
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,427 |
Article View | 9,188,646 |
PDF Download | 5,620,932 |
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling | ||
پدافند الکترونیکی و سایبری | ||
Article 2, Volume 2, Issue 4, September 2020, Pages 25-40 PDF (674.98 K) | ||
Authors | ||
Mehran Pour Vahhab1; Reza Ebrahimi Atani* 2 | ||
1Senior Expert in Information Technology Engineering - Computer Networks, Gilan University Campus, Rasht, Iran | ||
2Assistant Professor, Department of Computer Engineering, Gilan University, Rasht, Iran | ||
Receive Date: 18 December 2013, Revise Date: 04 July 2023, Accept Date: 19 September 2018 | ||
Abstract | ||
The computer networks are always vulnerable to various attacks and these attacks are typically include identification attacks, acquire attacks and disabling services attacks. At identification attacks, the attackers attempt to gather information and identify running services, in order to achieve damage, acquiring or disabling services. Port-Knocking (PKn) is a unique method to prevent detection and exploiting vulnerable services by the attackers and in facts the aim of PKn is hiding the services from attacker's view and combat identifying attacks, while the authenticated users are allowed to access these hidden services. In this article, a new method to establish simplicity and use of existing tools at the most operating systems to eliminate specific programs for running processes and open ports PKn at any time and anywhere have been introduced. This novel PKn can create more complexity at Knock operation utilizing the specific ICMP and synchronizing by the use of web browsers, to reduce of replay attacks and eliminate the risk of DoS attacks by hidden the services. To insure the efficiency and capabilities of the proposed method, this technique is successfully implemented and ran on a MikroTik RouterOS operation system. | ||
Keywords | ||
Network Security; Service Security; Port Security; Authentication; Port-Knocking | ||
References | ||
[1] M. Krzywinski, “Port knocking from the inside | ||
Statistics Article View: 750 PDF Download: 704 |