This paper propose method to solve the security problems of establishing trust zone which is changed by security policy in large scale networks containing multiple VPNs. Therefore, we surveyed the vulnerability of VPN technologies and it analysis various models suitable for trust zone. By simulations of various models, we have the cascade perimeter defence policy model having the merit as such an efficient transit cost and the strictly isolation for trust zone. This model can protect the trust zone from the public network by dividing the trust zone according to each VPN group and it shows the better transit performance by cascading the position of perimeter defence policy.
[1]
Ross W. Callon,et al.
A Framework for Layer 3 Provider-Provisioned Virtual Private Networks (PPVPNs)
,
2005,
RFC.
[2]
D. M. Goldschlag,et al.
Security issues in networks with Internet access
,
1997
.
[3]
Dorothy E. Denning,et al.
An Intrusion-Detection Model
,
1987,
IEEE Transactions on Software Engineering.
[4]
Hamid Ould-Brahim.
Network based IP VPN Architecture Using Virtual Routers
,
2006
.
[5]
Antonio Laganà,et al.
Bond Order Potentials for a priori Simulations of Polyatomic Reactions
,
2004,
ICCSA.