Skip to main content

Perimeter Defence Policy Model of Cascade MPLS VPN Networks

  • Conference paper
Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Included in the following conference series:

Abstract

This paper propose method to solve the security problems of establishing trust zone which is changed by security policy in large scale networks containing multiple VPNs. Therefore, we surveyed the vulnerability of VPN technologies and it analysis various models suitable for trust zone. By simulations of various models, we have the cascade perimeter defence policy model having the merit as such an efficient transit cost and the strictly isolation for trust zone. This model can protect the trust zone from the public network by dividing the trust zone according to each VPN group and it shows the better transit performance by cascading the position of perimeter defence policy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Landwehr, Goldschlag: Security Issues in Networks with Internet Access. Proc. IEEE 85(12) (December 1997)

    Google Scholar 

  2. Denning, D.E.: Intrusion Detection Model. IEEE Transactions on Software Engineering SE-13, 222–232 (1987)

    Article  Google Scholar 

  3. Jae-Woo, Y., Seung-Hyung, L.: The research trend of IP-based VPN Protocol: Scalability and Security”, Korea Institute of Information Security & Cryptology. Journal of Information Security & Cryptology 11(6), 43–53 (2001)

    Google Scholar 

  4. http://rr.sans.org/encryption/mpls2.php

  5. Frame Relay Forum, The Path to MPLS, WAVESMITH NETWORK, white paper (2001)

    Google Scholar 

  6. Knight, P., Gleeson, B.: Network based IP VPN Architecture using Virtual Routers, IETF Internet Draft Provider Provisioned VPN WG (JULY 2002)

    Google Scholar 

  7. Nagarajan, A.: Generic Requirements for Provider Provisioned VPN, IETF Internet Draft Provider Provisioned VPN WG (December 2002)

    Google Scholar 

  8. ITU-T, Recommendation Y.1331, Network Based VPNs - Generic Architecture and Service Requirements, ITU-T (2002)

    Google Scholar 

  9. Behringer, M.: Analysis of the Security of the MPLS Architecture, IETF Internet Draft Provider Provisioned VPN WG (October 2002)

    Google Scholar 

  10. Callon, R., Suzuki, M.: A Framework for Layer 3 Provider Provisioned Virtual Private Networks, IETF Internet Draft Provider Provisioned VPN WG, October(2002)

    Google Scholar 

  11. http://www.acm.org/crossroads/xrds2-4/intrus.html

  12. http://staff.Washington.edu/gray/papers/credo.html

  13. ITU-T Recommendation Y.1311-1, Network Based IP VPN over MPLS architecture, ITU-T (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Na, W.S., Kim, J.G., Ryoo, I. (2004). Perimeter Defence Policy Model of Cascade MPLS VPN Networks. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_115

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_115

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics