International Journal of Management and Applied Science (IJMAS)
.
Follow Us On :
current issues
Volume-10,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-10,Issue-1  ( Jan, 2024 )
  2. Volume-9,Issue-12  ( Dec, 2023 )
  3. Volume-9,Issue-11  ( Nov, 2023 )
  4. Volume-9,Issue-10  ( Oct, 2023 )
  5. Volume-9,Issue-9  ( Sep, 2023 )
  6. Volume-9,Issue-8  ( Aug, 2023 )
  7. Volume-9,Issue-7  ( Jul, 2023 )
  8. Volume-9,Issue-6  ( Jun, 2023 )
  9. Volume-9,Issue-5  ( May, 2023 )
  10. Volume-9,Issue-4  ( Apr, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 119
Paper Published : 5065
No. of Authors : 10504
  Journal Paper


Paper Title :
An Efficient Combined Security Model For Network Using Hybrid Port Knocking Technique

Author :Venkateswarlu Sunkari, Ato Daniel Abebe

Article Citation :Venkateswarlu Sunkari ,Ato Daniel Abebe , (2016 ) " An Efficient Combined Security Model For Network Using Hybrid Port Knocking Technique " , International Journal of Management and Applied Science (IJMAS) , pp. 138-142, Volume-2,Issue-11, Special Issue-2

Abstract : The main objective of this work is to develop and evaluate the performance of a new port knocking(PK) technique, which can avert all types of port attacks and meets all network security requirements. The new technique utilizes three well-known concepts, these are: port-knocking (PK), steganography, and mutual authentication, therefore, it is referred to as the hybrid port-knocking (HPK) technique. It can be used for host authentication to make local services invisible from port scanning, provide an extra layer of security that attackers must penetrate before accessing or breaking anything important, act as a stop-gap security measure for services with known un-patched vulnerabilities, and provide a wrapper for a legacy or proprietary services with insufficient integrated security. The performance of the proposed technique was evaluated by measuring the average authentication time, which also compared with the average authentication time for a number of currently used port authentication techniques. Keywords- Network security, Firewalls, Authentication, Port-knocking, Steganography, Cryptography.

Type : Research paper

Published : Volume-2,Issue-11, Special Issue-2


DOIONLINE NO - IJMAS-IRAJ-DOIONLINE-6355   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 25
| Published on 2016-12-21
   
   
IRAJ Other Journals
IJMAS updates
IJMAS -THANK YOU ALL FOR CONTRIBUTING YOUR PAPER TO IJMAS MAY ISSUE. ALL AUTHORS ARE REQUESTED TO GET THEIR HARD COPY NOW.
The Conference World
Facebook

JOURNAL SUPPORTED BY