On Firewalls and Tunneling
نویسندگان
چکیده
This paper gives a comprehensive overview of the stateof-the-art in rewall and tunneling technologies. We describe the major rewall components and several approaches for legitimate and illegitimate tunneling techniques and investigate their interrelations. Finally we shortly introduce a highly adaptable tunneling application, having the potential to circumvent virtually every rewall system.
منابع مشابه
The futility of common firewall policies: an experimental demonstration
Many healthcare organizations utilize network "firewalls" to protect their networks from being accessed by unauthorized external entities. These same firewalls are also often configured to deny access to certain external services from within the internal network. The latter policy can be subverted through a "protocol tunneling" strategy, which has been implemented as a set of programs called "F...
متن کاملDNS Tunneling for Network Penetration
Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but a...
متن کاملRoom Temperature Hydrogen Sensor Based on Single-Electron Tunneling Between Palladium Nanoparticles
In this paper, we present the results of single-electron tunneling in two-dimensional (2D) hexagonal closed packed arrays of palladium nanoparticles. After inspecting the emergence of Coulomb blockade phenomena, we demonstrate the possibilities of using these arrays as a single-electron tunneling based hydrogen sensor. We assumed arrays of palladium nanoparticles with diameters of 3.5 and 6...
متن کاملTrapping and Tracking Hackers: Collective security for survival in the Internet age
Problems arise because these tools are too often expected to provide broader coverage than their designs permit. The limitations of "prevention" tools are that (1) there is typically a large gap in time between the identification of the vulnerability and the availability of the solution, and (2) partial and faulty deployment resulting in gaps in coverage. Tools for response to individual attack...
متن کاملAccelerating the Performance of Software Tunneling Using a Receive Offload-Aware Novel L4 Protocol
An L2-in-L3 tunneling technology plays an important role in network virtualization based on the concept of Software-Defined Networking (SDN). VXLAN (Virtual eXtensible LAN) and NVGRE (Network Virtualization using Generic Routing Encapsulation) protocols are being widely used in public cloud datacenters. These protocols resolve traditional VLAN problems such as a limitation of the number of virt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006