{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:24:16Z","timestamp":1773156256582,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789811675966","type":"print"},{"value":"9789811675973","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-7597-3_36","type":"book-chapter","created":{"date-parts":[[2022,2,28]],"date-time":"2022-02-28T11:02:48Z","timestamp":1646046168000},"page":"433-444","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Evaluating Performances of\u00a0VPN Tunneling Protocols Based on\u00a0Application Service Requirements"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8304-3484","authenticated-orcid":false,"given":"Happy","family":"Akter","sequence":"first","affiliation":[]},{"given":"Sohely","family":"Jahan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2292-3829","authenticated-orcid":false,"given":"Sajeeb","family":"Saha","sequence":"additional","affiliation":[]},{"given":"Rahat Hossain","family":"Faisal","sequence":"additional","affiliation":[]},{"given":"Shariful","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,28]]},"reference":[{"key":"36_CR1","unstructured":"VPN Statistics. https:\/\/learn.g2.com\/vpn-statistics. Accessed 06 Jun 2021"},{"issue":"1","key":"36_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s10776-016-0330-3","volume":"24","author":"N Agrawal","year":"2017","unstructured":"Agrawal, N., Tapaswi, S.: The performance analysis of honeypot based intrusion detection system for wireless network. Int. J. Wirel. Inf. Netw. 24(1), 14\u201326 (2017)","journal-title":"Int. J. Wirel. Inf. Netw."},{"issue":"1","key":"36_CR3","first-page":"33","volume":"9","author":"MZ Ahmed","year":"2017","unstructured":"Ahmed, M.Z., AbdallahHashim, A.H., Khalifa, O.O., Salami, M.J.: Border gateway protocol to provide failover in multihoming environment. Int. J. Inf. Technol. 9(1), 33\u201339 (2017)","journal-title":"Int. J. Inf. Technol."},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Aung, S.T., Thein, T.: Comparative analysis of site-to-site layer 2 virtual private networks. In: 2020 IEEE Conference on Computer Applications (ICCA), pp.\u00a01\u20135. IEEE (2020)","DOI":"10.1109\/ICCA49400.2020.9022848"},{"issue":"2","key":"36_CR5","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s11235-019-00603-6","volume":"73","author":"A Bahnasse","year":"2020","unstructured":"Bahnasse, A., Talea, M., Badri, A., Louhab, F.E., Laafar, S.: Smart hybrid SDN approach for MPLS VPN management on digital environment. Telecommun. Syst. 73(2), 155\u2013169 (2020)","journal-title":"Telecommun. Syst."},{"issue":"3","key":"36_CR6","first-page":"87","volume":"17","author":"F Bensalah","year":"2017","unstructured":"Bensalah, F., El Kamoun, N., Bahnasse, A.: Evaluation of tunnel layer impact on VOIP performances (IP-MPLS-MPLS VPN-MPLS VPN IPSec). Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 17(3), 87 (2017)","journal-title":"Int. J. Comput. Sci. Netw. Secur. (IJCSNS)"},{"key":"36_CR7","unstructured":"Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security. Mc Graw Hill Education (India) Private Limited, New York (2015)"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Jahan, S., Rahman, M.S., Saha, S.: Application specific tunneling protocol selection for virtual private networks. In: 2017 International Conference on Networking, Systems and Security (NSysS), pp. 39\u201344. IEEE (2017)","DOI":"10.1109\/NSysS.2017.7885799"},{"key":"36_CR9","unstructured":"Kara, A., Suzuki, T., Takahashi, K., Yoshikawa, M.: A DoS-vulnerability analysis of L2TP-VPN. In: 4th International Conference on Computer and Information Technology, 2004 (CIT\u201904), pp. 397\u2013402. IEEE (2004)"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Kotuliak, I., Ryb\u00e1r, P., Tr\u00fachly, P.: Performance comparison of IPsec and TLS based VPN technologies. In: 2011 9th International Conference on Emerging eLearning Technologies and Applications (ICETA), pp. 217\u2013221. IEEE (2011)","DOI":"10.1109\/ICETA.2011.6112567"},{"key":"36_CR11","unstructured":"Kurose, J.F., Ross, K.W.: Computer Networking: A Top Down Approach, 6th edn. Google Scholar Digital Library (2012)"},{"key":"36_CR12","unstructured":"Osswald, L., Haeberle, M., Menth, M.: Performance comparison of VPN solutions (2020)"},{"key":"36_CR13","unstructured":"Pudelko, M., Emmerich, P., Gallenm\u00fcller, S., Carle, G.: Performance analysis of VPN gateways. In: 2020 IFIP Networking Conference (Networking), pp. 325\u2013333. IEEE (2020)"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Zhipeng, Z., Chandel, S., Jingyao, S., Shilin, Y., Yunnan, Y., Jingji, Z.: VPN: a boon or trap?: a comparative study of MPLS, IPSec, and SSL virtual private networks. In: 2018 2nd International Conference on Computing Methodologies and Communication (ICCMC), pp. 510\u2013515. IEEE (2018)","DOI":"10.1109\/ICCMC.2018.8487653"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Third International Conference on Trends in Computational and Cognitive Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-7597-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T14:12:54Z","timestamp":1659103974000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-7597-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811675966","9789811675973"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-7597-3_36","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"28 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}