International Journal of Management and Applied Science (IJMAS)
.
current issues
Volume-5,Issue-8  ( Aug, 2019 )
Past issues
  1. Volume-5,Issue-8  ( Aug, 2019 )
  2. Volume-5,Issue-7  ( Jul, 2019 )
  3. Volume-5,Issue-6  ( Jun, 2019 )
  4. Volume-5,Issue-5  ( May, 2019 )
  5. Volume-5,Issue-4  ( Apr, 2019 )
  6. Volume-5,Issue-3  ( Mar, 2019 )
  7. Volume-5,Issue-2  ( Feb, 2019 )
  8. Volume-5,Issue-1  ( Jan, 2019 )
  9. Volume-4,Issue-12  ( Dec, 2018 )
  10. Volume-4,Issue-11  ( Nov, 2018 )

Statistics report
Oct. 2019
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 66
Paper Published : 4089
No. of Authors : 8401
  Journal Paper




Paper Title :
An Efficient Combined Security Model For Network Using Hybrid Port Knocking Technique

Author :Venkateswarlu Sunkari, Ato Daniel Abebe

Article Citation :Venkateswarlu Sunkari ,Ato Daniel Abebe , (2016 ) " An Efficient Combined Security Model For Network Using Hybrid Port Knocking Technique " , International Journal of Management and Applied Science (IJMAS) , pp. 138-142, Volume-2,Issue-11, Special Issue-2

Abstract : The main objective of this work is to develop and evaluate the performance of a new port knocking(PK) technique, which can avert all types of port attacks and meets all network security requirements. The new technique utilizes three well-known concepts, these are: port-knocking (PK), steganography, and mutual authentication, therefore, it is referred to as the hybrid port-knocking (HPK) technique. It can be used for host authentication to make local services invisible from port scanning, provide an extra layer of security that attackers must penetrate before accessing or breaking anything important, act as a stop-gap security measure for services with known un-patched vulnerabilities, and provide a wrapper for a legacy or proprietary services with insufficient integrated security. The performance of the proposed technique was evaluated by measuring the average authentication time, which also compared with the average authentication time for a number of currently used port authentication techniques. Keywords- Network security, Firewalls, Authentication, Port-knocking, Steganography, Cryptography.

Type : Research paper


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 20
| Published on 2016-12-21
   
   
IRAJ Other Journals
IJMAS updates
IJMAS -THANK YOU ALL FOR CONTRIBUTING YOUR PAPER TO IJMAS JULY ISSUE.ALL AUTHORS ARE REQUESTED TO GET THEIR HARD COPY NOW.
The Conference World
Facebook

JOURNAL SUPPORTED BY