Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen

IP communication had gain increasing demand especially in the era where network convergences between various technologies involving peripherals and system architectures. While expanding the capability of the interconnect device, major works are being done in producing two biggest components which ar...

Full description

Bibliographic Details
Main Author: Sultan Suhaibuddeen, Mohamed Sulaiman
Format: Thesis
Language:English
Published: 2010
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/5510/
_version_ 1848802790836535296
author Sultan Suhaibuddeen, Mohamed Sulaiman
author_facet Sultan Suhaibuddeen, Mohamed Sulaiman
author_sort Sultan Suhaibuddeen, Mohamed Sulaiman
building UiTM Institutional Repository
collection Online Access
description IP communication had gain increasing demand especially in the era where network convergences between various technologies involving peripherals and system architectures. While expanding the capability of the interconnect device, major works are being done in producing two biggest components which are interoperability and backward capability. Security vulnerabilities are still become major consideration towards this move. Diverse security measures had been put in place to improve security entropy including the introduction of secure port services, better tunneling protocols and complex encryptions cryptography. Most of these works does not address the fundamental of the security risk which is to avoid newly discovered exploits and protect credential from man-in-middle attack. In this research network communication framework is being reviewed in finding and addressing essential risk in each building block. A generally well accepted opinion urged in order to improve security aspects of any system or protocol; it shall negatively impact both flexibility and speed, also being studied. An experimental work involving three types of existing environment, which include insecure connection as basis, against pre-shared key and PKI, are being modeled. The testing computers are connected via local area network, and readings are taken while the security parameters are gathered while performing various testing tools. The test subject being evaluated by streaming 60 seconds video while monitoring the CPU and network overheads. The result shows plain insecure connection uses the lowest and having the smallest network overheads, but the security attributes are very low compared to pre-shared key and PKI. This research aims to find a new method which can give CPU and network reading relatively close to the plain environment as well as maintaining high security data transmissions. In examining the result gathered in the experiments, and understanding the issues raised.
first_indexed 2025-11-14T21:28:57Z
format Thesis
id uitm-5510
institution Universiti Teknologi MARA
institution_category Local University
language English
last_indexed 2025-11-14T21:28:57Z
publishDate 2010
recordtype eprints
repository_type Digital Repository
spelling uitm-55102022-11-22T06:51:24Z https://ir.uitm.edu.my/id/eprint/5510/ Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen Sultan Suhaibuddeen, Mohamed Sulaiman System design Intrusion detection systems (Computer security). Computer network security. Hackers IP communication had gain increasing demand especially in the era where network convergences between various technologies involving peripherals and system architectures. While expanding the capability of the interconnect device, major works are being done in producing two biggest components which are interoperability and backward capability. Security vulnerabilities are still become major consideration towards this move. Diverse security measures had been put in place to improve security entropy including the introduction of secure port services, better tunneling protocols and complex encryptions cryptography. Most of these works does not address the fundamental of the security risk which is to avoid newly discovered exploits and protect credential from man-in-middle attack. In this research network communication framework is being reviewed in finding and addressing essential risk in each building block. A generally well accepted opinion urged in order to improve security aspects of any system or protocol; it shall negatively impact both flexibility and speed, also being studied. An experimental work involving three types of existing environment, which include insecure connection as basis, against pre-shared key and PKI, are being modeled. The testing computers are connected via local area network, and readings are taken while the security parameters are gathered while performing various testing tools. The test subject being evaluated by streaming 60 seconds video while monitoring the CPU and network overheads. The result shows plain insecure connection uses the lowest and having the smallest network overheads, but the security attributes are very low compared to pre-shared key and PKI. This research aims to find a new method which can give CPU and network reading relatively close to the plain environment as well as maintaining high security data transmissions. In examining the result gathered in the experiments, and understanding the issues raised. 2010 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/5510/1/TP_MOHAMED%20SULAIMAN%20SULTAN%20SUHAIBUDDEEN%20CS%2010_5%201.pdf Sultan Suhaibuddeen, Mohamed Sulaiman (2010) Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen. (2010) PhD thesis, thesis, Universiti Teknologi MARA.
spellingShingle System design
Intrusion detection systems (Computer security). Computer network security. Hackers
Sultan Suhaibuddeen, Mohamed Sulaiman
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
title Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
title_full Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
title_fullStr Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
title_full_unstemmed Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
title_short Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
title_sort evaluation of virtual private network employing secure on demand ip based connection (sedic) / mohamed sulaiman sultan suhaibuddeen
topic System design
Intrusion detection systems (Computer security). Computer network security. Hackers
url https://ir.uitm.edu.my/id/eprint/5510/