A Client-Server Software that Violates Security Rules Defined by Firewalls and Proxies

  • Othon M. N. Batista
  • Marco A. C. Simões
  • Helder G. Aragão
  • Cláudio M. N. G. da Silva
  • Israel N. Boudoux
Conference paper

Abstract

This paper presents a client-server software that violates security rules defined by firewalls and proxies. A firewall is a set of components, interposed between two networks, that filters the traffic according to rules based on a security policy. Several techniques may be used to make firewalls obsolete, for instance: tunneling and cryptography. The software presented in this paper is composed by two modules: a client and a server one. the client module must be installed in any host of the local network that is not protected by a firewall or a proxy. The server module must be installed in the Internet, in a host accessible by the client module. With this software, it’s possible to bypass firewalls and proxies.

Keywords

information security firewall proxy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Tanenbaum, A. S. Computer Networks. 4th Edition. Prentice Hall. 2002.Google Scholar
  2. [2]
    Kurose, J. F. ROSS, K. W. Computer Networking: A Top-Down Approach Featuring the Internet. 3rd edition. Addison Wesley. 2004.Google Scholar
  3. [3]
    Mccarthy, L. IT Security: Risking the Corporation. Prentice Hall. 2003.Google Scholar
  4. [4]
    Cheswick, W. R. Firewalls and Internet Security: Repealing the Wily Hacker. Addison-Wesley. 1994.Google Scholar
  5. [5]
    Ioannidis, S. Keromytis, A. D. Bellovin, S. M. Smith, J. M. Implementing a Distributed Firewall. Proceedings of the ACM Computer and Communications Security (CCS) 2000. p.p. 139-151. San Diego, CA, USA. 2001.Google Scholar
  6. [6]
    Hunt, C. TCP/IP Network Administration. 2nd edition. O’Reilly. 1997.Google Scholar
  7. [7]
    Berners-Lee, T. Fielding, R. Frystyk, H. Request For Comment 1945 - Hyper Text Transfer Protocol 1.0. 1996.Google Scholar
  8. [8]
    Fielding, R. Gettys, J. Mogul, J. Frystyk, H. Masinter, L. Leach, P. Berners-Lee, T. Request For Comment 2616 - Hyper Text Transfer Protocol 1.1. 1999.Google Scholar

Copyright information

© Springer 2007

Authors and Affiliations

  • Othon M. N. Batista
    • 1
  • Marco A. C. Simões
    • 1
  • Helder G. Aragão
    • 1
  • Cláudio M. N. G. da Silva
    • 1
  • Israel N. Boudoux
    • 1
  1. 1.Information Security Research GroupBahia Universitary CenterSalvadorBrazil

Personalised recommendations