An Implementation: Enhancing Security of Network System Using IP Filter and Cryptography (original) (raw)
Related papers
Network Security Using Cryptographic Techniques
2012
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level of protection for Hardware and Software , and information in a network. Only one particular element underlies many of the security mechanisms in use: Cryptographic techniques; hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication.
NETWORK SECURITY AND CRYPTOGRAPHY
NETWORK SECURITY AND CRYPTOGRAPHY , 2024
The idea of network security involves using encryption to secure data transmitted wirelessly and guarantee message contents remain confidential. The primary component of safe data transfer across an unstable network is data security. Authorizing access to data on a network, which is under the network administrator's authority, is a component of network security. Both the public and private sectors of computer networks use network security. Both private and public networks are utilized in businesses, organizations, universities, etc. Ensuring the security of end systems and the network as a whole is the responsibility of network security. Numerous applications, including those in banks, businesses, organizations, government agencies, and enterprises, require network security. Cryptography: When a sender applies a hash function-a cryptographic operation-to the original message, nobody else can decipher the message received save for the person holding the decipher key. A hash function is a mathematical representation of data, and the receiver determines the value of this hash function whenever any new data is received. Data security is achieved via a method known as cryptography. Therefore, it can be said that cryptography is a cutting-edge technology that is crucial to network security. Early on, however limited in its application, encryption was utilized to safeguard diplomatic correspondence, military secrets, and national security. The development of communication has led to a significant expansion in the spectrum of applications for cryptography in this modern domain. Cryptography is a vital tool for protecting electronic commerce and is practically necessary to guarantee that data is safe from intrusions.
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2022
Due to growing demoing of networking there remains need of data security. There are different type of threat to data that is travelling over network. Different researcher have proposed firewall mechanism to filter the un authentic transmission while some researcher focused on data encryption to convert plain text in cipher text. Encryption makes the data secure from being understood by unauthentic user but it does not provide security to data at the time of denial of services or packet dropping. However firewall protects data in such cases but integration of firewall and encryption reduces the system performance. Thus there is need to focus of research where performance should be enhanced while integration of encryption and firewall.
Secure TCP-IP Network Algorithm
International Journal of Advance Research and Innovative Ideas in Education, 2020
In recent days network plays a key role in most modern applications. Especially through the services provided by Internet. Our paper presents simple rigid network security system. The system adopt the Transmission Control Protocol (TCP) as main protocol. TCP protocol is reliable connection protocol, but the main security method use are simple. And there is a need to improve its facilities. Blowfish is simple fast secure algorithm. By adopting the Blowfish method in specific position in the hierarchy of the TCP-IP layer a new secure model will be result. Also the system has the ability to be used with any recent application by follow simple steps.
Secure Socket Layer in the Network and Web Security
2020
In order to electronically exchange information between network users in the web of data, different software such as outlook is presented. So, the traffic of users on a site or even the floors of a building can be decreased as a result of applying a secure and reliable data sharing software. It is essential to provide a fast, secure and reliable network system in the data sharing webs to create an advanced communication systems in the users of network. In the present research work, different encoding methods and algorithms in data sharing systems is studied in order to increase security of data sharing systems by preventing the access of hackers to the transferred data. To increase security in the networks, the possibility of textual conversation between customers of a local network is studied. Application of the encryption and decryption algorithms is studied in order to increase security in networks by preventing hackers from infiltrating. As a result, a reliable and secure commun...
CRYPTOGRAPHY TECHNOLOGY WITH NETWORK SECURITY
International Journal for Recent Development in Science & Technology, 2020
Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with its principles. Cryptographic systems with ciphers are described. The cryptographic models and algorithms are outlined.
Internet is the primary computer miracles among computer users because of viruses separation in all communication devices, and some of these viruses will lead to creating some problems in computer hardware and software. Thus, hackers will have lots of opportunities to hack user's tools. This research is provided a new approach to securing clients IP address at the time they connected to the internet. This operation will be done by using new encryption techniques in three stages. Similarly, the same procedures of encryption will be established for data that will be transferred over the network between clients. Thus, intruders’ and hackers may get obstacles to get the real data and IP address that are the central point for hacking.
Design of the host guard firewall for network protection
2008
This paper presents a new design for a packet filtering firewall, called Host Guard Firewall (HGF) which helps to mitigate the most pressing problems facing the global Internet It presents also a new designed Host Guard Protocol (HGP) which help to authenticate the authorized packet. The new designed HGF firewall acts in the reverse direction like a military check point that does not allow any one to cross the point without an authenticated permission. The authenticated permission here is an authentication mark given to the passing authorized packets. The HGF is used as a DoS defense system deployed at a source-end network. The HGP guarantees the authenticity between the hosts on the network. This is done by signing the trusted outgoing packets with the HGP authentication mark which is the permission of passing of these packets through the network. The HGP mark is proposed as a puzzle which is generated and identified with the same intended programs. The authentication mark could be...
A New Way Towards Security in TCP/IP Protocol Suite
Internet Control Message Protocol is a protocol which is mainly used to provide information relating to errors on networked machines. Considering the few controls that IP protocol carries out, it not only allows errors to be corrected but also informs the protocols of neighboring layers of these errors. So, ICMP protocol is used by all routers, who use it to indicate an error (called a Delivery Problem). ICMP error messages are sent over the network in a datagram form, like any other data. So, the error messages themselves can be subject to errors. ICMP messages are used by the network administrators for troubleshooting the networks. Even though this protocol has many advantages, there are some of the flaws such as security,which is a major concern to be considered and to be eliminated. In this paper, we present an existing scenario and provide the authentication mechanism for ICMP messages. We also propose enhanced Packet format for ICMP message in such a way that authentication can be done. Kerberos algorithm is used for authentication mechanism which uses private key encryption method.
Review on Network Security and Cryptography
Science and Education Publishing
With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe transmission of information through the internet. Also network security issues are now becoming important as society is moving towards digital information age. As more and more users connect to the internet it attracts a lot of cyber-criminals. It comprises authorization of access to information in a network, controlled by the network administrator. The task of network security not only requires ensuring the security of end systems but of the entire network. In this paper, an attempt has been made to review the various Network Security and Cryptographic concepts. This paper discusses the state of the art for a broad range of cryptographic algorithms that are used in networking applications.