Dynamic Port Generation Using Any Communication Protocol over Custom Security Layer

نویسندگان

  • Siva Srinivasa
  • Rao Mothukuri
چکیده

Now-a-days, with the increase in the use of resources over a network, many people are failing to access their required resources. This is caused due to unavailability of ports. Unfortunately, reserved ports can be accessed only when the ports are free. If there is a communication link, some ports will regret to accept any new incoming connections and we need to wait until other connection closes its established link. To overcome this problem, client-server architecture is meliorated to certain standards for having dynamic ports. This also uses a table for storing of connections for further reference. In addition to that, a custom security layer is introduced for protection of data from an attacker. This becomes most useful when there is heavy network where network resources are not adequate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

INTERNET - DRAFT Rohit Khare < draft - ietf - tls - http - upgrade - 00 . txt > UC Irvine

This memo proposes a mechanism to upgrade HTTP/1.1 connections to use Transport Layer Security (TLS). Using an Upgrade: TLS/x.y request header would allow unsecured and secured traffic to share the same port (in this case, 80). A companion document describes the current practice of using a separate port for HTTP over TLS, .

متن کامل

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection

Many network intrusion detection systems (NIDS) rely on protocol-specific analyzers to extract the higher-level semantic context from a traffic stream. To select the correct kind of analysis, traditional systems exclusively depend on well-known port numbers. However, based on our experience, increasingly significant portions of today’s traffic are not classifiable by such a scheme. Yet for a NI...

متن کامل

Internet - Draft HTTP Over TLS

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as ''work in progress.'' To learn the current status of any Internet-Draft, please check the ''1id-abstracts.txt'' listing contained in the Internet-Drafts Shad...

متن کامل

Internet - Draft HTTP Over TLS

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as ''work in progress.'' To learn the current status of any Internet-Draft, please check the ''1id-abstracts.txt'' listing contained in the Internet-Drafts Shad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014