Literature Review
- Introduction and Motivation 1-2 para. This paper is mainly about security of commercial VPN. As the internet grows and Virtual Private Network is an important technique and had risen significantly especially after the breakout of pandemic when working remotely was necessary for companies. Generally, VPN is mostly used when users want to pass some blocks or change their IP addresses, or employees need to connect to networks of their institutions. However, as the VPN are widely used, problems came along with the growth. The first VPN model was developed by Microsoft back in 1996. At that point, VPN was used by companies so that employees could get access to self-owned data safely. The basic idea is packing the origin data in a new header and when it’s received, it will be unpacked through a protocol, which receiver and sender had agreed on. Later some of the VPN users started using VPN to get across some blocks or firewall. Most of these users are facing many challenges. Given the incidents happened years ago such as ExpressVPN and NordVPN. Researchers and public began to look at privacy risks in using the VPN. Imagine a situation when you are quarenteened, but need to get access to networks of company to retrieve some unpublic data. Normally employees need to connect to Wi-Fi in their company and acquire data. Currently, most of papers focus on performance of VPN while ignoring privacy risks. Commercial VPN products can be seen everywhere. That’s why researches related to privacy and security should be conducted not only to regulate this field if commerce but also rise consumer’s awareness of protecting their own privacy.
1.1Research Field Challenges 1 para Currently, most papers focus either on performance or security of VPN. That’s why researches related to Privacy and security have always been the first consideration. 1.2 Survey Scope 1-2 para which tpoic included which are not
-
https://doi.org/10.1007/978-3-030-35055-0_7 Client-Side Vulnerabilities in Commercial VPNs
-
10.14722/ndss.2022.24285 VPNalyzer: Systematic Investigation of the VPN Ecosystem
-
DOI:10.3991/ijim.v14i18.16507 Comparison of VPN Protocols at Network Layer Focusing on Wire Guard Protocol
-
https://doi.org/10.1145/3407023.3407029 Investigation into the security and privacy of iOS VPN applications
-
10.1109/WFCS.2019.8758010 A Comparative Study on Virtual Private Networks for Future Industrial Communication Systems
-
https://doi.org/10.1145/3278532.3278570 An Empirical Analysis of the Commercial VPN Ecosystem
-
10.1109/ELTECH.2019.8839611 Performance Evaluation of VPN with Different Network Topologies
-
https://doi.org/10.1145/3579162 Security Assessment and Evaluation of VPNs: A Comprehensive Survey
-
10.5120/ijca2019918592 Performance Evaluation of IPSEC-VPN on Debian Linux Environment
-
10.1109/NSysS.2017.7885799, Application Specific Tunneling Protocol Selection for Virtual Private Networks 1.3 Search Methodology 1-2 para After having a chat with Prof. Xavier, I was told to come up with a specific idea about what to do and what outcome we are looking at, because he had no concrete idea neither at that point. 1.4 Classification of Literature and Organization Case study: Controlled User Study: An Empirical Analysis of the Commercial VPN Ecosystem,
-
Paper Summaries 1 para for each paper 2.1Subsection of Paper Summaries If your papers fall into different sub categories according to your classification described in Section 1.4