Implementation of a Secured system with Roaming Server and Roaming Ports

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 5

Abstract

The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS) [5] attacks. This system uses more than one server for providing security. But only one server will be active at a time. The inactive servers act as Roaming Honeypots[9]. The source address of any request that hits a honeypot is recorded and all its future requests are dropped. Thus this system acts as an Intrusion Detection System (IDS). It is impossible to identify the active servers and the honeypots at a given moment even if attackers obtain the identities of all servers. Moreover the UDP/TCP port number used by the server varies as a function of time and a shared secret between the server and the client. This mechanism simplifies both the detection and filtering of malicious packets and it does not require any change to existing protocols. This port hopping[10] or roaming port technique is compatible with the UDP and TCP protocols. This system can be implemented in real time successfully.

Authors and Affiliations

R. Bharathi , Prof. Dr. R. Sukanesh

Keywords

Related Articles

An Ellipsoidal 3D Shape Representation and Wavelet Transform Feature Descriptor for 3D Shape Retrieval

For the year of past most three-dimensional objects are represented and mapped with spherical function. Since the mapping preserves important criteria such as geometrical information of a 3D object, the representation of...

Comparison of Optimal Homotopy Asymptotic Method with Homotopy Perturbation Method of Twelfth Order Boundary Value Problems

In this work, we consider special problem consisting of twelfth order two-point boundary value by using the Optimal Homotopy Asymptotic Method and Homotopy Perturbation Method. Now, we discuss the comparison in between O...

A Novel Approach for clustering web user sessions using RST

Web usage mining has assumed importance in learning about web user's behavior and user interactions with the website. It uses data mining techniques to discover non-trivial user behavior patterns. These patterns can then...

A Framework For An E-Learning System Based on Semantic Web

E-Learning is efficient, task relevant and just-in-time learning grown from the learning requirements of the new, dynamically changing, distributed business world. The term “Semantic Web” encompasses efforts to build a n...

A Novel Approach for Social Network Analysis & Web Mining for Counter Terrorism

Terrorists and extremists are increasingly utilizing Internet technology as an effective mode to enhance their ability to influence the outside world. Lack of multilingual and multimedia terrorist/extremist collections a...

Download PDF file
  • EP ID EP102810
  • DOI -
  • Views 111
  • Downloads 0

How To Cite

R. Bharathi, Prof. Dr. R. Sukanesh (2011). Implementation of a Secured system with Roaming Server and Roaming Ports. International Journal on Computer Science and Engineering, 3(5), 1781-1786. https://europub.co.uk/articles/-A-102810