Port knocking / Saadiah Yahya and Mohamed Sulaiman Sultan Suhaibuddeen

Around the globe, network administrators are challenged to balance flexibility and security elements when designing and maintaining their network infrastructure. Firewalls are a long-standing basic security measure that organizations use to isolate networks from the Internet. Whether it's a sta...

Full description

Saved in:
Bibliographic Details
Main Authors: Yahya, Saadiah, Sultan Suhaibuddeen, Mohamed Sulaiman
Format: Conference or Workshop Item
Language:English
Published: 2006
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/81194/1/81194.PDF
https://ir.uitm.edu.my/id/eprint/81194/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Mara
Language: English
id my.uitm.ir.81194
record_format eprints
spelling my.uitm.ir.811942023-08-11T03:20:37Z https://ir.uitm.edu.my/id/eprint/81194/ Port knocking / Saadiah Yahya and Mohamed Sulaiman Sultan Suhaibuddeen Yahya, Saadiah Sultan Suhaibuddeen, Mohamed Sulaiman Web servers. Internet Around the globe, network administrators are challenged to balance flexibility and security elements when designing and maintaining their network infrastructure. Firewalls are a long-standing basic security measure that organizations use to isolate networks from the Internet. Whether it's a stand-alone appliance firewall like CheckPoint, one of the various host-based systems such as ZoneAlarm, or the Windows Firewall system included with Windows XP Service Pack 2, these devices go a long way toward protecting networks from unwanted traffic, including viruses, Trojans, and hackers. A firewall should provide some form of shield against malfeasant motives by adding an extra layer of network security allowing trusted and authorized users to connect through. Unfortunately, it is not as easy as it sounds: it is a tough task to come up with a mechanism to distinguish the bad guys, because filtering on the basis of IP addresses and ports does not differentiate connecting users. Bad guys possible and do come from trusted IP addresses. On the other hand, open ports remain a consciously known vulnerability. Building up a very secure rule sets and policies alone appear insufficient. Port Knocking a method of establishing a connection to a secured network or computer within a network that does not have an open port is the answer. A remote device sends a series of series of connection attempts in the form of packets, to the computer's closed ports, and the attempts are silently ignored but logged by the firewall. When the remote device has established the predetermined sequence of port connection attempts, a daemon triggers a port to open, and the network connection is established. An advantage of using a port knocking technique is that a malicious hacker cannot detect ifa device is listening for port knocks. Having port knocking alone to handle a high secure site is not sufficient, therefore, combining it with another technology called "Wake-On-LAN" (WOL) definitely will synergize the outcome. This research is investigating the Port Knocking technology on the protected system and determines whether interaction between Wak-On-LAN and Port Knocking can offer a better-synergized security system. The effectiveness and practicality of having another layer of protection for the server in DMZ area using this method on the firewall, and more broadly measures the performance and resources usage impact of the server involved in the study is exploited. This include investigating the way how the firewall have the intelligence to avoid log rotate issues, how the firewall have the intelligence to tell whether the server is already alive or idle, and also the firewall know when is the correct time to drop all the remote connection to the server and later suspend the server. 2006 Conference or Workshop Item PeerReviewed text en https://ir.uitm.edu.my/id/eprint/81194/1/81194.PDF Port knocking / Saadiah Yahya and Mohamed Sulaiman Sultan Suhaibuddeen. (2006) In: Volume No. 1: Science and Technology, 30 – 31 May 2006, Swiss Garden Resort & Spa Kuantan, Pahang.
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Web servers. Internet
spellingShingle Web servers. Internet
Yahya, Saadiah
Sultan Suhaibuddeen, Mohamed Sulaiman
Port knocking / Saadiah Yahya and Mohamed Sulaiman Sultan Suhaibuddeen
description Around the globe, network administrators are challenged to balance flexibility and security elements when designing and maintaining their network infrastructure. Firewalls are a long-standing basic security measure that organizations use to isolate networks from the Internet. Whether it's a stand-alone appliance firewall like CheckPoint, one of the various host-based systems such as ZoneAlarm, or the Windows Firewall system included with Windows XP Service Pack 2, these devices go a long way toward protecting networks from unwanted traffic, including viruses, Trojans, and hackers. A firewall should provide some form of shield against malfeasant motives by adding an extra layer of network security allowing trusted and authorized users to connect through. Unfortunately, it is not as easy as it sounds: it is a tough task to come up with a mechanism to distinguish the bad guys, because filtering on the basis of IP addresses and ports does not differentiate connecting users. Bad guys possible and do come from trusted IP addresses. On the other hand, open ports remain a consciously known vulnerability. Building up a very secure rule sets and policies alone appear insufficient. Port Knocking a method of establishing a connection to a secured network or computer within a network that does not have an open port is the answer. A remote device sends a series of series of connection attempts in the form of packets, to the computer's closed ports, and the attempts are silently ignored but logged by the firewall. When the remote device has established the predetermined sequence of port connection attempts, a daemon triggers a port to open, and the network connection is established. An advantage of using a port knocking technique is that a malicious hacker cannot detect ifa device is listening for port knocks. Having port knocking alone to handle a high secure site is not sufficient, therefore, combining it with another technology called "Wake-On-LAN" (WOL) definitely will synergize the outcome. This research is investigating the Port Knocking technology on the protected system and determines whether interaction between Wak-On-LAN and Port Knocking can offer a better-synergized security system. The effectiveness and practicality of having another layer of protection for the server in DMZ area using this method on the firewall, and more broadly measures the performance and resources usage impact of the server involved in the study is exploited. This include investigating the way how the firewall have the intelligence to avoid log rotate issues, how the firewall have the intelligence to tell whether the server is already alive or idle, and also the firewall know when is the correct time to drop all the remote connection to the server and later suspend the server.
format Conference or Workshop Item
author Yahya, Saadiah
Sultan Suhaibuddeen, Mohamed Sulaiman
author_facet Yahya, Saadiah
Sultan Suhaibuddeen, Mohamed Sulaiman
author_sort Yahya, Saadiah
title Port knocking / Saadiah Yahya and Mohamed Sulaiman Sultan Suhaibuddeen
title_short Port knocking / Saadiah Yahya and Mohamed Sulaiman Sultan Suhaibuddeen
title_full Port knocking / Saadiah Yahya and Mohamed Sulaiman Sultan Suhaibuddeen
title_fullStr Port knocking / Saadiah Yahya and Mohamed Sulaiman Sultan Suhaibuddeen
title_full_unstemmed Port knocking / Saadiah Yahya and Mohamed Sulaiman Sultan Suhaibuddeen
title_sort port knocking / saadiah yahya and mohamed sulaiman sultan suhaibuddeen
publishDate 2006
url https://ir.uitm.edu.my/id/eprint/81194/1/81194.PDF
https://ir.uitm.edu.my/id/eprint/81194/
_version_ 1775626408805007360