Mosul University
  • Register
  • Login
  • العربیة

AL-Rafidain Journal of Computer Sciences and Mathematics

Notice

As part of Open Journals’ initiatives, we create website for scholarly open access journals. If you are responsible for this journal and would like to know more about how to use the editorial system, please visit our website at https://ejournalplus.com or
send us an email to info@ejournalplus.com

We will contact you soon

  1. Home
  2. Volume 6, Issue 1
  3. Authors

Current Issue

By Issue

By Subject

Keyword Index

Author Index

Indexing Databases XML

About Journal

Aims and Scope

Editorial Board

Editorial Staff

Publication Ethics

Indexing and Abstracting

Related Links

Peer Review Process

News

Protection Against Internal Intruding using Host Identifier Authentication

    Basil Y. Alkhayaat Abdulsattar M. khidhir Omar A. Ibraheem

AL-Rafidain Journal of Computer Sciences and Mathematics, 2009, Volume 6, Issue 1, Pages 223-236
10.33899/csmj.2009.163780

  • Show Article
  • Download
  • Cite
  • Statistics
  • Share

Abstract

Network security has become one of the most important interesting areas for researches. Protecting the network can be done by many mechanisms. Among the most effective one is the network firewall. While the firewall protecting the network from the external intruding, it does upward nothing about the internal intruding. Internal intruding or Inside attacks can lead to a big loosing. One of these attacks is attaching an unauthorized host to the network to get benefits of using the network resources provided by the server (like Internet service) or to leak information into the outside.
To solve this problem, this paper suggested that two new programs have to be built under windows operating system in a client server model, one at the client and another at the server. The first supplies an authenticated unique host-ID to each packet destined to leave the network, while the latter verifies these information, allowing the authenticated packet to pass into its destined while dropping and documenting the unauthorized one.
This work is considered as a logical extension of the conventional network firewall and can be installed with any of these firewalls. While the conventional firewall is protecting against outside attacks, this work is protecting against one of these inside attacks.
 
Keywords:
    Protection Intrusion Authentication host identifier
  • PDF (368 K)
  • XML
(2009). Protection Against Internal Intruding using Host Identifier Authentication. AL-Rafidain Journal of Computer Sciences and Mathematics, 6(1), 223-236. doi: 10.33899/csmj.2009.163780
Basil Y. Alkhayaat; Abdulsattar M. khidhir; Omar A. Ibraheem. "Protection Against Internal Intruding using Host Identifier Authentication". AL-Rafidain Journal of Computer Sciences and Mathematics, 6, 1, 2009, 223-236. doi: 10.33899/csmj.2009.163780
(2009). 'Protection Against Internal Intruding using Host Identifier Authentication', AL-Rafidain Journal of Computer Sciences and Mathematics, 6(1), pp. 223-236. doi: 10.33899/csmj.2009.163780
Protection Against Internal Intruding using Host Identifier Authentication. AL-Rafidain Journal of Computer Sciences and Mathematics, 2009; 6(1): 223-236. doi: 10.33899/csmj.2009.163780
  • RIS
  • EndNote
  • BibTeX
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Article View: 43
  • PDF Download: 52
  • LinkedIn
  • Twitter
  • Facebook
  • Google
  • Telegram
  • Home
  • Glossary
  • News
  • Aims and Scope
  • Privacy Policy
  • Sitemap
This journal is licensed under a Creative Commons Attribution 4.0 International (CC-BY 4.0)

Powered by eJournalPlus