Computer Science ›› 2024, Vol. 51 ›› Issue (9): 357-364.doi: 10.11896/jsjkx.240200062
• Computer Network • Previous Articles Next Articles
TAO Zhiyong1,2, YANG Wangdong2
CLC Number:
[1]HAI P N P,HONG H N,QUOC B B,et al.A Comparative Research on VPN Technologies on Operating System for Routers[C]//2021 International Conference on Advanced Technologies for Communications(ATC).IEEE,2021:89-93. [2]JUMA M,MONEM A A,SHAALAN K.Hybrid end-to-endVPN security approach for smart IoT objects[J].Journal of Network and Computer Applications,2020,158:102598. [3]ESPER D A,DATTA S,ROY M.Implementing Protection on Internal Networks using IPSec Protocol[C]//2022 8th International Conference on Advanced Computing and Communication Systems(ICACCS).IEEE,2022,1:378-383. [4]OJHA P D,HANSDAH R C.A Heuristic Approach to Detect MPLS L3 VPN Misconfiguration in Multi-Homed Multi-VRF Site-Redundant CE Environments[J].IEEE Transactions on Network and Service Management,2020,18(2):2294-2307. [5]SLLAME A M.Performance Evaluation of Multimedia overMPLS VPN and IPSec Networks[C]//2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering(MI-STA).IEEE,2022:32-37. [6]YAN J,LI F.Application of Network Security in Data CenterBased on Private Cloud[C]//2023 5th International Conference on Decision Science & Management(ICDSM).IEEE,2023:178-183. [7]GAO Y.Newenergy vehicle engine speed control method based on vehicle networking technology[J].Journal of Computational Methods in Sciences and Engineering,2022,22(6):2201-2215. [8]VARVELLO M,AZURMENDI I Q,NAPPA A,et al.VPN-zero:a privacy-preserving decentralized virtual private network[C]//2021 IFIP Networking Conference(IFIP Networking).IEEE,2021:1-6. [9]XIE Y,ZHANG C,HE X,et al.Application research of meteoro-logical virtual private network security remote access technology[C]//2023 IEEE 6th Information Technology,Networking,Electronic and Automation Control Conference(ITNEC).IEEE,2023,6:423-426. [10]LIN Q L,HU X M,LI P.Under the epidemic situation,we networking technology research on large-scale live broadcast tea-ching [J].Computer Technology and Development,2021,31(6):140-145. [11]AMALDEEP S,SANKARAN S.Cross Protocol Attack on IPSec-based VPN[C]//2023 11th International Symposium on Digital Forensics and Security(ISDFS).IEEE,2023:1-6. [12]HE W,ZHAO Y,LIU Z,et al.Design of Dual-link Shared GRE over IPSec VPN on P2MP Networks[C]//2023 IEEE 3rd International Conference on Power,Electronics and Computer Applications(ICPECA).IEEE,2023:1781-1783. [13]AMALDEEP S,SANKARAN S.Cross Protocol Attack on IPSec-based VPN[C]//2023 11th International Symposium on Digital Forensics and Security(ISDFS).IEEE,2023:1-6. [14]KOMALA C R,HEMA M,GOYAL H R,et al.PerformanceEvaluation of VPNS over MPLS-Linux Networks[C]//2023 International Conference on Advances in Computing,Communication and Applied Informatics(ACCAI).IEEE,2023:1-7. [15]LI Y F.Based on BGP MPLS VPN Cross-the-domain GroupSimulation Design [J].Laboratory Research and Exploration,2021,40(3):121-128. [16]LI F,SHEN H T,SHI L,et al.A mpls-based power line carrier communication can distinguish the fault recovery mechanism [J].The Journal of Tailhrtz Science and Electronic Information,2023,21(8):997-1001. [17]QURESHI K N,AHMAD E,ANWAR M,et al.Network functions virtualization for mobile core and heterogeneous cellular networks[J].Wireless Personal Communications,2022,122(3):2543-2559. [18]JAFF A.Software Defined Networking Automation Using Open-Daylight and Network Virtualization for security and scalability:A network enterprise case[C]//ITM Web of Conferences.EDP Sciences,2022,42:01014. [19]EMMANUEL T,MICHEL D D E,AGBOR E O B.Virtualization of a 4G Evolved Packet Core Network Using Network Function Virtualization(NFV) Technology with NS3 for Enterprise and Educational Purpose[J].American Journal of Networks and Communications,2024,13(1):1-18. [20]SALAGRAMA S,BIBHU V.Study of it and data center virtua-lization[C]//2022 2nd International Conference on Innovative Practices in Technology and Management(ICIPTM).IEEE,2022,2:274-278. |
[1] | TAO Zhiyong, ZHANG Jin, YANG Wangdong. Solution to Cross-domain VPN Based on Virtualization [J]. Computer Science, 2023, 50(9): 357-362. |
[2] | CHEN Yiyang, WANG Xiaoning, LU Shasha, XIAO Haili. Survey of Container Technology for High-performance Computing System [J]. Computer Science, 2023, 50(2): 353-363. |
[3] | TIAN Chenjing, XIE Jun, CAO Haotong, LUO Xijian, LIU Yaqun. Research Developments of 5G Network Slicing [J]. Computer Science, 2023, 50(11): 282-295. |
[4] | CHEN Gang, MENG Xiang-ru, KANG Qiao-yan, ZHAI Dong. vSDN Fault Recovery Algorithm Based on Minimum Spanning Tree [J]. Computer Science, 2022, 49(11A): 211200034-7. |
[5] | TAO Zhi-yong, ZHANG Jin, YANG Wang-dong, CHEN Wei-man. Study on Performance Optimization of Edge Devices Based on Two-layer Virtualization [J]. Computer Science, 2021, 48(11): 372-377. |
[6] | SU Chang, ZHANG Ding-quan, XIE Xian-zhong, TAN Ya. NFV Memory Resource Management in 5G Communication Network [J]. Computer Science, 2020, 47(9): 246-251. |
[7] | ZHU Guo-hui, ZHANG Yin, LIU Xiu-xia, SUN Tian-ao. Energy Efficient Virtual Network Mapping Algorithms Based on Node Topology Awareness [J]. Computer Science, 2020, 47(9): 270-274. |
[8] | WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254. |
[9] | LI Peng-fei, CHEN Ming, DENG Li, QIAN Hong-yan. NFV Based Detection Method Against Double LSAs Attack on OSPF Protocol [J]. Computer Science, 2019, 46(6A): 343-347. |
[10] | CHEN Hao, LUO Lei, LI Yun, CHEN Li-rong. Study on Formal Verification of Secure Virtual Machine Monitor [J]. Computer Science, 2019, 46(3): 170-179. |
[11] | MA Xiao-jin, RAO Guo-bin, XU Hua-hu. Research on Task Scheduling in Cloud Computing [J]. Computer Science, 2019, 46(3): 1-8. |
[12] | XUE Hao, CHEN Ming, QIAN Hong-yan. NFV-based Mechanism to Guard Against UDP Control Packet Redundancy in SDN Controller [J]. Computer Science, 2019, 46(10): 135-140. |
[13] | ZHUANG Xiao-zhao, WAN Ji-guang, ZHANG Yi-wen, QU Xiao-yang. Energy Consumption Optimization Scheme for New Energy-driven Storage System [J]. Computer Science, 2018, 45(7): 66-72. |
[14] | LI Zhen-tao, MENG Xiang-ru , ZHAO Zhi-yuan, SU Yu-ze. Virtual Network Reconfiguration Algorithm for Nodes Load Balancing [J]. Computer Science, 2018, 45(7): 95-98. |
[15] | TANG Hong-mei and ZHENG Gang. Design and Optimization on Virtual Desktop Infrastructure Based on KVM [J]. Computer Science, 2017, 44(Z6): 560-562. |
|