In the present day scenario, there has been an information explosion, which has been the by product of the internet popularity. However, the internet has also opened new avenues for the hackers to control various sensitive information and details of individuals or organizations to their profit end. Various techniques have been used to spoof IP addresses, hijack the web browsers or gains complete access to a networks. Firewall has been one of the most popular techniques used by the individuals or organizations for security purposes. However the rapid growth in the field of technology results into new methods adopted to break the security trapdoor of the firewalls. In order to protect the organizations or individuals who do not use public HTTP and SMTP, a technique of Port Knocking is adopted. In the present paper, we would like to explore the various features of the firewall. We would further extend the paper to the new approaches such as Port knocking and its implementation methods.
[1]
Wenbo Mao,et al.
Modern Cryptography: Theory and Practice
,
2003
.
[2]
염흥렬,et al.
[서평]「Applied Cryptography」
,
1997
.
[3]
Richard E. Overill.
Codes and Ciphers: Julius Caesar, The Enigma, and the Internet
,
2002,
J. Log. Comput..
[4]
Alfred Menezes,et al.
Handbook of Applied Cryptography
,
2018
.
[5]
R. F. Churchhouse.
Codes and ciphers: Julius Caesar, the Enigma and the internet
,
2001
.
[6]
Hakima Chaouchi,et al.
ESSTCP: Enhanced Spread-Spectrum TCP
,
2007,
2007 IEEE International Parallel and Distributed Processing Symposium.