Network Security using Firewall and Cryptographic Authentication
Gespeichert in:
| Titel: | Network Security using Firewall and Cryptographic Authentication |
|---|---|
| Autoren: | Rajesh Kumar |
| Weitere Verfasser: | The Pennsylvania State University CiteSeerX Archives |
| Quelle: | http://research.ijcaonline.org/volume57/number23/pxc3883834.pdf. |
| Publikationsjahr: | 2012 |
| Bestand: | CiteSeerX |
| Schlagwörter: | QUICKKNOCK, SSH Daemon, Network Security, Port knock, Encryption algorithms, IP Spoofing, Key-Exchange, Symmetric Cryptography, Single Packet Authorization, Fwknop, AfterGlow, Gnuplot |
| Beschreibung: | The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consider this problem in order to improve the network security and enhance secure shell daemon protection. A mechanism, QUICKKNOCK, improving upon the potentialities of technologies such as port knocking and SPA (Single Packet Authorization), using Firewall and Cryptography, has been proposed. |
| Publikationsart: | text |
| Dateibeschreibung: | application/pdf |
| Sprache: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.417.3760; http://research.ijcaonline.org/volume57/number23/pxc3883834.pdf |
| Verfügbarkeit: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.417.3760 http://research.ijcaonline.org/volume57/number23/pxc3883834.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Dokumentencode: | edsbas.D1DCC3FD |
| Datenbank: | BASE |
| Abstract: | The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consider this problem in order to improve the network security and enhance secure shell daemon protection. A mechanism, QUICKKNOCK, improving upon the potentialities of technologies such as port knocking and SPA (Single Packet Authorization), using Firewall and Cryptography, has been proposed. |
|---|
Nájsť tento článok vo Web of Science