On Firewalls and Tunneling

نویسندگان

  • J. Frommer
  • A. Wiesmaier
چکیده

This paper gives a comprehensive overview of the stateof-the-art in rewall and tunneling technologies. We describe the major rewall components and several approaches for legitimate and illegitimate tunneling techniques and investigate their interrelations. Finally we shortly introduce a highly adaptable tunneling application, having the potential to circumvent virtually every rewall system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The futility of common firewall policies: an experimental demonstration

Many healthcare organizations utilize network "firewalls" to protect their networks from being accessed by unauthorized external entities. These same firewalls are also often configured to deny access to certain external services from within the internal network. The latter policy can be subverted through a "protocol tunneling" strategy, which has been implemented as a set of programs called "F...

متن کامل

DNS Tunneling for Network Penetration

Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but a...

متن کامل

Room Temperature Hydrogen Sensor Based on Single-Electron Tunneling Between Palladium Nanoparticles

In this paper, we present the results of single-electron tunneling in two-dimensional (2D) hexagonal closed packed arrays of palladium nanoparticles. After inspecting the emergence of Coulomb blockade phenomena, we demonstrate the possibilities of using these arrays as a single-electron tunneling based hydrogen sensor. We assumed arrays of palladium nanoparticles with diameters of 3.5 and 6...

متن کامل

Trapping and Tracking Hackers: Collective security for survival in the Internet age

Problems arise because these tools are too often expected to provide broader coverage than their designs permit. The limitations of "prevention" tools are that (1) there is typically a large gap in time between the identification of the vulnerability and the availability of the solution, and (2) partial and faulty deployment resulting in gaps in coverage. Tools for response to individual attack...

متن کامل

Accelerating the Performance of Software Tunneling Using a Receive Offload-Aware Novel L4 Protocol

An L2-in-L3 tunneling technology plays an important role in network virtualization based on the concept of Software-Defined Networking (SDN). VXLAN (Virtual eXtensible LAN) and NVGRE (Network Virtualization using Generic Routing Encapsulation) protocols are being widely used in public cloud datacenters. These protocols resolve traditional VLAN problems such as a limitation of the number of virt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006