Information 15 00734 v2
Information 15 00734 v2
Abstract: Modern organizations have migrated from localized physical offices to work-from-home
environments. This surge in remote work culture has exponentially increased the demand for and
usage of Virtual Private Networks (VPNs), which permit remote employees to access corporate offices
effectively. However, the technology raises concerns, including security threats, latency, throughput,
and scalability, among others. These newer-generation threats are more complex and frequent,
which makes the legacy approach to security ineffective. This research paper gives an overview
of contemporary technologies used across enterprises, including the VPNs, Zero Trust Network
Access (ZTNA), proxy servers, Secure Shell (SSH) tunnels, the software-defined wide area network
(SD-WAN), and Secure Access Service Edge (SASE). This paper also presents a comprehensive
cybersecurity framework named Zero Trust VPN (ZT-VPN), which is a VPN solution based on Zero
Citation: Zohaib, S.M.; Sajjad, S.M.; Trust principles. The proposed framework aims to enhance IT security and privacy for modern
Iqbal, Z.; Yousaf, M.; Haseeb, M.; enterprises in remote work environments and address concerns of latency, throughput, scalability,
Muhammad, Z. Zero Trust VPN and security. Finally, this paper demonstrates the effectiveness of the proposed framework in various
(ZT-VPN): A Systematic Literature enterprise scenarios, highlighting its ability to prevent data leaks, manage access permissions, and
Review and Cybersecurity provide seamless security transitions. The findings underscore the importance of adopting ZT-VPN
Framework for Hybrid and Remote to fortify cybersecurity frameworks, offering an effective protection tool against contemporary cyber
Work. Information 2024, 15, 734.
threats. This research serves as a valuable reference for organizations aiming to enhance their security
https://doi.org/10.3390/info15110734
posture in an increasingly hostile threat landscape.
Academic Editor: Willy Susilo
Keywords: zero trust architecture (ZTA); virtual private network (VPN); security and privacy;
Received: 30 September 2024
enterprise security; security services; secure remote access
Revised: 11 November 2024
Accepted: 12 November 2024
Published: 17 November 2024
1. Introduction
Network infrastructures serve as the backbone of communication and information
Copyright: © 2024 by the authors.
exchange. They facilitate the seamless flow of data, enabling organizations and individuals
Licensee MDPI, Basel, Switzerland.
to access resources, collaborate, and conduct business efficiently [1,2]. However, the
This article is an open access article
increasing reliance on networks has also attracted malicious actors who seek to exploit
distributed under the terms and
vulnerabilities and disrupt operations for various purposes, ranging from financial gain
conditions of the Creative Commons
to espionage or activism [3]. As a result, understanding network attacks and developing
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
effective defense mechanisms has become paramount in maintaining the security and
4.0/).
integrity of network infrastructures [4].
Even with advancements in technology, there are many scams targeting businesses;
for example, phishing remains the most common form of cyberattack, accounting for 90%
of data breaches [5]. In 2023, 343,338,964 people were the targets of 2365 cyberattacks.
Data breaches increased by 72% in 2023 compared to the previous record-holding year,
2021 [6,7]. Surprisingly, 96% of these phishing attacks were delivered via email. In 2023,
a staggering 72.7% of organizations experienced a phishing attack [8]. Similarly, another
major cyberattack is ransomware [9]. The costs associated with ransomware are expected
to climb to USD 265 billion annually by 2031. In 2023, the average cost of a data breach
saw a 15% rise over the previous three years, reaching USD 4.45 million on a worldwide
scale [10,11]. Pay-outs were greatest in the US, at USD 5.09 million per breach [12–14].
Cyber insurance premiums in the US saw a 50% hike in 2022, with premiums collected
amounting to USD 7.2 billion [15]. Over 75% of targeted attacks initiate from an email,
with 94% of malware being delivered through this channel. Cybercrime costs are on a
steep rise, expected to reach USD 10.5 trillion annually by 2025, marking a 15% yearly
increase [16,17]. Cybercrime rates increased by 600% during the COVID-19 pandemic,
illustrating how dangers have adjusted to new global circumstances [18]. On average,
a data breach costs about USD 4.45 million. Approximately 35% of malware in 2023
was sent by email, making it the most frequent vector for malware [19,20]. Protecting
an organization and understanding the motives behind these attacks is important; these
help in assessing the potential impact on network security and identifying appropriate
mitigation strategies [21]. It is also equally important to access the network’s devices
and perform a security assessment of IT products [22]. Attacks like Denial of Service
(DoS) try to block legitimate users from accessing resources or services on a network by
overwhelming them [23,24]. These attacks can sabotage an organization and affect network
availability [25].
Nowadays, organizations rely on remote work technology and use a variety of tech-
nologies to access their organizational networks [26]. For example, a VPN allows for the
safe transfer of data and other types of information between remote locations. One or more
VPN devices that the user connects to via their web browser make up an SSL VPN [27]. It
uses encryption for data transfer and operates at the application layer [28]. Cryptography
ensures transport-level secrecy, whereas SSL offers encrypted public keys for key manage-
ment and authentication [29,30]. By encrypting data in transit, it protects the connection
between the client and the resource. No data are sent over the internet or internal networks
in plain text when end-to-end security is used. Every step, from the customer to the vendor,
is encrypted and verified for security [31].
Despite this enormous and ubiquitous usage, VPNs come with various security chal-
lenges and performance-related issues, thereby hindering users from taking maximum
advantage of this technology [32,33]. One potential downside of relying only on VPNs is
that they treat all users as trustworthy and give them unrestricted access to the network. To
address this concern, VPN users must choose the most secure and perfect VPN solution for
the smooth functioning of daily activities [34,35]. Similarly, the traditional “castle and moat
approach” of security is insufficient in light of the new age of evolving attacks along with
the growing trend of working from home [36]. Therefore, VPNs are becoming fundamental
in defending today’s network architectures and allowing remote access [37,38].
For a long time, VPNs have been employed to create safe and exclusive communica-
tions in a generally accessible network. VPNs comprise encryption and tunneling protocols,
therefore forming a more secure virtual network overlaying an insecure network infras-
tructure [39,40]. VPNs can be used for access privilege, confidential data integrity, and
authentication when connecting remote and geographically disjointed networks [41,42]. On
the other hand, conventional telecom architecture and, particularly, physically configured
and hard-wired networks, accompanied by typical perimeters of protection, have failed to
cope with ever-changing cyber threats.
Nonetheless, the old paradigm of perimetral security has been replaced with Zero
Trust Network Access (ZTNA) due to the dynamics of threat and the necessity of a more
Information 2024, 15, 734 3 of 25
accurate and dynamic security model [43,44]. It is a security model that verifies users
and devices before granting access to applications or resources. ZTNA is based on the
principle of “never trust, always verify” and is designed to reduce the attack surface area
and improve security posture [45]. Some assumptions are made by pneumonic; firstly,
the model narrows down its view in the network and regards each user and device both
within and outside the network as hostile; therefore, each one has to be and should be
authentically and authoritatively authorized by the network each time it wants to access
the network’s products [46–48]. This shift in mentality is important in combating newer
and more advanced attacks that use vulnerabilities and lateral movement in the network.
The use of both VPNs and ZTNA could provide a robust solution for the remote access
problem and the protection of networks [49,50].
The possibility of merging VPN and ZTNA technology can give promising solutions
to industrial security accorded by end-device identity, context, and, most importantly,
the principle of least privilege to use the network resources. This integration allows
organizations to apply tighter security measures to limit the attack vector and safeguard
the data. Hence, the purpose of this article is to discuss and identify how to use VPNs
to establish Zero Trust Network Access. Thus, the goal of familiarizing ourselves with
the concepts and principles is to create patterns, standards, and recommendations for
organizations that are trying to implement a safe and efficient remote access solution.
Furthermore, we discuss the issues, implications, and possible drawbacks of combining
and offering case study analyses. Taken in their entirety, these two approaches present a
clear promise, in terms of conceptual development, of effectively conquering the security
vulnerabilities that threaten organizations at present. Hence, this article endeavors to
offer some insights and real-life best practices for organizations that are aspiring to have
strong and fortified network security that incorporates the use of VPNs and ZTNA for the
attainment of secure remote access. This article discusses and analyzes various categories
of network attacks, their features, and the impact they could have on current networks.
We hope that by the end of this research, we will be in a position to add to the body of
knowledge on how VPNs and ZTNA can complement each other, thus reinforcing network
security and offering secure access to remote resources. The key contributions of the
research are as follows:
1. This research paper gives an overview of contemporary technologies used across
enterprises, including VPNs and ZTNA, proxy servers, Secure Shell (SSH) tunnels,
the software-defined wide area network (SD-WAN), and Secure Access Service Edge
(SASE), among others.
2. This paper identifies critical concerns associated with traditional technologies, in-
cluding latency, throughput, scalability, and cyber threats, and identifies the gap to
overcome these challenges.
3. This paper presents a novel Zero Trust VPN (ZT-VPN) framework that integrates Zero
Trust Network Access with virtual private networks to create a robust cybersecurity
framework for remote work environments, aiming to fortify modern enterprises’
cybersecurity and privacy.
4. Finally, this paper demonstrates the effectiveness of the ZT-VPN framework through
various enterprise scenarios, highlighting its ability to prevent data leaks, manage
access permissions, and provide seamless security transitions, thereby fortifying
cybersecurity frameworks against contemporary cyber threats.
The organization of this paper is structured as follows: The Introduction (Section 1)
provides an overview of the shift to remote work environments and the associated cyber-
security challenges. The Background—Related Work and Systematic Literature Review—
Methodology (Sections 2 and 3) review contemporary technologies and existing research in
the field. The Proposed Framework (Section 4) details the design and architecture of the
Zero Trust VPN (ZT-VPN) framework, including examples of implementation case stud-
ies. The Results and Evaluation (Section 5) presents the findings from various enterprise
scenarios, accompanied by a discussion of the results and acknowledgment of limitations.
Information 2024, 15, 734 4 of 25
Finally, the Conclusion and Future Work (Section 6) summarizes the key contributions of
the research and outlines potential directions for future studies.
2. Background—Related Work
The purpose of this section is to provide a comprehensive review of existing tech-
nologies and research relevant to the topic of this paper. This section sets the context for
the proposed framework by discussing contemporary technologies. It also highlights the
limitations and challenges of current approaches, thereby establishing the need for the
proposed ZT-VPN framework. By reviewing related work, this section helps to position
the research within the broader field of cybersecurity and demonstrates how the proposed
framework builds upon and advances existing knowledge.
Figure 1. Illustration of VPN functionality, demonstrating encrypted traffic flow for enhanced data
security and user privacy across public networks.
Figure 2. Zero Trust Network Access (ZTNA) framework, showing the continuous verification
process that ensures secure access based on identity, context, and device compliance.
Table 1 provides an overview of and shows the differences between the VPN and
ZTNA. As we can see from the table, ZTNA is well suited for modern, dynamic envi-
ronments, including remote work and cloud-based applications. It can easily scale to
accommodate growing and changing organizational needs. ZTNA’s micro-segmentation
and least-privilege access policies help contain potential breaches, preventing attackers
from moving laterally within the network and accessing sensitive data [56,57]. By re-
quiring continuous verification and limiting access based on identity and context, ZTNA
Information 2024, 15, 734 6 of 25
significantly reduces the attack surface and improves the overall security posture. ZTNA
provides detailed insights into user and device activity, allowing organizations to detect
and respond to threats more effectively. This visibility also helps ensure compliance with
regulatory requirements.
Table 1. Comparative analysis of the VPN and ZTNA, highlighting differences in trust models, access
security, performance, and deployment complexity.
1. When a client requests a resource, the request is first sent to the proxy server. The
proxy server then forwards the request to the target server on behalf of the client.
Once the target server responds, the proxy server sends the response back to the client.
This process adds a layer of separation between the client and the target server.
2. Proxy servers can hide the client’s IP address by replacing it with their own. This
helps protect the client’s identity and location, providing a layer of anonymity.
3. Proxy servers can cache frequently requested resources. When a client requests
a resource that is already cached, the proxy server can deliver it directly from its
cache, reducing the time and bandwidth required to retrieve the resource from the
target server.
1. SASE integrates networking functions, like a software-defined wide area network (SD-
WAN), with security services, including Secure Web Gateway (SWG), Cloud Access
Security Broker (CASB), Firewall as a Service (FWaaS), and Zero Trust Network Access
(ZTNA). This convergence allows for a more streamlined and efficient approach to
managing and securing network traffic [67].
2. SASE is built on a cloud-native architecture, meaning that both the networking and
security functions are delivered as cloud services. This allows for greater scalability,
flexibility, and ease of deployment compared to traditional on-premises solutions.
3. SASE grants access based on the identity of users and devices rather than relying on the
traditional perimeter-based security model. This ensures that only authenticated and
authorized users can access specific applications and resources, enhancing security.
4. SASE solutions are globally distributed, meaning that they have points of presence
(PoPs) around the world. This ensures that users can securely access applications and
resources with low latency, regardless of their geographic location.
Table 2 provides a comparison of different network security and access technologies.
We can see that a VPN creates a secure and encrypted connection over the internet, allowing
users to access corporate networks remotely. However, traditional VPNs grant broad access
to the entire network once authenticated, which can pose security risks. In contrast, ZTNA
operates on the principle of “never trust, always verify,” continuously verifying every
user and device attempting to access resources. ZTNA provides granular access control,
granting users access only to specific applications and resources based on their identity
and context, thereby reducing the attack surface and enhancing security.
Proxy servers act as intermediaries between clients and the internet, masking the
client’s IP address and providing anonymity. They can cache frequently requested content
to improve performance but do not offer the same level of encryption and security as
VPNs or ZTNA. SSH tunnels provide secure communication for specific applications
by transporting data over an encrypted SSH connection, ensuring data protection even
over unsecured networks. An SD-WAN optimizes network performance by dynamically
selecting the best path for traffic and providing centralized management. Each technology
has its unique strengths and uses cases, making each suitable for different network and
security requirements. VPNs and ZTNA focus on secure remote access, with ZTNA
providing more granular control. Proxy servers offer anonymity and content filtering,
while SSH tunnels secure specific application communications. An SD-WAN enhances
network performance and scalability, and SASE provides a comprehensive, cloud-based
solution for modern enterprises.
Information 2024, 15, 734 9 of 25
Table 2. Overview of various network security and access technologies, comparing attributes of
scalability, use case suitability, and security models across VPN, ZTNA, proxy servers, SSH tunnels,
SD-WAN, and SASE.
that did not meet the criteria for Methodological Evaluation Score (MES) assessment.
This step excluded 65 papers, narrowing down the selection to 117. The second
eligibility check involved a closer reading of the main bodies of the remaining articles,
with an emphasis on applying MES assessment criteria. This step led to the exclusion
of an additional 31 articles, resulting in 86 studies that met all eligibility requirements.
4. Inclusion phase: Finally, in the inclusion phase, the remaining 86 studies were in-
cluded in the final MES analysis, representing the highest-quality and most relevant
articles for this systematic literature review. These studies formed the basis for the
in-depth analysis and synthesis presented in this paper.
Figure 3. Systematic literature review (SLR) methodology for selecting and filtering articles related to
Zero Trust VPN and cybersecurity frameworks.
Literature Review
Our literature review focused on existing research on Zero Trust security frameworks,
VPN, and ZTNA. The focus was on scalability, access control, performance, and iden-
tity verification across various network settings. To ensure a robust and comprehensive
understanding, we defined a focused scope, prioritizing academic articles, industry re-
Information 2024, 15, 734 11 of 25
ports, and foundational frameworks that engage directly with Zero Trust principles, their
implementation challenges, and their efficacy.
The search process involved Google Scholar databases. The search query was com-
posed of terms including “Zero Trust Network Access (ZTNA)”, “VPN security challenges”,
“Zero Trust architecture”, “data-centric security”, and “identity-based access control”. We concen-
trated on works from the last decade to capture the most relevant contemporary cybersecu-
rity articles, with some exceptions for foundational studies. Our inclusion criteria targeted
studies covering one or more of the following areas: Zero Trust frameworks across environ-
ments, ZTNA and VPN comparisons (in terms of performance, scalability, and usability),
and Zero Trust implementations with a focus on access control, identity verification, and
continuous monitoring. Studies focused solely on general network security without Zero
Trust concepts or theoretical models lacking practical applications were excluded.
In analyzing the literature, we categorized studies by key themes, including access
control mechanisms, scalability, hybrid network challenges, data-centric security, usability,
and continuous monitoring. We organized each study’s main contributions using a com-
parative framework to maintain consistency in our analysis. Key findings, methodologies,
and challenges from each study were extracted, particularly regarding their applicability to
the ZT-VPN framework. Zero trust is a security architecture that safeguards on-premises
resources by eradicating unidentified users and uncontrolled devices and restricting any
lateral movement [68]. The research work by Cherrueau et al. [69] discusses the potential
risks and mitigations, emphasizing the importance of secure configuration, encryption, and
identity-based access controls. The study identifies the challenges of scaling ZTNA VPN
solutions and provides recommendations for addressing security concerns.
In the research work by S et al. [70], “Security issues with Virtual Private Network
(VPN) and proxy services: Performance and Usability”, usability and performance are
crucial factors when implementing ZTNA and VPN solutions. The study also suggests
that bad VPN configuration and execution, rather than, say, inadequate cryptography,
are the key issues. The research work by Wang et al. [71] evaluates the performance of
ZTNA VPN solutions. considering factors of latency, throughput, and scalability. The study
emphasizes the need for efficient protocols and optimized configurations to maintain a
balance between security and performance. According to Da Silva et al. [72,73], smart home
security should include Zero Trust access control that takes context into account and uses
behavior-based continuous authentication. There is a proposal for a zero-aware smart home
system that would regulate access to the smart home system by continually verifying the
user’s authenticity using Zero Trust continuous identity verification. Powering it is edge
computing, which gets rid of unreliable service providers and any access. The correctness
is not guaranteed, and there has been no testing of the effect of latency and concurrency in
a real context.
The research work by Hunt et al. [74] proposes a ZTNA VPN model. The research
highlights the benefits of this integration, like enhanced visibility and control over network
traffic. This states that incoming requests from users or devices should be accepted after
authentication. Running both ZTNA and VPN simultaneously may introduce additional
latency and performance overhead. This can impact the user experience, particularly for
latency-sensitive applications. He et al. [75] conducted research comparing common trust
assessment techniques and outlining the benefits and drawbacks of various access control
regimes and authentication procedures. The emphasis of the study is also on protocols
for network authentication and access control. Syed et al. [29] broadened the design’s
scope to include software-defined perimeters and micro-segmentation and talked about the
difficulties of such an architecture. The research work survey by Pittman et al. [76] showed
data objects, rather than user-accessible paths, that are subject to Zero Trust concepts and
tenets. Trust computation in a dynamic system like a network is, according to their findings,
an issue of categorization and regression. In their research, Buck et al. [77] used a search
model to distinguish between academic material and gray literature while evaluating
Information 2024, 15, 734 12 of 25
articles published on ZTNA. Any piece of writing that does not originate from an academic
setting, like a private or commercial enterprise, is considered gray literature.
To some extent, the methods outlined here are comparable to Google’s ZTN approach
to access control [78,79]. However, the execution of decision continuity, risk management,
and policy wording has been vague. NIST [45] provides a vendor-agnostic framework for
ZT implementation. It focuses on the continuous verification of user and device identities.
Policy enforcement is based on context, like user identity, device health, and location;
micro-segmentation and least-privilege access; and comprehensive and detailed guidance
applicable to a wide range of organizations. It encourages continuous monitoring and
verification, allowing for flexible implementation.
It may be seen as overly complex due to detailed and broad guidelines. Implementa-
tion requires a thorough understanding and careful planning. The Forrester model [80,81],
popularized by Forrester Research, emphasizes the need to eliminate trust from the net-
work. It includes continuous monitoring and validation of all users and devices; micro-
segmentation to limit lateral movement within networks; data-centric security, ensuring
data protection regardless of location; and a strong focus on data protection and reducing
attack surfaces. It is a practical approach that can be adapted to various environments. Sig-
nificant changes may be required to the existing network and security infrastructure. The
broad approach might be challenging for smaller organizations to implement fully. Some
of the concepts presented here are similar to Dynfire, an AC policy management frame-
work for ZTN put into practice on a college campus, as described by Vensmer et al. [82].
Problematically, neither risk management nor decision continuity are part of it. A ZTN AC
solution for cloud computing, AL-SAFE, is described by Giannoku et al. [83]. However, it
is missing policy language, risk management, and decision continuity features.
From Table 3, we can see that scaling both ZTNA and VPN solutions to accommodate
the increased number of users and devices can be effective. Ensuring seamless scalability
while maintaining security can be a complex task. In today’s computing and mobile device
settings, when dynamic characteristics make the idea of a conventional DMZ [84] outdated,
this comparatively static approach to security, focused on physical or virtual perimeters,
fails. As the new network edge, an implicit trust strategy cannot sufficiently protect the
cloud. Regarding the idea of protecting information systems [74], changes were made to
accomplish the required IP security based on a review of the company’s policy, the SSL
encryption technique, and the software utilized in the business. These steps will enable the
information system for manufacturing locations to gain the appropriate security. Given the
context of prior research and the underlying hypotheses, the authors delve into the data
and their potential interpretation. Conversations on the results and their implications need
to have a wide view. It is also possible to emphasize potential avenues for future science.
The manner in which companies work has changed over the last many years. Working
remotely and other trends like bring your device (BYOD) [85] are driving the demand for
flexible access to company data and apps from devices outside of the company’s internal
network. This tendency is being exacerbated by the rising number of remote workers and
the coronavirus epidemic. Additionally, problems arise for the organization’s network
architecture due to external connections, the incorporation of partners and service providers,
or the mutual sharing of assets. To date, the majority of companies have provided external
users or services with encrypted connections to their internal networks so that they may
access internal resources. When a user or service is considered trustworthy, they are
granted access to the network’s resources. The problem is that most existing solutions rely
on inflexible components like subnetworks, firewalls, and rule sets, making it impossible to
adapt to these kinds of ever-changing conditions. Because of this design, there are major
security holes. One issue is that the internal network is not segmented or controlled. Once
an outsider or malevolent employee breaches an organization’s network defense, they may
access almost every part of the system. A large number of organizational resources are,
therefore, vulnerable to reading, modification, and harm.
Information 2024, 15, 734 13 of 25
Table 3. Comparison of models and scholarly contributions. This table show a comparison of industry
Zero Trust models, outlining implementation complexity, device management, data protection, and
monitoring frameworks in Google BeyondCorp, NIST, and Forrester models.
According to Zero Trust techniques, which aim to fix the problems with existing
networking solutions, the fundamental premise is that no one on the network can be
trusted and that any access to company resources might be a security risk. This means that
all accesses are checked and confirmed. The approval of a request is contingent upon its
verification. Either complete access to the service or access to just the allowed operations or
data may be provided. When verifying a user’s identity, it is important to take into account
not only their password but also their device, location, time, and access rights. In addition,
resource access is limited to what is necessary for carrying out tasks in accordance with the
concept of least privilege. This highlights the need to establish and rigorously follow access
rules. The access regulations in question, however, are dynamic. It is possible to include the
behavior patterns of the network participants in the verification process by continuously
monitoring and recording network traffic. Zero trust is more of a strategy than a technology;
Information 2024, 15, 734 14 of 25
it is an umbrella term for a set of guiding principles. This article discusses and analyzes
various categories of network attacks, their features, and the impact they could have on
current networks. We hope that by the end of this research, we will be in a position to
add to the body of knowledge on how VPN and ZTNA can complement each other, thus
reinforcing network security and offering secure access to remote resources.
The server verifies the certificates and then checks the provided username and pass-
word against its client credentials database. Only after successful validation are the clients
allowed to establish the VPN tunnel with the server. After successful validation of creden-
tials, the IP address is assigned to the client from a predefined IP pool managed by the VPN
Information 2024, 15, 734 16 of 25
server. Each time a client connects, it receives an available IP address from the pool. This
approach is more scalable and useful when you have a large number of clients connecting
intermittently. If a client disconnects, its assigned IP address becomes available for future
connections. This allows efficient use of the address space as clients come and go.
Figure 4. Detailed architecture of the Zero Trust VPN (ZT-VPN) framework, depicting the Pol-
icy Enforcement Point, Identity Enforcement Point, and Security Enforcement Point modules for
comprehensive security management.
In the second module, after the user connects to the VPN, IEP will act and validate its
identity through user login credentials. OTP is sent to the given device through which the
device is verified. Afterward, the device health, OS settings, and person location is verified.
Then, role-based access is granted to that person for organizational resources, as can be
seen in Algorithm 2 from lines 1 to 22. In the SEP module, session time is monitored, and
limited time-based access is granted to every user. It is a time-bound session; once the user
logs in, the session time is collected from the log’s server, and the counter starts with it.
Then, the user profile and activities are also monitored through server logs. When the user
tries to access any organizational resources or tries to access any link, it can be logged and
monitored as well, which can be seen in Algorithm 2, and 2 from lines 24 to 49.
This implementation can enhance the overall security and access control of an organi-
zation’s network. In a VPN, client credentials are typically validated through a combination
of certificate-based authentication and username/password authentication. Let us explore
how this validation process works, along with a diagram.
These are the steps through which we can achieve our goal:
• The user has to input their credentials into the VPN client, and then it will validate
with the server, and then traffic goes to the internet.
• Then the person can access the web application; if VPN credentials are not validated,
then it will not permit access to the web application.
• Now, the user has to put their credentials in the web app; at this point, the user is vali-
dated with a password, and it also receives the OTP on its registered mobile number.
• In the next step, the user device OS, settings, and device health are monitored, and
user logs are generated every time it performs any activity.
• There is also access management; the user is restricted to the privileges that are allowed
by the admin.
Information 2024, 15, 734 17 of 25
and data breaches while ensuring seamless access to necessary resources. Additionally, its
scalability and adaptability allow organizations to adjust to evolving access needs. The
centralized control feature further enhances security, enabling effective monitoring of user
activity across both on-site and remote environments.
Table 4. Summary of the previous literature on Zero Trust and related technologies. Column
definitions: Category A—classification approach used in reviewed works; Category B—comparison
of individual statistics across works; Category C—model analysis of variable features; Category
D—hybrid network challenges discussed. Notation: Y = yes (characteristic is present), X = no
(characteristic is absent), P = partially present.
ensures that only authenticated and authorized users can access organizational resources.
Unlike traditional VPNs, which grant broad access to the entire network once authenticated,
ZT-VPN provides granular access control, reducing the attack surface and preventing unau-
thorized lateral movement within the network. Additionally, the continuous verification of
user and device health, operating system settings, and location further enhances security,
making it more robust than standalone ZTNA solutions.
The ZT-VPN framework addresses common performance issues associated with tradi-
tional VPNs, including latency and throughput. By dynamically selecting the best path for
traffic and optimizing network performance, ZT-VPN ensures that critical applications re-
ceive the necessary bandwidth and low latency. This results in a better user experience and
increased productivity. The integration of software-defined wide area network (SD-WAN)
technology within the ZT-VPN framework further enhances performance by providing cen-
tralized management and dynamic path selection based on real-time network conditions.
The cloud-native architecture of the ZT-VPN framework allows for easy scalability
and flexibility. Organizations can quickly adapt to changing business needs and deploy
new services without the need for extensive hardware investments. The framework’s
ability to integrate with existing security solutions, like Secure Web Gateway (SWG), Cloud
Access Security Broker (CASB), and Firewall as a Service (FWaaS), ensures comprehensive
protection and seamless security transitions. This makes ZT-VPN a more scalable and
adaptable solution compared to traditional VPNs and standalone ZTNA implementations.
The framework provides a unified approach to access control by combining the princi-
ples of Zero Trust with the secure connectivity of VPNs. This ensures that users are granted
access based on their identity, role, and context rather than relying on the traditional
perimeter-based security model. The role-based access control and time-bound sessions
further enhance security by limiting access to only the necessary resources for a specific
duration. This comprehensive access control mechanism is more effective than the broad
access granted by traditional VPNs and the application-specific access provided by ZTNA.
Abbreviations
Abbreviation key for technical terms used throughout this document, providing definitions for
essential terms:
References
1. Hodge, R. VPN Use Surges During the Coronavirus Lockdown, But So Do Security Risks; CNET: San Francisco, CA, USA, 2020;
Volume 23.
2. Singer, P.W.; Friedman, A. Cybersecurity: What Everyone Needs to Know; Oxford University Press: New York, NY, USA, 2014.
3. Deibert, R.J. Subversion Inc: The age of private espionage. J. Democr. 2022, 33, 28–44. [CrossRef]
4. Zhang, Z.; Zhang, Y.Q.; Chu, X.; Li, B. An overview of virtual private network (VPN): IP VPN and optical VPN. Photonic Netw.
Commun. 2004, 7, 213–225. [CrossRef]
5. Baykara, M.; Gürel, Z.Z. Detection of phishing attacks. In Proceedings of the 2018 6th International Symposium on Digital
Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; pp. 1–5.
6. Kaur, J.; Ramkumar, K. The recent trends in cyber security: A review. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 5766–5781.
[CrossRef]
7. Ghelani, D. Cyber Security, Cyber Threats, Implications and Future Perspectives: A Review. Authorea Preprints 2022. Available
online: https://www.techrxiv.org/doi/full/10.22541/au.166385207.73483369 (accessed on 30 September 2024).
Information 2024, 15, 734 23 of 25
8. Alkhalil, Z.; Hewage, C.; Nawaf, L.; Khan, I. Phishing attacks: A recent comprehensive study and a new anatomy. Front. Comput.
Sci. 2021, 3, 563060. [CrossRef]
9. O’Kane, P.; Sezer, S.; Carlin, D. Evolution of ransomware. IET Networks 2018, 7, 321–327. [CrossRef]
10. McIntosh, T.; Kayes, A.; Chen, Y.P.P.; Ng, A.; Watters, P. Ransomware mitigation in the modern era: A comprehensive review,
research challenges, and future directions. Acm Comput. Surv. 2021, 54, 1–36. [CrossRef]
11. Dutkowska-Zuk, A.; Hounsel, A.; Xiong, A.; Roberts, M.; Stewart, B.; Chetty, M.; Feamster, N. Understanding how and why
university students use virtual private networks. arXiv 2020. [CrossRef]
12. Jegede, A.; Fadele, A.; Onoja, M.; Aimufua, G.; Mazadu, I.J. Trends and future directions in automated ransomware detection. J.
Comput. Soc. Inform. 2022, 1, 17–41. [CrossRef]
13. Khan, E.; Sperotto, A.; van der Ham, J.; van Rijswijk-Deij, R. Stranger VPNs: Investigating the Geo-Unblocking Capabilities
of Commercial VPN Providers. In Proceedings of the International Conference on Passive and Active Network Measurement,
Virtual Event, 21–23 March 2023; pp. 46–68.
14. Santhanamahalingam, S.; Alagarsamy, S.; Subramanian, K. A study of cloud-based VPN establishment using network function
virtualization technique. In Proceedings of the 2022 3rd International Conference on Smart Electronics and Communication
(ICOSEC), Trichy, India, 20–22 October 2022; pp. 627–631.
15. Li, Y.; Liu, Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments.
Energy Rep. 2021, 7, 8176–8186. [CrossRef]
16. Zhang, Z.; Al Hamadi, H.; Damiani, E.; Yeun, C.Y.; Taher, F. Explainable artificial intelligence applications in cyber security:
State-of-the-art in research. IEEE Access 2022, 10, 93104–93139. [CrossRef]
17. Furnell, S. The cybersecurity workforce and skills. Comput. Secur. 2021, 100, 102080. [CrossRef]
18. Rajasekharaiah, K.; Dule, C.S.; Sudarshan, E. Cyber security challenges and its emerging trends on latest technologies. In IOP
Conference Series: Materials Science and Engineering; IOP Publishing: Philadelphia, PA, USA, 2020; Volume 981, p. 022062.
19. AL-Hawamleh, A.M. Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures. Momentum
2023, 3, 15. [CrossRef]
20. Shaukat, K.; Luo, S.; Varadharajan, V.; Hameed, I.A.; Xu, M. A survey on machine learning techniques for cyber security in the
last decade. IEEE Access 2020, 8, 222310–222354. [CrossRef]
21. Secure Remote Access Best Practices-Check Point Software—checkpoint.com. Available online: https://www.checkpoint.com/
cyber-hub/network-security/what-is-vpn/covid-19-and-secure-remote-access-best-practices/ (accessed on 26 August 2024).
22. Fatima, M.; Abbas, H.; Yaqoob, T.; Shafqat, N.; Ahmad, Z.; Zeeshan, R.; Muhammad, Z.; Rana, T.; Mussiraliyeva, S. A survey on
common criteria (CC) evaluating schemes for security assessment of IT products. PeerJ Comput. Sci. 2021, 7, e701. [CrossRef]
[PubMed]
23. Streun, F.; Wanner, J.; Perrig, A. Evaluating susceptibility of VPN implementations to DoS attacks using adversarial testing. In
Proceedings of the Network and Distributed Systems Security Symposium 2022 (NDSS’22), San Diego, CA, USA, 24–28 April
2022.
24. Zhou, Y.; Zhang, K. Dos vulnerability verification of ipsec vpn. In Proceedings of the 2020 IEEE International Conference on
Artificial Intelligence and Computer Applications (ICAICA), Dalian, China, 27–29 June 2020; pp. 698–702.
25. Ginty, S. Discover the Anatomy of an External Cyberattack Surface with New RiskIQ Report|Microsoft Security Blog—
microsoft.com. Available online: https://www.microsoft.com/en-us/security/blog/2022/04/21/discover-the-anatomy-of-
an-external-cyberattack-surface-with-new-riskiq-report/?msockid=355668c01f696b823ed97c6f1e6f6a0f (accessed on 26 August
2024).
26. Singh, K.K.V.; Gupta, H. A New Approach for the Security of VPN. In Proceedings of the Second International Conference on
Information and Communication Technology for Competitive Strategies, Jaipur, India, 19–21 December 2016; pp. 1–5.
27. Frahim, J.; Huang, Q. Ssl Remote Access Vpns (Network Security); Cisco Press: Indianapolis, IN, USA, 2008.
28. Shut the Front Door: Analyzing VPN Vulnerability Exploits—mandiant.com. Available online: https://www.mandiant.com/
resources/webinars/mandiant-intelligence-briefing-stories-directly-frontline (accessed on 26 August 2024).
29. Syed, N.F.; Shah, S.W.; Shaghaghi, A.; Anwar, A.; Baig, Z.; Doss, R. Zero trust architecture (zta): A comprehensive survey. IEEE
Access 2022, 10, 57143–57179. [CrossRef]
30. Arshad, J.; Talha, M.; Saleem, B.; Shah, Z.; Zaman, H.; Muhammad, Z. A Survey of Bug Bounty Programs in Strengthening
Cybersecurity and Privacy in the Blockchain Industry. Blockchains 2024, 2, 195–216. [CrossRef]
31. Nagmote, S.U.; Soni, P.D. An Overview of Network Security Model Using Cryptography, Firewall and Vpn for Social Organization
with There Benifits. Int. J. Eng. Res. Technol. (IJERT) 2013, 2. [CrossRef]
32. Adeyinka, O. Analysis of problems associated with IPSec VPN Technology. In Proceedings of the 2008 Canadian Conference on
Electrical and Computer Engineering, Niagara Falls, ON, Canada, 5–8 May 2008; pp. 001903–001908.
33. Sombatruang, N.; Omiya, T.; Miyamoto, D.; Sasse, M.A.; Kadobayashi, Y.; Baddeley, M. Attributes affecting user decision to
adopt a Virtual Private Network (VPN) app. In Proceedings of the Information and Communications Security: 22nd International
Conference (ICICS 2020), Copenhagen, Denmark, 24–26 August 2020; pp. 223–242.
34. Rothvoß, T.; Sanita, L. On the complexity of the asymmetric VPN problem. In Proceedings of the International Workshop on
Approximation Algorithms for Combinatorial Optimization, Virtual, 16–18 August 2009; pp. 326–338.
Information 2024, 15, 734 24 of 25
35. Dutkowska-Zuk, A.; Hounsel, A.; Morrill, A.; Xiong, A.; Chetty, M.; Feamster, N. How and why people use virtual private
networks. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022;
pp. 3451–3465.
36. Sawalmeh, H.; Malayshi, M.; Ahmad, S.; Awad, A. VPN remote access OSPF-based VPN security vulnerabilities and counter
measurements. In Proceedings of the 2021 International Conference on Innovation and Intelligence for Informatics, Computing,
and Technologies (3ICT), Virtual Conference, 29–30 September 2021; pp. 236–241.
37. Cheung, K.H.; Mišić, J. On virtual private networks security design issues. Comput. Netw. 2002, 38, 165–179. [CrossRef]
38. Bansode, R.; Girdhar, A. Common vulnerabilities exposed in VPN–A survey. J. Phys. Conf. Ser. 2021, 1714, 012045. [CrossRef]
39. With Everyone Working from Home, VPN Security is Now Paramount—zdnet.com. Available online: https://www.zdnet.com/
article/covid-19-with-everyone-working-from-home-vpn-security-has-now-become-paramount/ (accessed on 26 August 2024).
40. Einler Larsson, L.; Qollakaj, K. Cybersecurity of Remote Work Migration: A Study on the VPN Security Landscape Post COVID-19
Outbreak. 2023. Available online: https://www.diva-portal.org/smash/get/diva2:1778036/FULLTEXT03.pdf (accessed on 30
September 2024).
41. VPN Access and Activity Monitoring, Sans, 2020. - Bing—bing.com. Available online: https://www.bing.com/search?q=VPN+
Access+and+Activity+Monitoring%2C"+Sans%2C+2020.&qs=n&form=QBRE&sp=-1&lq=1&pq=vpn+access+and+activity+
monitoring%2C"+sans%2C+2020.&sc=1-48&sk=&cvid=167E379FC8C341CCB182FAC4A95D10D3&ghsh=0&ghacc=0&ghpl=.
(accessed on 26 August 2024).
42. Ikram, M.; Vallina-Rodriguez, N.; Seneviratne, S.; Kaafar, M.A.; Paxson, V. An analysis of the privacy and security risks of
android vpn permission-enabled apps. In Proceedings of the 2016 Internet Measurement Conference, Monica, CA, USA, 14–16
November 2016; pp. 349–364.
43. Yoo, S.J. A Study on the Improvement of Security Enhancement for ZTNA. Converg. Secur. J. 2024, 24, 21–26. [CrossRef]
44. Nazir, A.; Iqbal, Z.; Muhammad, Z. ZTA: A Novel Zero Trust Framework for Detection and Prevention of Malicious Android
Applications. Preprints 2024. [CrossRef]
45. Stafford, V. Zero trust architecture. NIST Spec. Publ. 2020, 800, 207.
46. Developing a Framework to Improve Critical Infrastructure Cybersecurity. Available online: https://www.nist.gov/system/
files/documents/2017/06/01/040513_cgi.pdf (accessed on 26 August 2024).
47. NIST. Framework for Improving Critical Infrastructure Cybersecurity. Available online: https://nvlpubs.nist.gov/nistpubs/
CSWP/NIST.CSWP.04162018.pdf (accessed on 30 September 2024).
48. Malatji, M.; Marnewick, A.L.; Von Solms, S. Cybersecurity capabilities for critical infrastructure resilience. Inf. Comput. Secur.
2022, 30, 255–279. [CrossRef]
49. Zscaler’s 2022 VPN Report: As VPN Exploits Grow, 80 Percent of Organizations Shift Towards Zero Trust Security—zscaler.com.
Available online: https://www.zscaler.com/press/ (accessed on 26 August 2024).
50. A VPN Security Brief from AmZetta Technologies, LLC. Available online: https://amzetta.com/wp-content/uploads/2021/05/
AmZetta-Remote-AccessSecurity-Going-Beyond-VPN-Security-Brief.pdf (accessed on 26 August 2024).
51. Pavlicek, A.; Sudzina, F. Use of virtual private networks (VPN) and proxy servers: Impact of personality and demographics. In
Proceedings of the 2018 Thirteenth International Conference on Digital Information Management (ICDIM), Berlin, Germany,
24–26 September 2018; pp. 108–111.
52. Hurkens, C.A.; Keijsper, J.C.M.; Stougie, L. Virtual private network design: A proof of the tree routing conjecture on ring
networks. SIAM J. Discret. Math. 2007, 21, 482–503. [CrossRef]
53. Javed, M.S.; Sajjad, S.M.; Mehmood, D.; Mansoor, K.; Iqbal, Z.; Kazim, M.; Muhammad, Z. Analyzing Tor Browser Artifacts
for Enhanced Web Forensics, Anonymity, Cybersecurity, and Privacy in Windows-Based Systems. Information 2024, 15, 495.
[CrossRef]
54. Talan, A. Zero Trust Network Access with Cybersecurity Challenges and Potential Solutions. Ph.D. Thesis, National College of
Ireland, Dublin, Ireland, 2022.
55. Campbell, M. Beyond zero trust: Trust is a vulnerability. Computer 2020, 53, 110–113. [CrossRef]
56. Sood, A.K. Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks; Mercury Learning and Information: Duxbury,
MA, USA, 2023.
57. Kazim, M.; Pirim, H.; Shi, S.; Wu, D. Multilayer analysis of energy networks. Sustain. Energy Grids Netw. 2024, 39, 101407.
[CrossRef]
58. Jeffery, C.L.; Das, S.R.; Bernal, G.S. Proxy-sharing proxy servers. In Proceedings of the COM’96. First Annual Conference on
Emerging Technologies and Applications in Communications, Portland, OR, USA, 7–10 May 1996; pp. 116–119.
59. Saini, K. Squid Proxy Server 3.1: Beginner’s Guide; Packt Publishing Ltd.: Birmingham, UK, 2011.
60. Shahid, J.Z.; Cimato, S.; Muhammad, Z. A Sharded Blockchain Architecture for Healthcare Data. In Proceedings of the 2024 IEEE
48th Annual Computers, Software, and Applications Conference (COMPSAC), Osaka, Japan, 2–4 July 2024; pp. 1794–1799.
61. Xu, V. MAZE: A Secure Cloud Storage Service Using Moving Target Defense and Secure Shell Protocol (SSH) Tunneling. Ph.D.
Thesis, University of Pittsburgh, Pittsburgh, PA, USA, 2020.
62. Dusi, M.; Gringoli, F.; Salgarelli, L. A preliminary look at the privacy of SSH tunnels. In Proceedings of the 2008 Proceedings of
17th International Conference on Computer Communications and Networks, St. Thomas, VI, USA, 3–7 August 2008; pp. 1–7.
Information 2024, 15, 734 25 of 25
63. Yang, Z.; Cui, Y.; Li, B.; Liu, Y.; Xu, Y. Software-defined wide area network (SD-WAN): Architecture, advances and opportunities.
In Proceedings of the 2019 28th International Conference on Computer Communication and Networks (ICCCN), Valencia, Spain,
29 July–1 August 2019; pp. 1–9.
64. Yalda, K.G.; Hamad, D.J.; Ţăpuş, N. A survey on Software-defined Wide Area Network (SD-WAN) architectures. In Proceedings
of the 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Ankara,
Turkey, 9–11 June 2022; pp. 1–5.
65. Iesar, H.; Iqbal, W.; Abbas, Y.; Umair, M.Y.; Wakeel, A.; Illahi, F.; Saleem, B.; Muhammad, Z. Revolutionizing Data Center
Networks: Dynamic Load Balancing via Floodlight in SDN Environment. In Proceedings of the 2024 5th International Conference
on Advancements in Computational Sciences (ICACS), Lahore, Pakistan, 19–20 February 2024; pp. 1–8.
66. Islam, M.N.; Colomo-Palacios, R.; Chockalingam, S. Secure access service edge: A multivocal literature review. In Proceedings of
the 2021 21st International Conference on Computational Science and Its Applications (ICCSA), Cagliari, Italy, 13–16 September
2021; pp. 188–194.
67. Yiliyaer, S.; Kim, Y. Secure access service edge: A zero trust based framework for accessing data securely. In Proceedings of
the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Virtual, 26–29 January 2022;
pp. 0586–0591.
68. Awale, V.; Gaikwad, S. Zero Trust Architecture Using Hyperledger Fabric. In Proceedings of the 2023 14th International
Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 6–8 July 2023; pp. 1–4.
69. Abbas, H.; Emmanuel, N.; Amjad, M.F.; Yaqoob, T.; Atiquzzaman, M.; Iqbal, Z.; Shafqat, N.; Shahid, W.B.; Tanveer, A.; Ashfaq, U.
Security assessment and evaluation of VPNs: A comprehensive survey. ACM Comput. Surv. 2023, 55, 1–47. [CrossRef]
70. Security Issues with Virtual Private Network (VPN) and Proxy Services. Available online: https://www.academia.edu/51073706
/Security_issues_with_Virtual_Private_Network_VPN_and_proxy_services (accessed on 26 August 2024).
71. Cybersecurity After COVID-19: 10 Ways to Protect Your Business and Refocus on Resilience. Available online: https://www.
marshmclennan.com/assets/insights/publications/2020/june/cybersecurity_after_covid_19.pdf (accessed on 26 August 2024).
72. Fuchs, J. Vishing: New Threat to VPNs—avanan.com. Available online: https://www.avanan.com/blog/vishing-new-threat-vpn
(accessed on 26 August 2024).
73. Odokuma, E.; Musa, M. Internet Threats and Mitigation Methods in Electronic Businesses Post COVID-19. Int. J. Comput. Appl.
2022, 184, 1–4. [CrossRef]
74. Purchina, O.; Poluyan, A.; Fugarov, D. Securing an Information System via the SSL Protocol. Int. J. Saf. Secur. Eng. 2022, 12,
563–568. [CrossRef]
75. He, Y.; Huang, D.; Chen, L.; Ni, Y.; Ma, X. A survey on zero trust architecture: Challenges and future trends. Wirel. Commun. Mob.
Comput. 2022, 2022, 6476274. [CrossRef]
76. Pittman, J.M.; Alaee, S.; Crosby, C.; Honey, T.; Schaefer, G.M. Towards a model for zero trust data. Am. J. Sci. Eng. 2022, 3, 18–24.
[CrossRef]
77. Buck, C.; Olenberger, C.; Schweizer, A.; Völter, F.; Eymann, T. Never trust, always verify: A multivocal literature review on
current knowledge and research gaps of zero-trust. Comput. Secur. 2021, 110, 102436. [CrossRef]
78. Ward, R.; Beyer, B. Beyondcorp: A new approach to enterprise security. Mag. USENIX SAGE 2014, 39, 6–11.
79. Osborn, B. Beyondcorp: Design to deployment at google. Useni 2016, 41, 28.
80. Zero Trust: What, Why and How. Available online: https://www.forbes.com/councils/forbestechcouncil/2023/04/07/zero-
trust-the-what-why-and-how/ (accessed on 26 August 2024).
81. Saleem, B.; Ahmed, M.; Zahra, M.; Hassan, F.; Iqbal, M.A.; Muhammad, Z. A survey of cybersecurity laws, regulations, and
policies in technologically advanced nations: A case study of Pakistan to bridge the gap. Int. Cybersecur. Law Rev. 2024, 5, 533–561.
[CrossRef]
82. Vensmer, A.; Kiesel, S. Dynfire: Dynamic firewalling in heterogeneous environments. In Proceedings of the World Congress on
Internet Security (WorldCIS-2012), Guelph, ON, Canada, 10–12 June 2012; pp. 57–58.
83. Giannakou, A.; Rilling, L.; Pazat, J.L.; Morin, C. AL-SAFE: A secure self-adaptable application-level firewall for IaaS clouds. In
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg,
12–15 December 2016; pp. 383–390.
84. Crichigno, J.; Bou-Harb, E.; Ghani, N. A comprehensive tutorial on science DMZ. IEEE Commun. Surv. Tutor. 2018, 21, 2041–2078.
[CrossRef]
85. French, A.M.; Guo, C.; Shim, J.P. Current status, issues, and future of bring your own device (BYOD). Commun. Assoc. Inf. Syst.
2014, 35, 10.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.