021","https://openalex.org/W2565480447","https://openalex.org/W4313451615"],"abstract_inverted_index":{"A":[0,19],"VPN":[1,20,104,127,153,190,196],"is":[2,129],"a":[3,65,108,216,225],"virtual":[4],"private":[5,10,49,66,72],"network":[6,11,40,62,226],"that":[7,63,185],"extends":[8],"the":[9,13,16,23,29,34,38,48,52,54,60,124,144,159,182,192,205,221,235],"across":[12],"world":[14],"toward":[15],"public":[17,39],"network.":[18,50],"can":[21],"enable":[22],"user":[24],"to":[25,45,59,78,103,106,141,167,171],"send":[26],"and":[27,31,95,115,131,138,149,165,179,204],"receive":[28],"data":[30,36,176,232],"information":[32],"through":[33],"shared":[35],"from":[37,42,227],"when":[41],"one":[43],"device":[44],"another":[46],"over":[47,234],"Over":[51],"internet,":[53],"Virtual":[55],"Private":[56],"Network":[57],"refers":[58],"computer":[61],"uses":[64],"channel":[67],"for":[68,113,175],"IP":[69,73,83,200],"Addressing.":[70],"These":[71,82],"Addresses":[74,84],"are":[75,85,181],"not":[76],"allocated":[77],"any":[79],"specific":[80],"organization.":[81],"most":[86],"used":[87],"by":[88,229],"Local":[89],"area":[90,223],"devices":[91],"like":[92,191],"residential,":[93],"office,":[94],"many":[96],"organizations.":[97],"Lots":[98],"of":[99,126,152,162,189,194,224],"user's":[100],"worldwide":[101],"resort":[102],"clients":[105],"access":[107],"blocked":[109],"site,":[110],"more":[111],"generally":[112],"privacy":[114,180],"security":[116],"purpose.":[117],"In":[118],"this":[119],"paper,":[120],"we":[121],"first":[122],"analyze":[123],"fundamentals":[125],"it":[128],"working,":[130],"its":[132],"architecture.":[133],"We":[134],"perform":[135,172],"several":[136,187],"passive":[137],"active":[139],"measurements":[140],"know":[142],"about":[143],"accuracy,":[145],"behavior,":[146],"speed,":[147],"time,":[148],"traffic":[150,210],"manipulation":[151],"based":[154],"setup.":[155],"This":[156],"paper":[157],"holds":[158],"types,":[160],"classification":[161],"various":[163],"protocols,":[164],"router":[166,168],"connection":[169],"establishment":[170],"hidden":[173],"layers":[174],"transmission.":[177],"Security":[178],"main":[183],"issues":[184],"reveal":[186],"instances":[188],"use":[193],"insecure":[195],"tunneling":[197],"protocol,":[198],"default":[199],"address,":[201],"subnet":[202],"masks,":[203],"Domain":[206],"name":[207],"system":[208],"(DNS)":[209],"leakage.":[211],"The":[212],"Routing":[213],"technology":[214],"plays":[215],"very":[217],"important":[218],"role":[219],"in":[220],"huge":[222],"Universal":[228],"providing":[230],"secure":[231],"transmission":[233],"internet.":[236]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
