Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
ISORC '03 Proceedings of the Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
An Architecture for High Performance Network Analysis
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
Profiling and Optimization of Software-Based Network-Analysis Applications
SBAC-PAD '03 Proceedings of the 15th Symposium on Computer Architecture and High Performance Computing
Hi-index | 0.00 |
This paper describes several authentication methods and presents a software packet that implements them in order to improve the application security of programs that offers services in Internet. The communication in the server side is done at the link layer. So it is possible to transmit data although the ports are closed. At advantage, these services can not be detected when the attackers use portscans to probe networks and determine what services are active in the host because the ports are closed at transport layer. Four different methods have been developed. These techniques can be used in different environments and situations in order to obtain several security levels. A server and a client program which implement the four methods have been created. If the authentication is positive the server offers the possibility to the client of running some commands as a request of the client. The client helps to obtain the authentication process and makes it easier.