The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Anonymizing network gives anonymous access to its users by hiding their IP address. Tor is such an anonymizing network which channels internet traffic through worldwide network having number of relays to hide user's usage, its location from anyone performing network traffic analysis. But few bad users misuse this anonymity and under the cover of anonymous access, they misbehave to defame well known...
Port knocking is a first technique introduces to prevent attackers from discovering and exploiting potentially vulnerable service on a network host, while allowing authenticated users to access these services. Despite being potentially useful tool, it suffers various vulnerabilities such as TCP replay, port scanning and etc. This project proposes a new approach over the existing Port Knocking by employing...
Most networks require that their users have "identities", i.e. have names that are fixed for a relatively long time, unique, and have been approved by a central authority (in order to guarantee their uniqueness). Unfortunately, this requirement, which was introduced to simplify the design of networks, has its own drawbacks. First, this requirement can lead to the loss of anonymity of communicating...
We propose a novel authentication method that uses smart phones and 2-D barcodes. Using our method, a user can access a system by just taking a picture of a challenge code displayed in the target system.
Network security plays an important part in LAN system. The 802.1X protocol provides a port-based network access control to the LAN. In this paper, three cases of user name attacks against the 802.1X are given firstly. Then, the design flaws of 802.1X system are analyzed. At last, an improved authentication process is presented and how to prevent the user name attacks is discussed.
This paper presents advances in and limits on the attribution of messages to sources in digital forensics cases. It overviews current attribution technologies, the limits of those technologies, identifies ways in which attributions are made today and their limits, and discusses available methods for attribution within the legal system and the limits of digital forensic evidence for use in these purposes...
Today the world is moving towards the 4th generation cellular network. The IMS framework facilitates both the transmission of voice and data over the Internet at a lower cost. However all the security considerations made by this framework have shown concerns about the service providers and not much care has been taken for the security of the consumer. As more and more people are using this technology...
During last years, service federation has been a hot topic for researchers all along the world. In that context, single sign on (SSO) access to services has risen as a major concern for this kind of environments and many proposals suited to several scenarios have been stated. We can think of eduroam an eduGAIN as two major examples of this, the former as a federated initiative to provide access to...
This paper summarizes the usual means of network authentication first. Next, a Web security and identity scheme based on session and online table is proposed. The thinking and implementation of the scheme is detailed then. Lastly, the paper analyzes the security intensity of the proposed scheme from various aspects. Either the analysis or the application of the scheme shows that the proposed method...
Because DDoS attacks destination servers from computers distributed all over network, it is very hard to locate attacking sources and resist DDoS. In this paper, a new defending mechanism based on registration and authentication against DDoS is proposed. By bidirectional warning messages, it can help locate attacking sources quickly and resist DDoS more exactly. According to the mechanism, all servers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.