Implementation of Modified Hybrid Port Knocking (MHPK) with Strong Authentication

نویسندگان

  • Priyanka Sahu
  • Megha Singh
  • Deepak Kulhare
  • Hussein Al-Bahadili
  • Ali H. Hadi
  • Ali Hussein
چکیده

Port Knocking is an important concept to secure services provided by the servers. By a predefined port knocking sequence server identify whether the request is a legitimate request for a service. This paper presents an analyzing the network security concept of Port Knocking and assesses their suitability as firewall authentication mechanisms for opening network ports or performing certain actions on servers. This paper are developing and evaluating the performance of a new proposed modified hybrid port knocking (MHPK) technique with proposed encryption/decryption technique. Prime concerned of the proposed work is to prevent different –different types of port attack and fulfill the entire security requirement for network. Proposed technique is the combination of four concepts, these are port knocking (PK), proposed Symmetric key encryption/decryption, steganography and mutual authentication. Basically it is the enhanced modification of hybrid port knocking therefore; it is referred to as the modified hybrid port-knocking (MHPK) technique. The improvements of this development over existing port knocking mitigate some threats, but various concerns still exist. Development aimed at the enterprise quality will need to address additional needs. In conclusion, port knocking deserves future consideration and can be a valuable layer in defense-in-depth. The performance of the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Better Port Knocking With Strong Authentication

It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an authentication service to achieve this goal, and then examine one such method, “port knocking”, and its existing implementations, in detail. We improve upon these existing implementations by presenting a novel port knocki...

متن کامل

Network Security Using Hybrid Port Knocking

The main objective of this work is to develop and evaluate the performance of a new PK technique, which can avert all types of port attacks and meets all network security requirements. The new technique utilizes three wellknown concepts, these are: port-knocking (PK), steganography, and mutual authentication, therefore, it is referred to as the hybrid port-knocking (HPK) technique. It can be us...

متن کامل

Attacks on Port Knocking Authentication Mechanism

Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before they can be widely used. In this paper, we analyze some weaknesses of the port knocking authentication method that makes it vulnerable to many attacks. We will present the NAT-Knocking attack, in which an unauthorized used can...

متن کامل

Network Security using Firewall and Cryptographic Authentication

The network Security is the hottest topic in the current research scenario. The information security is really threatened by obnoxious users. With increasing vulnerabilities, caused by port scan attacks, replay attacks and predominantly IP Spoofing, targeting services, the network behavior is getting malevolent. But there is a lack of any clear threat model. The authors have endeavored to consi...

متن کامل

, U . K . Isbn : 978 - 988 - 98671 - 9 - 5 Wce 2008

techniques that provide firewall-level authentication to ensure authorized access to potentially vulnerable network services. Although these techniques serve as powerful protection mechanism against the intruders, they still suffer from a major problem. The lack of association between the authentication process and the follow-on TCP connection to be established is the most crucial problem still...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013