CFP last date
20 May 2024
Reseach Article

Implementation of Modified Hybrid Port Knocking (MHPK) with Strong Authentication

by Priyanka Sahu, Megha Singh, Deepak Kulhare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 22
Year of Publication: 2013
Authors: Priyanka Sahu, Megha Singh, Deepak Kulhare
10.5120/10778-5478

Priyanka Sahu, Megha Singh, Deepak Kulhare . Implementation of Modified Hybrid Port Knocking (MHPK) with Strong Authentication. International Journal of Computer Applications. 64, 22 ( February 2013), 31-36. DOI=10.5120/10778-5478

@article{ 10.5120/10778-5478,
author = { Priyanka Sahu, Megha Singh, Deepak Kulhare },
title = { Implementation of Modified Hybrid Port Knocking (MHPK) with Strong Authentication },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 22 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number22/10778-5478/ },
doi = { 10.5120/10778-5478 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:17:21.502214+05:30
%A Priyanka Sahu
%A Megha Singh
%A Deepak Kulhare
%T Implementation of Modified Hybrid Port Knocking (MHPK) with Strong Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 22
%P 31-36
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Port Knocking is an important concept to secure services provided by the servers. By a predefined port knocking sequence server identify whether the request is a legitimate request for a service. This paper presents an analyzing the network security concept of Port Knocking and assesses their suitability as firewall authentication mechanisms for opening network ports or performing certain actions on servers. This paper are developing and evaluating the performance of a new proposed modified hybrid port knocking (MHPK) technique with proposed encryption/decryption technique. Prime concerned of the proposed work is to prevent different –different types of port attack and fulfill the entire security requirement for network. Proposed technique is the combination of four concepts, these are port knocking (PK), proposed Symmetric key encryption/decryption, steganography and mutual authentication. Basically it is the enhanced modification of hybrid port knocking therefore; it is referred to as the modified hybrid port-knocking (MHPK) technique. The improvements of this development over existing port knocking mitigate some threats, but various concerns still exist. Development aimed at the enterprise quality will need to address additional needs. In conclusion, port knocking deserves future consideration and can be a valuable layer in defense-in-depth. The performance of the proposed technique is calculated by measuring some parameter like security, and average authentication time, which is showing the superiority of the proposed technique as compare to existing technique.

References
  1. Di Gioia P. , "Behind Closed Doors: An Evaluation of Port Knocking Authentication'. Donald Bren School of Information and Computer Sciences, University of California, Irvine 2004.
  2. Dr. Hussein Al-Bahadili and Dr. Ali H. Hadi "Network Security Using Hybrid Port Knocking" IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No. 8, August 2010.
  3. deGraaf R, Aycock C, and Jacobson M. , "Improved Port Knocking with Strong Authentication". [Presentation]. Department of Computer Sci¬ence, University of Calgary 2005.
  4. deGraaf R, Aycock C, and Jacobson M. "Improved Port Knocking with Strong Authentication". ACSAC 2005, pp. 409¬418, 2005.
  5. Ali Hussein, "A Hybrid Port-Knocking Technique for Host Authentication", Ph. D. Thesis, University of Banking and Financial Sciences. IJCSNS, VOL. 10 No. 8, August 2010.
  6. Doyle M. , "Implementing a Port Knocking System in C". Department of Physics, University of Arkansas, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Port Knocking Authentication Security Steganography cryptography firewall