Siphon: Towards scalable high-interaction physical honeypots

JD Guarnizo, A Tambe, SS Bhunia, M Ochoa… - Proceedings of the 3rd …, 2017 - dl.acm.org
In recent years, the emerging Internet-of-Things (IoT) has led to rising concerns about the
security of networked embedded devices. In this work, we propose the SIPHON architecture …

[PDF][PDF] Study on virtual private network (VPN), VPN's protocols and security

KK Jyothi, BI Reddy - … Journal of Scientific Research in Computer …, 2018 - researchgate.net
When an access-desired network is constructed using public network infrastructure such as
global Internet to connect remote users or regional offices to company's private network is …

Extending kubernetes clusters to low-resource edge devices using virtual kubelets

T Goethals, F De Turck… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In recent years, containers have gained popularity as a lightweight virtualization technology.
This rise in popularity has gone hand in hand with the adoption of microservice …

Fledge: Kubernetes compatible container orchestration on low-resource edge devices

T Goethals, F De Turck, B Volckaert - International conference on internet …, 2019 - Springer
In recent years, containers have quickly gained popularity in the cloud, mostly thanks to their
scalable, ethereal and isolated nature. Simultaneously, edge devices have become …

A secure and distributed message oriented middleware for smart building applications

G Lilis, M Kayal - Automation in Construction, 2018 - Elsevier
In the era of the Internet of Things (IoT) and heterogeneous Information and Communication
Technology (ICT) systems, monolithic and proprietary Smart Building (SB) systems are …

Comparative analysis of site-to-site layer 2 virtual private networks

ST Aung, T Thein - 2020 IEEE Conference on Computer …, 2020 - ieeexplore.ieee.org
Nowadays, many companies have branch offices and connect those offices to the main
office over the Internet using a site-to-site Virtual Private Network connection. Most of these …

Scalability evaluation of VPN technologies for secure container networking

T Goethals, D Kerkhove, B Volckaert… - … on Network and …, 2019 - ieeexplore.ieee.org
For years, containers have been a popular choice for lightweight virtualization in the cloud.
With the rise of more powerful and flexible edge devices, container deployment strategies …

Dynamic setup of IPsec VPNs in service function chaining

H Gunleifsen, T Kemmerich, V Gkioulos - Computer Networks, 2019 - Elsevier
This article describes a novel mechanism for the automated establishment of dynamic
Virtual Private Networks (VPN) in the application domain of Network Function Virtualization …

A comparative study on virtual private networks for future industrial communication systems

T Lackorzynski, S Köpsell… - 2019 15th IEEE …, 2019 - ieeexplore.ieee.org
The future industrial networks will not be created from scratch. Rather, they will grow from
existing installations without displacing legacy components. The secure integration of these …

Performance comparison of VPN solutions

L Osswald, M Haeberle, M Menth - 2020 - tobias-lib.ub.uni-tuebingen.de
Virtual Private Networks (VPN) is the state-of-the-art method to build secure connections
between remote hosts over public networks. In times of high-speed connections to the …