Dynamic Port Generation Using Any Communication Protocol over Custom Security Layer
نویسندگان
چکیده
Now-a-days, with the increase in the use of resources over a network, many people are failing to access their required resources. This is caused due to unavailability of ports. Unfortunately, reserved ports can be accessed only when the ports are free. If there is a communication link, some ports will regret to accept any new incoming connections and we need to wait until other connection closes its established link. To overcome this problem, client-server architecture is meliorated to certain standards for having dynamic ports. This also uses a table for storing of connections for further reference. In addition to that, a custom security layer is introduced for protection of data from an attacker. This becomes most useful when there is heavy network where network resources are not adequate.
منابع مشابه
Security testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملINTERNET - DRAFT Rohit Khare < draft - ietf - tls - http - upgrade - 00 . txt > UC Irvine
This memo proposes a mechanism to upgrade HTTP/1.1 connections to use Transport Layer Security (TLS). Using an Upgrade: TLS/x.y request header would allow unsecured and secured traffic to share the same port (in this case, 80). A companion document describes the current practice of using a separate port for HTTP over TLS, .
متن کاملDynamic Application-Layer Protocol Analysis for Network Intrusion Detection
Many network intrusion detection systems (NIDS) rely on protocol-specific analyzers to extract the higher-level semantic context from a traffic stream. To select the correct kind of analysis, traditional systems exclusively depend on well-known port numbers. However, based on our experience, increasingly significant portions of today’s traffic are not classifiable by such a scheme. Yet for a NI...
متن کاملInternet - Draft HTTP Over TLS
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as ''work in progress.'' To learn the current status of any Internet-Draft, please check the ''1id-abstracts.txt'' listing contained in the Internet-Drafts Shad...
متن کاملInternet - Draft HTTP Over TLS
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as ''work in progress.'' To learn the current status of any Internet-Draft, please check the ''1id-abstracts.txt'' listing contained in the Internet-Drafts Shad...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014