Comparative analysis of VPN protocols Comparative analysis of VPN protocols
Article Sidebar
Open full text
Issue Vol. 27 (2023)
-
A comparative analysis of the measurement tools of fuel consumption in a passenger car
Karol Sawczuk, Jakub Grzesiak, Marcin Barszcz100-103
-
Comparative Analysis of Selected Programming Frameworks in terms of their Suitability for User Authentication and Authorization
Przemysław Rodzik104-111
-
Analysis of the Spring Boot and Spring Cloud in developing Java cloud applications
Mateusz Kozak112-120
-
PaaS platform comparison based on users feedback
Mateusz Saputa, Konrad Prządka, Jakub Smołka121-124
-
Comparative analysis of the availability of cinema websites, taking into account the principles of universal design
Hanna Boguta, Maria Skublewska-Paszkowska125-131
-
Comparison of shallow and deep learning methods of ECG signals clas-sification for arrhythmia detection
Dodon Turianto Nugrahadi, Rudy Herteno, Dwi Kartini, Muhammad Haekal, Mohammad Reza Faisal132-137
-
Comparative analysis of VPN protocols
Comparative analysis of VPN protocolsJerzy Antoniuk, Małgorzata Plechawska-Wójcik138-144 -
A comparison of word embedding-based extraction feature techniques and deep learning models of natural disaster messages classification
Mohammad Reza Faisal, Irwan Budiman, Friska Abadi, Muhammad Haekal, Dodon Turianto Nugrahadi145-153
-
Comparative analysis of frameworks and automation tools in terms of functionality and performance on the Salesforce CRM Platform
Damian Ciechan154-161
-
Influence of video content type on the usefulness of reinforcement learning algorithms in DASH systems
Przemyslaw Markiewicz, Sławomir Przyłucki162-170
-
Comparative analysis of data reading performance from the Salesforce platform using GraphQL, REST and SOAP interfaces
Ryszard Rogalski171-177
-
The analysis of Java ORM frameworks performance in terms of analytical data processing
Justyna Baran, Piotr Muryjas178-185
Main Article Content
DOI
Authors
Abstract
The aim of the study was to check the performance of the set-up internet connection using the three VPN protocols: Wireguard, OpenVPN and L2TP / IPSec. The Docker applications were used for the tests, on which the VPN server configuration file was launched. The containers were running on the Amazon server. The tests were performed on a laptop and a virtual machine with Windows 10 Pro. The virtual machine has been run in the Microsoft Azure cloud. The next step was to launch three docker containers and start performance tests using three tools: ping command, Speedtest-cli and Iperf3. The result of the research is the analysis of the measurement results and drawing conclusions.
Keywords:
References
B. Hoekstra, D. Musulin, J. J. Keijser, Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN, Universiteit Van Amsterdam, System & Network Engineering, Amsterdam (2011) 2010-2011.
C. A. Shue, M. Gupta, S. A. Myers, Ipsec: Performance analysis and enhancements, IEEE International Conference on Communications (2007) 1527-1532. DOI: https://doi.org/10.1109/ICC.2007.256
S. Y. Ammen., S. W. Nourildean, Firewall and VPN investigation on cloud computing performance, International Journal of Computer Science and Engineering Survey 5.2 (2014) 15. DOI: https://doi.org/10.5121/ijcses.2014.5202
M. Aamir, M. Zaidi, H. Mansoor, Performance Analysis of DiffServ based Quality of Service in a Multimedia Wired Network and VPN effect using OPNET, arXiv preprint rXiv:1206.5469 (2012).
M. Sabbagh, A. Anbarje, Evaluation of WireGuard and OpenVPN VPN solutions, 2020.
P. Dymora, M. Mazurek, T. Pilecki, Performance Analysis of VPN Remote Access Tunnels, Annales Universitatis Mariae Curie-Sklodowska sectio AI–Informatica 14.3 (2014) 53-64. DOI: https://doi.org/10.2478/umcsinfo-2014-0014
S. Ullah, J. Choi, H. Oh, IPsec for high speed network links: Performance analysis and enhancements, Future Generation Computer Systems 107 (2020) 112-125. DOI: https://doi.org/10.1016/j.future.2020.01.049
M. Pudelko, P. Emmerich, S. Gallenmüller, G. Carle, Performance Analysis of VPN Gateways, IFIP Networking Conference (Networking) (2020) 325-333.
D. Taneja, S. S. Tyagi, Factors Impacting the Performance of Data Transferred Via VPN, International Journal of Innovative Technology and Exploring Engineering 8 (2019) 2962-2966. DOI: https://doi.org/10.35940/ijitee.K2087.1081219
I. Coonjah, P. Clarel Catherine, K. M. S. Soyjaudah, Experimental performance comparison between TCP vs UDP tunnel using OpenVPN, 2015, International Conference on Computing Communication and Security IEEE (2015) 1-5. DOI: https://doi.org/10.1109/CCCS.2015.7374133
M. Sakib, J. Singh. Simulation Based Performance Analysis of IPSec VPN over IPv6 Networks, International Journal of Electronics and Information Engineering 12.2 (2020) 92-104.
S. Mackey, I, Mihov, Alex Nosenko, F. Vega, Y. Cheng, A Performance Comparison of WireGuard and OpenVPN, Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy (2020) 162-164. DOI: https://doi.org/10.1145/3374664.3379532
E. Danilova, Comparing the performance of different VPN technologies with TLS/SSL, 2015.
K. S. Munasinghe, VPN over a wireless infrastructure: evaluation and performance analysis. Diss, University of Western Sydney, 2005.
I. Kotuliak, P. Rybár, P. Trúchly, Performance comparison of IPsec and TLS based VPN technologies, 9th International Conference on Emerging eLearning Technologies and Applications IEEE (2011) 217-221. DOI: https://doi.org/10.1109/ICETA.2011.6112567
J. Ronan, S. Davy, J. Rossebo, An Analysis of IPsec Deployment Performance in High and Low Power Devices, (2004).
R. Munadi, D. D. Sanjoyo, D. Perdana, F. Adjie, Performance analysis of tunnel broker through open virtual private network, Telkomnika 17.3 (2019) 1185-1192. DOI: https://doi.org/10.12928/telkomnika.v17i3.12231
S. Padhiar, Sneha, P. Verma, A Survey on Performance Evaluation of VPN, International Journal of Engineering Development and Research 3.4 (2015) 516-519.
R. Malik, R. Syal, Performance analysis of ip security vpn, International Journal of Computer Applications 8.4 (2010) 0975. DOI: https://doi.org/10.5120/1202-1393
N. Lewis, Memory forensics and the windows subsystem for linux, Digital Investigation 26 (2018) S3-S11. DOI: https://doi.org/10.1016/j.diin.2018.04.018
Article Details
Abstract views: 1035
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
