Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Network Security using Firewall and Cryptographic Authentication

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 57 - Number 23
Year of Publication: 2012
Authors:
Rajesh Kumar
I. M. Talwar
10.5120/9438-3834

Rajesh Kumar and I M Talwar. Article: Network Security using Firewall and Cryptographic Authentication. International Journal of Computer Applications 57(23):13-19, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Rajesh Kumar and I. M. Talwar},
	title = {Article: Network Security using Firewall and Cryptographic Authentication},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {57},
	number = {23},
	pages = {13-19},
	month = {November},
	note = {Full text available}
}

Abstract

The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consider this problem in order to improve the network security and enhance secure shell daemon protection. A mechanism, QUICKKNOCK, improving upon the potentialities of technologies such as port knocking and SPA (Single Packet Authorization), using Firewall and Cryptography, has been proposed.

References

  • Sebastian Janquier (2006) "An Analysis of Port Knocking and Single Packet Authorization" : Master's Thesis University of London.
  • Feng T. , Wang S. , Yuan Z. -T. UC secure network coding against pollution attacks(2012) Information Technology Journal, 11 (9), pp. 1175-1183.
  • http://www. linuxforu. com/2012/05/cyber-attacks-explained-packet-crafting/
  • Barham, P. , Hand, S. , Isaacs, R. , Jardetzky, P. , Mortier, R. , Roscoe, T. : Techniques for lightweight concealment and authentication in IP networks. Technical Report IRB-TR-02-009, Intel Research Berkeley (July 2002).
  • Rash Michael (2007) Available at Website http://www. cipherdyne. org/fwknop/docs/SPA. htm,
  • Jaggi, S. , Langberg, M. , Katti, S. , Ho, T. , Katabi, D. , Medard, M. , Effros, M. Resilient network coding in the presence of byzantine adversaries (2008) IEEE Trans. Inform. Theor. , 54, pp. 2596-2603.
  • Kumar Rajesh,Talwar I. M,Kumar Kapil , " A Modified Approach to Analysis and Design of Port Knocking Technique", International Journal of Computational Intelligence and Information Security(September 2012) Vol 3 (7), pp (28-39)
  • Fluhrer,S. ,Mantin,I. ,Shamir,A. :Attacks on RC4 and WEP. RSA Laboratories ,Crypto-bytes 5(2)(2002)
  • Bleichenbacher,D. : Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1. In :Krawczyk,H. (ed. )CRYPTO 1998LNCS,vol. 1462,pp. 1-12. Springer, Heidelberg(1998)
  • Smits R. , Jain D. , Pidcock S. , Goldberg I. , Hengartner U. "Bridge SPA: Improving tor bridges with single packet authorization" (2011)Proceedings of the ACM Conference on Computer and Communications Security, pp. 93-101.
  • M. Rash "Single Packet Authorization with fwknop" The USENIX Magazine,vol 31,no1,Feb 2006. pp63-69[Online]Available http://www. usenix. org/publications/login/200602/pdfs/rash. pdf.
  • Agrawal S. , Boneh , D. Homomorphic MAC's: MAC based integrity for network coding(2009) Applied Cryptography Network Security,5536,pp. 292-305.
  • http://www. cipherdyne. org/fwknop/docs/fwknop-tutorial. html#4. 2 ( October 2012)
  • Eugene Y. Vasserman,Nicholas Hopper,John Laxson,and James Tyra "SILENTKNOCK:Practical, Provably Undetectable Authentication Vol. 8, pp. 121-135 (2009). Available at http://sclab. cs. umn. edu/node/151
  • Wang, Y. Insecure "Provably secure network coding" and homomorphic authentication schemes for network coding (2010) IACR Eprint Archive.
  • Bellovin, S. M. : Security problems in the TCP/IP protocol suite. SIGCOMM Comput. Com- mun. Rev. 19(2), 32–48 (1989).
  • Murdoch, S. J. , Lewis, S. : Embedding covert channels into TCP/IP. In: Barni, M. , Herrera- Joancomart´?, J. , Katzenbeisser, S. , P´erez-Gonz´alez, F. (eds. ) IH 2005. LNCS, vol. 3727, pp. 247–261. Springer, Heidelberg (2005)
  • Welte, H. ,Kadlecsik, J. ,Josefsson, M. ,McHardy, P. Kozakai,Y. ,Morris,J. ,Boucher,M. ,Russell,R. :The netfilter. org project, Available at Website http://www. netfilter. org/
  • Bernstein,D. J. : The Poly1305-AES message authentication code. In:Gilbert,H. ,Hand-schuh,H. (eds. )FSE 2005. LNCS,vol. 3557,Springer,Heidelberg(2005)
  • Juin-Hau Liew " One-Time Knocking Framework using SPA and IP Sec",ICETC,vol 5,pp 209-213(June2010)Available at http://ieeexplore. ieee. og/xpl/login.
  • Li, Y. , Yao, H. , Chen, M. , Jaggi, S. , Rosen, A. Ripple authentication for network coding (2010) Proceedings of the 29th Conference on Information Communications, pp. 14-19. , March 15-19, 2010, San Diego.
  • Postel, J. (ed. ): Transmission control protocol (1981), http://www. ietf. org/rfc/rfc0793. txt.
  • http://www. cipherdyne. org/LinuxFirewalls/ch06