Open Access Open Access  Restricted Access Subscription or Fee Access

Three Layer End-To-End Data Transaction Using Firewall

R. Ramya Krishna, R. Sankar

Abstract


Firewall is the Specified Version of a router. It allows only valid network that is authorized. All the data packets are analy1zed while entry and leave the network are decided by the firewall to allow or not. When some virus is injected by the attacker such has valid authorized IP address entering through the firewall in that case sequence checker is used to check packet sequence address based on the sequence order. Based on that order only packets are sent to the destination, the sequence checker should be placed on the second layer. For data transmission the Data should be in encrypted manner, the encryption will occur before third layer. Here data can travel in those three layer and reaches the destination in well secured manner.


Keywords


Data Transmission, Security, Network Traffic

Full Text:

PDF

References


Miltos D. Grammatikakis, Polydoros Petrakis, Antonis Papagrigoriou, George Kornaros and Marcello Coppola Technological Educational Institute of Crete, Gr-71004 Heraklion, Greece Stmicroelectronics, 12 Rue Jules Horowitz, F-38019 Grenoble Cedex.

Andrew Prout, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Mattthew Hubbell, Michael Houle, Michael Jones, Peter Michaleas, Lauren Milechin, Julie Mullen, Antonio Rosa, Siddarth Samsi, Albert Reuther, Jeremy Kepner.

Mark L. Green Center for Computational Research, Steven M. Gallo Center for Computational Research, Russ Miller Center for Computational Research.

Amir R. Khakpour, Alex X. Liu, Joshua W. Hulst, Zihui Ge, Dan Pei, Jia Wang.

Zhiyun Qian, Z. MorleyMao {Zhiyunq.Zmo}@Umich.Edu, University Of Michigan.

“Cisco Firewall Services Module DoS vulnerability”, http://www.netsecurity.org/secworld.php?id=10673, 2011.

Zhiyun Qian and Z. Morley Mao, “Off-path tcp sequence number inference attack - how firewall middleboxes reduce security”, in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 2012, pp. 347 – 361.

Fyodor, “Nmap: Free network security scanner”, http://nmap.org.

Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, and Sy-Yen Kuo, “Xprobe2++: Low volume remote network information gathering tool”, in Proceedings of the DSN, 2009.

Michal Zalewski, “p0f”, http://lcamtuf.coredump.cx/p0f.shtml. [7] Joa˜o Paulo S. Medeiros, Agostinho M. Brito, and Paulo S. Motta Pires, “A new method for recognizing operating systems of automation devices”, in Proceedings of the IEEE EFTA, 2009.

Xin Huang Shen Chuan-Ning Fallujah Wu Attacks and prevention Beijing: China Electric Power Press pp. 22-37 2002.

ZHU Ge-Mei Zhou Chuan-Hua ZHAO Bao-hua Network security and new firewall technology Beijing: Electronic Industry Press pp. 92-201 2001.

Lin Haibo Rui Network security and firewall technology Beijing: Tsinghua University Press pp. 55-76 2000.

Xiang-Dong Hu Wei Qinfang Applied Cryptography Tutorial Beijing: Electronic Industry Press pp. 25-47 2005.

Guo Jikun Firewall and intrusion detection technology information technology Beijing: China Electric Power Press vol. 27 no. 3 pp. 10-12 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.