Ning Hu1, Ling Liu1, Xin Liu3, Kaijun Wu2, Yue Zhao2,*
CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2743-2759, 2023, DOI:10.32604/cmes.2023.026939
- 03 August 2023
Abstract With the widespread application of cloud computing and network virtualization technologies, more and more
enterprise applications are directly deployed in the cloud. However, the traditional TCP/IP network transmission
model does not fully consider the information security issues caused by the uncontrollable internet environment.
Network security communication solutions represented by encrypted virtual private networks (VPN) are facing
multiple security threats. In fact, during the communication process, the user application needs to protect not
only the content of the communication but also the behavior of the communication, such as the communication
relationship, the communication protocol, and so… More >