Download now Free registration required
Scanning TCP and UDP connections for finding susceptible hosts is one of the most popular techniques used by malicious cyber criminals and hackers to discover and map services that are listening on a specified port. Using this method an attacker can create a list of potential weaknesses and vulnerabilities in open ports leading to exploitation and compromise of a remote host. The authors employed port knocking sequence, steganography and cryptography as techniques of choice for the development and implementation of a Scalable port Knock system(SKAM) that protects knock sequence transmission as well as services running on the network server.
- Format: PDF
- Size: 328.1 KB