A Client-Server Software that Violates Security Rules Defined by Firewalls and Proxies
This paper presents a client-server software that violates security rules defined by firewalls and proxies. A firewall is a set of components, interposed between two networks, that filters the traffic according to rules based on a security policy. Several techniques may be used to make firewalls obsolete, for instance: tunneling and cryptography. The software presented in this paper is composed by two modules: a client and a server one. the client module must be installed in any host of the local network that is not protected by a firewall or a proxy. The server module must be installed in the Internet, in a host accessible by the client module. With this software, it’s possible to bypass firewalls and proxies.
Keywordsinformation security firewall proxy
Unable to display preview. Download preview PDF.
- Tanenbaum, A. S. Computer Networks. 4th Edition. Prentice Hall. 2002.Google Scholar
- Kurose, J. F. ROSS, K. W. Computer Networking: A Top-Down Approach Featuring the Internet. 3rd edition. Addison Wesley. 2004.Google Scholar
- Mccarthy, L. IT Security: Risking the Corporation. Prentice Hall. 2003.Google Scholar
- Cheswick, W. R. Firewalls and Internet Security: Repealing the Wily Hacker. Addison-Wesley. 1994.Google Scholar
- Ioannidis, S. Keromytis, A. D. Bellovin, S. M. Smith, J. M. Implementing a Distributed Firewall. Proceedings of the ACM Computer and Communications Security (CCS) 2000. p.p. 139-151. San Diego, CA, USA. 2001.Google Scholar
- Hunt, C. TCP/IP Network Administration. 2nd edition. O’Reilly. 1997.Google Scholar
- Berners-Lee, T. Fielding, R. Frystyk, H. Request For Comment 1945 - Hyper Text Transfer Protocol 1.0. 1996.Google Scholar
- Fielding, R. Gettys, J. Mogul, J. Frystyk, H. Masinter, L. Leach, P. Berners-Lee, T. Request For Comment 2616 - Hyper Text Transfer Protocol 1.1. 1999.Google Scholar