Advanced secured Authentication through Firewall in NSC

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-23 Number-4
Year of Publication : 2015
Authors : Ms. Savita Verma, Dr. Pushpender sarao
  10.14445/22312803/IJCTT-V23P138

MLA

Ms. Savita Verma, Dr. Pushpender sarao "Advanced secured Authentication through Firewall in NSC". International Journal of Computer Trends and Technology (IJCTT) V23(4):184-191, May 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consider this problem in order to improve the network security and enhance secure shell daemon protection. A mechanism, QKNOCK, improving upon the potentialities of technologies such as port knocking and SPA (Single Packet Authorization), using Firewall and Cryptography, has been proposed.

References
[1] Sebastian Janquier (2006) “Port Knocking Analysis with Single Packet Authorization” : Master’s Thesis, USA.
[2] http://www.linuxforu.com/2012/05/cyber-attacks-explained-packet-crafting/
[3] Isaacs, R., Jardetzky, P.,Mortier, R., Roscoe, T.: Techniques for lightweight concealment and authentication in IP networks. Technical Report IRB-TR-02-009, Intel Research Berkeley (July 2006).
[4] Rash Michael (2004) Available at Website http://www.cipherdyne.org/fwknop/docs/SPA.htm,
[5]http://www.cipherdyne.org/LinuxFirewalls/ch06
[6] Kumar Rajesh,Talwar I.M,Kumar Kapil , “ A Modified Approach to Analysis and Design of Port Knocking Technique”, International Journal of Computational Intelligence and Information Security(September 2012) Vol 3 (7), pp (28-39)
[7] Postel, J. (ed.): Transmission control protocol (1981),http://www.ietf.org/rfc/rfc0793.txt.
[8] Bleichenbacher,D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1.In :Krawczyk,H.(ed.)CRYPTO 1998LNCS,vol.1462,pp.1-12.Springer, Heidelberg(1998)
[9] Smits R., Jain D., Pidcock S., Goldberg I., Hengartner U. “Bridge SPA: Improving tor bridges with single packet authorization” (2011)Proceedings of the ACM Conference on Computer and Communications Security, pp. 93-101.
[10] M. Rash “Single Packet Authorization with fwknop” The USENIX Magazine,vol31,no1,Feb 2006.pp63-69[Online]Available http://www.usenix.org/publications/login/200602/pdfs/rash.pdf.
[11] Agrawal S., Boneh , D. Homomorphic MAC’s: MAC based integrity for network coding(2009) Applied Cryptography Network Security,5536,pp.292-305.
[12]http://www.cipherdyne.org/fwknop/docs/fwknop-tutorial.html#4.2 ( October 2012)
[13] Eugene Y. Vasserman,Nicholas Hopper,John Laxson,and James Tyra “SILENTKNOCK : Practical, Provably Undetectable Authentication Vol.8, pp. 121- 135 (2009).Available at http://sclab.cs.umn.edu/node/151

Keywords
QKNOCK, SSH Daemon, Network Security, Port knock, IP Spoofing, Key-Exchange, Single Packet Authorization, Fwknop, AfterGlow, Gnuplot.