Implementation of a Secured system with Roaming Server and Roaming Ports
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 5
Abstract
The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS) [5] attacks. This system uses more than one server for providing security. But only one server will be active at a time. The inactive servers act as Roaming Honeypots[9]. The source address of any request that hits a honeypot is recorded and all its future requests are dropped. Thus this system acts as an Intrusion Detection System (IDS). It is impossible to identify the active servers and the honeypots at a given moment even if attackers obtain the identities of all servers. Moreover the UDP/TCP port number used by the server varies as a function of time and a shared secret between the server and the client. This mechanism simplifies both the detection and filtering of malicious packets and it does not require any change to existing protocols. This port hopping[10] or roaming port technique is compatible with the UDP and TCP protocols. This system can be implemented in real time successfully.
Authors and Affiliations
R. Bharathi , Prof. Dr. R. Sukanesh
Security Enhancement Using Mutual Authentication in Existing CDMA Systems
Abstract— Even though CDMA2000 wireless networks are being widely deployed as a cellular digital standard around the world, it has some hidden vulnerabilities concerned with security issues. The existing CDMA systems use...
Distributed Architecture for Transactions Synchronization in Distributed Database Systems
Various concurrency control algorithms have been proposed for use in istributed database systems. But, the number of algorithms available for the distributed concurrency control, come into one of three basic classes: lo...
Image Retrieval using DWT with Row and Column Pixel Distributions of BMP Image
With the rapid development of technology of multimedia, the traditional information retrieval techniques based on keywords are not sufficient, content - based image retrieval (CBIR) has been an active research topic. The...
On the Timing Analysis of Cluster based Communication Devices for Large Scale Computing Systems
Many parallel computing environments utilize cluster based architecture for large scale computing owing to the ease of their availability. As the cluster based approach may be used extensively, the interconnection mechan...
Web-enabled Decision Support System on Most Probable Producing Ability and a Searchable Database on Herd Strength for Livestock Farm Management
An estimate of the producing ability of cattle, known as Most Probable Producing Ability (MPPA) is an important measure, which provides an estimate of future productivity of a dairy animal as the basis of the past produc...