Advanced port knocking authentication scheme with QRC using AES

Vikas Srivastava, A. K. Keshri, Abhishek Roy, V. Chaurasiya, Rahul Gupta
{"title":"Advanced port knocking authentication scheme with QRC using AES","authors":"Vikas Srivastava, A. K. Keshri, Abhishek Roy, V. Chaurasiya, Rahul Gupta","doi":"10.1109/ETNCC.2011.5958506","DOIUrl":null,"url":null,"abstract":"Port Knocking is an important concept to secure services provided by the servers. By a predefined port knocking sequence server identify whether the request is a legitimate request for a service. This paper presents an improved authentication scheme over the existing port knocking methods. The existing port knocking methods are prone to reasonable attacks and vulnerabilities. The paper addresses those vulnerabilities, and accordingly provides mechanism to circumvent on the port knocking mechanism. In a client-server communication, request for services from the clients is done by providing them connection to a specific port on the server. For security concerns, all the ports on the server are initially closed and no connection is possible. Port knocking permits a user to request for a port to open for network services. This request takes the form of a sequence of authentication packets across closed ports on the server. Many port knocking schemes have been proposed earlier but all of them suffer from the problems like sequence replay attack, man in the middle attack, use of spoofed packets in knocking sequence and out of order delivery of packets. The proposed algorithm addresses all the above mentioned issues by implementing a secure knock sequence with AES encryption scheme, which cannot be detected or disturbed by the sniffing and use of spoofed packets. The algorithm also addresses the problem of out of order delivery of knock sequence packets as the knock sequence is determined when all the packets are received at the server end.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETNCC.2011.5958506","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

Abstract

Port Knocking is an important concept to secure services provided by the servers. By a predefined port knocking sequence server identify whether the request is a legitimate request for a service. This paper presents an improved authentication scheme over the existing port knocking methods. The existing port knocking methods are prone to reasonable attacks and vulnerabilities. The paper addresses those vulnerabilities, and accordingly provides mechanism to circumvent on the port knocking mechanism. In a client-server communication, request for services from the clients is done by providing them connection to a specific port on the server. For security concerns, all the ports on the server are initially closed and no connection is possible. Port knocking permits a user to request for a port to open for network services. This request takes the form of a sequence of authentication packets across closed ports on the server. Many port knocking schemes have been proposed earlier but all of them suffer from the problems like sequence replay attack, man in the middle attack, use of spoofed packets in knocking sequence and out of order delivery of packets. The proposed algorithm addresses all the above mentioned issues by implementing a secure knock sequence with AES encryption scheme, which cannot be detected or disturbed by the sniffing and use of spoofed packets. The algorithm also addresses the problem of out of order delivery of knock sequence packets as the knock sequence is determined when all the packets are received at the server end.
高级端口敲门认证方案与QRC使用AES
端口敲门是确保服务器提供的服务安全的一个重要概念。通过预定义的端口敲门序列,服务器确定请求是否是对服务的合法请求。本文在现有的端口敲门方法的基础上提出了一种改进的认证方案。现有的端口敲门方法容易受到合理的攻击和漏洞。本文针对这些漏洞,提供了规避端口敲门机制的机制。在客户机-服务器通信中,通过向客户机提供到服务器上特定端口的连接来完成客户机对服务的请求。出于安全考虑,服务器上的所有端口最初都是关闭的,不可能连接。端口敲门允许用户请求为网络服务开放端口。该请求采用通过服务器上的关闭端口的一系列身份验证数据包的形式。以前提出了许多端口敲门方案,但都存在序列重放攻击、中间人攻击、敲门序列中使用欺骗报文以及数据包的无序传递等问题。所提出的算法通过使用AES加密方案实现安全敲打序列来解决上述所有问题,该方案不会被嗅探和使用欺骗数据包检测或干扰。该算法还解决了敲打序列数据包的无序传递问题,因为敲打序列是在服务器端接收到所有数据包时确定的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信