Download PDFOpen PDF in browserTunnel comparison between Generic Routing Encapsulation (GRE) and IP Security (IPSec)EasyChair Preprint 171210 pages•Date: October 18, 2019AbstractThe Internet growth has created a growing demand for security and privacy in the electronic communications channel. Networks have been used amongst home users, companies and organizations and most damages on the Network is due to lack of secured cyber security. If a Network is not protected or there are no measures put in place to protect the network, it will suffer from a lot of Network related attacks which will be instigated by unauthorized users (Hackers). Privacy and security and their important cannot be over emphasized, if internet interaction is to continue, the call for privacy and security required and has led to security body being established through policies and regulations. Internet attacks do not happen only in the form of hackers, there’s computer viruses, Trojan horses, Spyware, Malware, and Computer worms that can pose a risk to internet users. These attacks come in different forms and they can jeopardize a user’s privacy, which can expose sensitive information to the wrong or unauthorized user. There’s network attacks which can influence the speed of the internet for a home or office user, and there’s attacks which can intercept the message sent from an authorized user to another, such as like eavesdropping. To someone who’s internet savvy, internet security is of utmost importance because a lot of wrongful deeds can happen if there’s no security on the network. This paper report on the tunnel comparison between generic routing encapsulation (GRE) and internet protocol security (IPsec), and evaluate three tunnel simulation scenario and their capabilities for security and privacy measures. Keyphrases: Cyber Crime, Cyber Security, Cybercrime, Distributed Denial of Service, Eavesdropping, Hackers, Internet, Internet service provider., Malware, Open System Interconnection (OSI), Phishing, Transmission Control Protocol (TCP), Trojan horses
|