Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY

View through CrossRef
Currently, the way of network communication has changed a lot. All aspects become very dependent on online services. Employees can work from home, and students of all ages take online classes. The more the public depends on staying connected to the network, the greater potential network attacks to occur. In a computer network, if it is not protected, it will data or file loss, damage to the server system, not being optimal in serving users or even losing valuable institutional assets. The attacks most often used in networks are Port Scanning and DDoS (Distributed Denial Of Service). In this study, the DeMilitarized Zone and Port Knocking methods are combined to secure computer networks. DeMilitarized Zone technique implementation is used to access local servers, so that they can be accessed from outside with Port Knocking technique. To open the access port that is filtered in the router configuration on the server network security system. DeMilitarized Zone and Port Knocking can be implemented on local and long distance networks where if an attacker wants to exploit or attack the main server, the first to be attacked is the firewall server (router). Port Knocking can also be implemented on local and long distance networks with a combined ping request time limit which makes it safer, so that if an attacker wants to access the router, and doesn't know the rules from the remote, what happens is a rejection of port access.
Title: DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY
Description:
Currently, the way of network communication has changed a lot.
All aspects become very dependent on online services.
Employees can work from home, and students of all ages take online classes.
The more the public depends on staying connected to the network, the greater potential network attacks to occur.
In a computer network, if it is not protected, it will data or file loss, damage to the server system, not being optimal in serving users or even losing valuable institutional assets.
The attacks most often used in networks are Port Scanning and DDoS (Distributed Denial Of Service).
In this study, the DeMilitarized Zone and Port Knocking methods are combined to secure computer networks.
DeMilitarized Zone technique implementation is used to access local servers, so that they can be accessed from outside with Port Knocking technique.
To open the access port that is filtered in the router configuration on the server network security system.
DeMilitarized Zone and Port Knocking can be implemented on local and long distance networks where if an attacker wants to exploit or attack the main server, the first to be attacked is the firewall server (router).
Port Knocking can also be implemented on local and long distance networks with a combined ping request time limit which makes it safer, so that if an attacker wants to access the router, and doesn't know the rules from the remote, what happens is a rejection of port access.

Related Results

The Role of Computer Deception in Network Security
The Role of Computer Deception in Network Security
With the rapid development of Internet technology, computer has become an indispensable part of modern society. However, with the popularization of computer technology, the problem...
A Study on the Shipping Accessibility between Yangpu Port and Haikou Port in China
A Study on the Shipping Accessibility between Yangpu Port and Haikou Port in China
Yangpu Port and Haikou Port, as important components of the Hainan Free Trade Port, play a critical role in the regional economic development through their port layout and shipping...
Smooth Redemption Policy of Port Facilities in Case of Ocean Space Utilization
Smooth Redemption Policy of Port Facilities in Case of Ocean Space Utilization
The ports of the world are operated by port authorities. The systems for establishing port facilities are roughly classified into two types depending on their sources of revenue. I...
Atles del Port de Maó
Atles del Port de Maó
An eminently urban landscape, an infrastructure element, and a -natural- port of general interest of the State, explained from architecture as a discipline and a starting point: th...
Ramifications of Single-Port Laparoscopic Surgery
Ramifications of Single-Port Laparoscopic Surgery
Introduction. Single-port laparoscopic surgery imposes unique psychomotor challenges. We used surgical simulation to define performance differences between surgeons with and withou...
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...
Enhancing International Cooperation for Ship and Port Facility Security to Address Security Disruptions
Enhancing International Cooperation for Ship and Port Facility Security to Address Security Disruptions
Port security is a crucial component of maritime security that plays a vital role in facilitating economic activity at sea, particularly in the transit of people, commodities, and ...
Individual Cylinder Knock Detection Based on Ion Current Sensing: Correlation Analysis
Individual Cylinder Knock Detection Based on Ion Current Sensing: Correlation Analysis
This paper addresses issues related with the measurement, analysis and real-time control of knocking combustions in high-performance spark-ignition engines. In particular, the rela...

Back to Top