The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a framework for a firewall to analyze and block BitTorrent file-sharing protocol using Traffic Analysis (TA) methods. BitTorrent traffic can be a concern of network administrators and is a valuable target for TA based investigation. In this work, the ability of a TA based classifier to identify the existence of BitTorrent traffic is tested under the condition that it is not only...
This paper details how to setup and test the new tunneling features of OpenSSH to establish an enhanced SSH Layer 3 VPN between three computers in a Wide Area Network (WAN) environment. The OpenSSH security feature will be explored to provide secure tunneling and different authentication methods. Using OpenSSH to built VPN will cater for security by encrypting the data transmitted across the public...
This paper presents mechanisms for identification of web traffic masqueraded behind encrypted Virtual Private Network (VPN) tunnels. Website identification using Traffic Analysis (TA) has many administrative applications including preventing access to forbidden websites and site-specific Quality of Service (QoS) provisioning. Previous works in this area mainly looked at the problem of identifying...
In this paper, we are concerned with techniques for establishing confidentiality of user-generated content (UGC), shared in centralised and untrusted online social networks (OSNs). We describe how the concepts of secret sharing and steganography can be combined to result in a technique for sending confidential messages, as part of a proposed architecture for a virtual private social network (VPSN)...
Most of the early Virtual Private Networks (VPN) connection came from the vendors of networking hardware and software to satisfy one time goal of security in communication in a remote way. The first and foremost of the solution of VPN is to introduce the security protocols like IPSec. IPSec uses cryptography in order to encrypt and authenticate the traffic flowing between point of interest. This is...
IPSec technology is important in computer network security, it is an IP layer security frame agreement formulated by IETF. This paper introduces the principle and the related concept, and discusses the actual application scenes.
With the growth of Internet in the recent decades, business environment have transformed to take advantage of the new opportunities offered by this global phenomenon. Fundamental changes have occurred to data and communications networks and one such change has been the use of Virtual Private Network (VPN) to establish organizational networks that may span many geographic locations. VPN solution is...
In recent years, distributed systems are connected by VPN (Virtual Private Network) through the Internet, and construct complicated information systems. These information systems bring benefit and security risks to many users. Representative security risks, vulnerabilities are closely related to application software installed in information systems. If a malicious adversary identifies the application...
Most of the major providers of networking hardware and software came up with solutions for VPN connections. Companies use VPN connections in order to secure communications between branches or for remote workers. One of the most encountered ways of securing communications is to use IPsec VPN. This protocol uses cryptography in order to encrypt and authenticate the traffic flowing between points of...
Access point sharing communities are an attractive solution for low-cost global mobile Internet access. However, existing communities all require a central authority in form of a certificate authority or an authentication server. In this paper, we show how such a community network can be created without a central entity. We introduce a mechanism called remote station approval; a host can use it to...
The ability to define domain names for resources in a collaborative virtual organization is usually reserved to network administrators through centralized domain name servers. We propose SocialDNS, a decentralized, naming service that gives individual collaborators the power to choose the domain names for their resources. Our approach is based on similar concepts of decentralized naming solutions...
It introduced virtual private network (VPN) technology and its classification in network security protection system. The advantages of VPN technology in establishing security protection system were analyzed. Four kinds of key technology of VPN including tunneling, encryption & decryption, key management and authentication were presented. Taking electric power data network and load management system...
Mobile users need to have access to internal resources on their enterprise or home network from remote locations in an efficient but secure way. Currently, such a secured access is realised with Virtual Private Network (VPN) connections. Although operational, the current VPN solutions suffer of severe limitations. Most of the VPN solutions are not sufficiently secured since they are using weak authentication...
An innovative mechanism of a file-backup system concept is proposed. In the proposed file backup mechanism, the combination of the following technologies such as a spatial random scrambling of file data, a subsequent random fragmentation of the file, the corresponding encryption and duplication for each fragmented one by using a stream cipher code in each encryption stage, and the corresponding notification...
TCOMS (the telecom comprehensive operations management system) is one of the support systems in operation and production of telecom-company, which not only covers wide area, but also has a complex construction and Internet connection. So, this kind of network, involving important information transportation, requires safety guarantees. In view of the importance, this paper puts forward a network safety...
In order to solve security problems in web-based information systems in the large-scale distributed environment, we design a comprehensive security policy. We realize the single entry mechanism of multi-system access by using the single-sign-on, create identity authentication mechanism of high-reliability and security based on China's second-generation ID card. We also propose the cross-domain setup...
This paper first discusses the classic methods of covert communication to traverse the firewall devices which control the network communication. And based on the analysis of IPSec protocol architecture, that the worse of network compatibility of IPSec is got. So the new IPSec over HTTP protocol based on IPSec tunnel and HTTP tunnel is exposed including its structure and procedure. The soft structure...
IPSec VPN is commonly used to implement secure communications between different branch intranets over public networks. Multi-link aggregate IPSec VPN can make better use of multiple physical links of corporation. On the basis of analysis on the insufficiency of packet-based scheduling, a session-based tunnel scheduling model for multi-link aggregate IPSec VPN is proposed. The new model can distribute...
This paper presents a viewpoint of the management for the Future Internet. For this description we consider the architectural model developed by the EU IST Autonomic Internet - AUTOI - consortium for the management design of the Future Internet as a service- and self-aware network that guarantees built-in orchestrated reliability, robustness, mobility, context, access, security, service support and...
Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. This is because these networks can be set-up with a lower cost of ownership compared to other means of securing communications. VPN is a proven technology that does provide security strong enough for business use. However, performance of these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.