Implementation of authentication techniques across closed ports

  • Authors:
  • Ildefonso Ruano;Sergio Galan;Sebastian Garcia;Raquel Viciana

  • Affiliations:
  • Electronic, Telecommunication and Automatic Engineering Department, University of Jaen, Linares, Jaén, Spain;Electronic, Telecommunication and Automatic Engineering Department, University of Jaen, Linares, Jaén, Spain;Electronic, Telecommunication and Automatic Engineering Department, University of Jaen, Linares, Jaén, Spain;Electronic, Telecommunication and Automatic Engineering Department, University of Jaen, Linares, Jaén, Spain

  • Venue:
  • EHAC'06 Proceedings of the 5th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper describes several authentication methods and presents a software packet that implements them in order to improve the application security of programs that offers services in Internet. The communication in the server side is done at the link layer. So it is possible to transmit data although the ports are closed. At advantage, these services can not be detected when the attackers use portscans to probe networks and determine what services are active in the host because the ports are closed at transport layer. Four different methods have been developed. These techniques can be used in different environments and situations in order to obtain several security levels. A server and a client program which implement the four methods have been created. If the authentication is positive the server offers the possibility to the client of running some commands as a request of the client. The client helps to obtain the authentication process and makes it easier.