Network Security using Firewall and Cryptographic Authentication
Saved in:
| Title: | Network Security using Firewall and Cryptographic Authentication |
|---|---|
| Authors: | Rajesh Kumar |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | http://research.ijcaonline.org/volume57/number23/pxc3883834.pdf. |
| Publication Year: | 2012 |
| Collection: | CiteSeerX |
| Subject Terms: | QUICKKNOCK, SSH Daemon, Network Security, Port knock, Encryption algorithms, IP Spoofing, Key-Exchange, Symmetric Cryptography, Single Packet Authorization, Fwknop, AfterGlow, Gnuplot |
| Description: | The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consider this problem in order to improve the network security and enhance secure shell daemon protection. A mechanism, QUICKKNOCK, improving upon the potentialities of technologies such as port knocking and SPA (Single Packet Authorization), using Firewall and Cryptography, has been proposed. |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.417.3760; http://research.ijcaonline.org/volume57/number23/pxc3883834.pdf |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.417.3760 http://research.ijcaonline.org/volume57/number23/pxc3883834.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.D1DCC3FD |
| Database: | BASE |
| Abstract: | The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consider this problem in order to improve the network security and enhance secure shell daemon protection. A mechanism, QUICKKNOCK, improving upon the potentialities of technologies such as port knocking and SPA (Single Packet Authorization), using Firewall and Cryptography, has been proposed. |
|---|
Nájsť tento článok vo Web of Science