DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY
نویسندگان
چکیده
منابع مشابه
Network Security Using Hybrid Port Knocking
The main objective of this work is to develop and evaluate the performance of a new PK technique, which can avert all types of port attacks and meets all network security requirements. The new technique utilizes three wellknown concepts, these are: port-knocking (PK), steganography, and mutual authentication, therefore, it is referred to as the hybrid port-knocking (HPK) technique. It can be us...
متن کاملAttacks on Port Knocking Authentication Mechanism
Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before they can be widely used. In this paper, we analyze some weaknesses of the port knocking authentication method that makes it vulnerable to many attacks. We will present the NAT-Knocking attack, in which an unauthorized used can...
متن کاملBetter Port Knocking With Strong Authentication
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an authentication service to achieve this goal, and then examine one such method, “port knocking”, and its existing implementations, in detail. We improve upon these existing implementations by presenting a novel port knocki...
متن کامل" Computer Network Security "
The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security. 1 What the book is about The book is intended as a textbook for a one-...
متن کاملEvaluating Different Cost-Benefit Analysis Methods for Port Security Operations
Service industries, such as ports, are attentive to their standards, a smooth service flow and economic viability. Cost benefit analysis has proven itself as a useful tool to support this type of decision making; it has been used by businesses and governmental agencies for many years. In this book chapter we demonstrate different modelling methods that are used for estimating input factors requ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cyber Security dan Forensik Digital
سال: 2020
ISSN: 2615-8442
DOI: 10.14421/csecurity.2020.3.2.2150