Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Trivial Scheme for Detecting and Preventing Unauthorized Access of Resources on a Network Domain


Affiliations
1 Anna University of Technology, Coimbatore, Tamilnadu, India
2 EBET Group of Institutions, Kankayam, Tamilnadu, India
     

   Subscribe/Renew Journal


The significant success and growth of Internet is that any application can send anything to any one any time, without needing to obtain advance permission from network administrators. This openness of the internet architecture leads to unauthorized access. Defending against these types of illicit access is the hardest security problems on the internet. To solve this problem, the proposed light weight scheme to detect and prevent the unauthorized request, instead of being able to send anything to anyone at the time, the sender must obtain the endorsement secret key or secret code from the destination server. To validate the legitimate of the request, a network Authentication Server (AS) performs an authentication process for each initiating host. The simulation result proves its effectiveness for preventing unauthorized access on network resource.

Keywords

IP Spoofing, Key Distribution, Authentication Process.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 173

PDF Views: 3




  • A Trivial Scheme for Detecting and Preventing Unauthorized Access of Resources on a Network Domain

Abstract Views: 173  |  PDF Views: 3

Authors

N. Arumugam
Anna University of Technology, Coimbatore, Tamilnadu, India
C. Venkatesh
EBET Group of Institutions, Kankayam, Tamilnadu, India

Abstract


The significant success and growth of Internet is that any application can send anything to any one any time, without needing to obtain advance permission from network administrators. This openness of the internet architecture leads to unauthorized access. Defending against these types of illicit access is the hardest security problems on the internet. To solve this problem, the proposed light weight scheme to detect and prevent the unauthorized request, instead of being able to send anything to anyone at the time, the sender must obtain the endorsement secret key or secret code from the destination server. To validate the legitimate of the request, a network Authentication Server (AS) performs an authentication process for each initiating host. The simulation result proves its effectiveness for preventing unauthorized access on network resource.

Keywords


IP Spoofing, Key Distribution, Authentication Process.