Network Security using Firewall and Cryptographic Authentication

Saved in:
Bibliographic Details
Title: Network Security using Firewall and Cryptographic Authentication
Authors: Rajesh Kumar
Contributors: The Pennsylvania State University CiteSeerX Archives
Source: http://research.ijcaonline.org/volume57/number23/pxc3883834.pdf.
Publication Year: 2012
Collection: CiteSeerX
Subject Terms: QUICKKNOCK, SSH Daemon, Network Security, Port knock, Encryption algorithms, IP Spoofing, Key-Exchange, Symmetric Cryptography, Single Packet Authorization, Fwknop, AfterGlow, Gnuplot
Description: The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consider this problem in order to improve the network security and enhance secure shell daemon protection. A mechanism, QUICKKNOCK, improving upon the potentialities of technologies such as port knocking and SPA (Single Packet Authorization), using Firewall and Cryptography, has been proposed.
Document Type: text
File Description: application/pdf
Language: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.417.3760; http://research.ijcaonline.org/volume57/number23/pxc3883834.pdf
Availability: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.417.3760
http://research.ijcaonline.org/volume57/number23/pxc3883834.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Accession Number: edsbas.D1DCC3FD
Database: BASE
Description
Abstract:The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consider this problem in order to improve the network security and enhance secure shell daemon protection. A mechanism, QUICKKNOCK, improving upon the potentialities of technologies such as port knocking and SPA (Single Packet Authorization), using Firewall and Cryptography, has been proposed.