Secure TCP-IP Network Algorithm (original) (raw)

An Enhanced Security for TCP/IP Protocol Suite

Network and internet applications are growing rapidly in the recent past. These applications are used by thousands of users and controlled by different administrative entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for protecting confidential data. The Internet was however originally designed for research and educational purpose, not for commercial applications. So internet was not designed with security in mind. As the internet grows the existing security framework was not adequate for modern day applications. The main reason was due to the lack of security services in the TCP/IP Protocol Suite. The lack of authentication mechanism of TCP/IP Protocol Suite is mainly due to the poor protection mechanism of packets and broadcast nature of the lower layer protocols. Moreover there is no protection for the application layer of the network model. This paper presents the proposed security...

A New Way Towards Security in TCP/IP Protocol Suite

Internet Control Message Protocol is a protocol which is mainly used to provide information relating to errors on networked machines. Considering the few controls that IP protocol carries out, it not only allows errors to be corrected but also informs the protocols of neighboring layers of these errors. So, ICMP protocol is used by all routers, who use it to indicate an error (called a Delivery Problem). ICMP error messages are sent over the network in a datagram form, like any other data. So, the error messages themselves can be subject to errors. ICMP messages are used by the network administrators for troubleshooting the networks. Even though this protocol has many advantages, there are some of the flaws such as security,which is a major concern to be considered and to be eliminated. In this paper, we present an existing scenario and provide the authentication mechanism for ICMP messages. We also propose enhanced Packet format for ICMP message in such a way that authentication can be done. Kerberos algorithm is used for authentication mechanism which uses private key encryption method.

Practical Implementation of Blowfish Algorithm for Boosting Security Aspect in Networks

Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing. Cryptography is the science of writing in secret message and is an ancient art. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly over the Internet. This paper gives a brief analysis of Blow fish algorithm which is a symmetric block cipher that can be used for both encryption and decryption in cryptography.

International Journal of Computer Science and Mobile Computing An Enhanced Security for TCP/IP Protocol Suite

— Network and internet applications are growing rapidly in the recent past. These applications are used by thousands of users and controlled by different administrative entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for protecting confidential data. The Internet was however originally designed for research and educational purpose, not for commercial applications. So internet was not designed with security in mind. As the internet grows the existing security framework was not adequate for modern day applications. The main reason was due to the lack of security services in the TCP/IP Protocol Suite. The lack of authentication mechanism of TCP/IP Protocol Suite is mainly due to the poor protection mechanism of packets and broadcast nature of the lower layer protocols. Moreover there is no protection for the application layer of the network model. This paper presents the proposed security architecture for the TCP/IP Protocol Suite. I. INTRODUCTION This work aims to investigate a large number of security approaches adopted in the TCP/IP Protocol Suite and to propose a new architecture for the existing model. The first contribution of this work was to provide the security for applications of the application layer protocols Second aspect of the work was to enhance the security for the internet control message protocol which is one of the main protocols that was used by the network managers for troubleshooting the networks. The third and very important aspect of this research was to provide the security for Real Time Applications. The Internet today is being used by billions of users for a large variety of commercial and non commercial purposes. It is controlled by different entities. [1] pointed out that Internet is mainly used as an efficient means for communication, entertainment and education. There is a need for protecting confidential data because of the rapid growth of Internet. The current version of IP Protocol namely IPv6 comes with built in security mechanism called IPSec [2]. IPSec provides security services at the IP layer by enabling a system to select required security protocols to determine the cryptographic algorithms to use for the services and put in place of any cryptographic keys required to provide the security services. But IPSec do not provide any security for applications in application layer. Internet Control Message Protocol attacks is still possible which a major setback of IPv6. The usage of current version of Internet and TCP/IP Suite results in many flaws such as: Spoofing is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. Repudiation is the ability of users to deny that they performed specific actions

Security Model for TCP/IP Protocol Suite

—the Internet has instantly evolved into a vast global network in the growing technology. TCP/IP Protocol Suite is the basic requirement for today's Internet. Internet usage continues to increase exponentially. So network security becomes a growing problem. Even though IPv6 comes with build mechanism IPsec for security, it lacks security in Application layer of TCP/IP protocol suite. IPv6 solves most of the security breaches for IPv4 with the use of IPsec. But IPsec doesn't have any security provision in the application layer. So there is a need for security mechanism. In this paper some of the security flaws of IPv6 are identified and we present a new architecture for TCP/IP protocol suite. Our proposed architecture includes a layer called security layer, which guarantees security to Application layer using a protocol Application layer security protocol (ALSP).

An Implementation: Enhancing Security of Network System Using IP Filter and Cryptography

International journal of mechanical engineering and information technology, 2016

Network firewalls are a software appliance running on general purpose hardware or hardware-based firewall computer appliances that filter traffic between two or more networks .In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules [1]. Routers that pass data between networks contain firewall components and can often perform basic routing functions as well. In this research here is three layer securities we provide to our network during message transmission. This work done at host-based firewall .We use the concept of socket programming (IP address+ Port no.) with client server model in which Client which is connected with server using socket programming only able to communicate with server, also we enhance the cryptographic mechanism using the RSA algorithm. We have enhanced security of network at host-based firewall using One time password generation.

Proposing the Secure Stream Control Transfer Protocol / Internet Protocol Stack (SSCTP/IP) for an Improved Internet Design

International Journal of Innovative Science and Research Technology, 2018

Internet of the present day is robust and reliable with innovative breakthroughs in memory capacity and processor speeds both on internet routers and host devices. Connection speed and bandwidth capacity have greatly increased with host devices seen accessing internet at backbone connection speed. All resulting from improved internet communication infrastructure. However, with all the improvements in the communication infrastructure of the internet, the single system of rules that allow two entities to communicate i.e TCP/IP protocol, remains unchanged; hence this research work. There is need for an improved internet communication protocol to make this exotic service faster and more secure with speed and security been the most significant need of today's internet. This paper proposes the replacement of the four-layer TCP/IP protocol stack of the internet with a more efficient and secure five-layer SSCTP/IP protocol stack.

A Modified Approach to KERBEROS Authentication Protocol using Improved BLOWFISH Scheme

2012

An authentication mechanism is the most basic requirement for developing a highly secure environment. Authentication itself means confirming the truth of data. Since the information stored on the computer which is transmitted over internet need to ensure security and measuring safety to information, so without our awareness, the intruders can attempt to obtain and gain control over the system to access secure confidential information by using most common method like DoS Attack, Backdoor, Trojan horse, Packet Sniffing, etc. So there must not be any compromise in securing our resources. Hence Cryptography is arguably the most important tool a security expert has [1]; Cryptography only allows the solution for different security zones including Authentication Mechanism, Access Control, Data Confidentiality, Data Integrity, and Non-Repudiation. In this paper we have strongly focused to improve Kerberos authentication protocol to be more secure and unbeatable [2]; as we have also make use...

IJERT-Study on Network Security Algorithm

International Journal of Engineering Research and Technology (IJERT), 2020

https://www.ijert.org/study-on-network-security-algorithm https://www.ijert.org/research/study-on-network-security-algorithm-IJERTCONV8IS05010.pdf Network security is a concept of securing data through wireless transmission with the help of cryptography. The Network administrator performs the task of securing data while transmission, avoid unauthorized access of data, avert data misuse and modification of network resources. Network security is used in various computer network sectors such as private and public. Networks used in the organizations, enterprises, institutions etc. are in the form of private or public. Cryptography is concept of securing data with the help of secret keys. Cryptography is the encryption and decryption of data with secret keys using various algorithms. In this paper network security are described on the basis of the services of security. The security services are as confidentiality, authentication and integrity, digital signature, web security, email security, IP security and authentication applications. This paper gives detail study of network security algorithms and their applications. The algorithms are as follows

A Modified Approach to KERBEROS Authentication Protocol using Improved BLOWFISH Scheme 1

An authentication mechanism is the most basic requirement for developing a highly secure environment. Authentication itself means confirming the truth of data. Since the information stored on the computer which is transmitted over internet need to ensure security and measuring safety to information, so without our awareness, the intruders can attempt to obtain and gain control over the system to access secure confidential information by using most common method like DoS Attack, Backdoor, Trojan horse, Packet Sniffing, etc. So there must not be any compromise in securing our resources. Hence Cryptography is arguably the most important tool a security expert has [1]; Cryptography only allows the solution for different security zones including Authentication Mechanism, Access Control, Data Confidentiality, Data Integrity, and Non-Repudiation. In this paper we have strongly focused to improve Kerberos authentication protocol to be more secure and unbeatable [2]; as we have also make use of the improved Blowfish encryption algorithm which is a block cipher with fixed 64bit block size and key size varies from 32 -448 bits which will enhanced more security to the Kerberos network realm.