Secure Shell Tunneling and Secure Shell Port forwarding in Network System

Authors(2) :-G. Pavan Venkata Naga Sai, Dr. R. Murugadoss

Remote access to network resources is progressively a business prerequisite, yet outside system dangers must be killed. A Secure Shell (SSH) capacity called port sending permits nonsecure TCP/IP information to be tunneled crosswise over public and private systems through a protected, scrambled association. The advantages of port sending are shown by a progression of solid illustrations. VanDyke Software's Windows customers and servers give a conclusion to-end tunneling answer for secure customer/server applications, which may fill in as a lightweight contrasting option to a Virtual Private Network (VPN).

Authors and Affiliations

G. Pavan Venkata Naga Sai
PG Scholar, Department of MCA, St . Ann's College of Engineering & Technology, Chirala, Andhra Pradesh, India
Dr. R. Murugadoss
Professor, Department of MCA, St .Ann's College of Engineering & Technology, Chirala, Andhra Pradesh, India

Secure Shell, local area network, Virtual Private Network, Tunneling.

  1. Cooper and J. Dilley, "Known HTTP proxy/caching problems," IETF, Fremont, CA, USA, Tech. Rep. Internet RFC 3143, Jun. 2001.
  2. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second- generation onion router," in Proc. USENIX Secur. Symp., 2004, pp. 21-37.
  3. Boyan, "The anonymizer: Protecting user privacy on the Web," Comput.-Mediated Commun. Mag., vol. 4, no. 9, pp. 1-6, Sep. 1997.
  4. DynaWeb, accessed on Jan. 7, 2017. Online]. Available: http://www.dongtaiwang.com/home_en.php
  5. Clayton, S. J. Murdoch, and R. N. M. Watson, "Ignoring the greatfirewall of China," in Proc. Int. Workshop Privacy Enhancing Technol., 2006, pp. 20-35.
  6. Sovran, A. Libonati, and J. Li, "Pass it on: Social networks stymie censors," in Proc. 7th Int. Conf. Peer-to-Peer Syst., Feb. 2008, p. 3. Online]. Available: http://www.iptps.org/papers-2008/73.pdf
  7. McCoy, J. A. Morales, and K. Levchenko, "Proximax: A measure- ment based system for proxies dissemination," Financial Cryptogr. Data Secur., vol. 5, no. 9, pp. 1-10, 2011.
  8. Feamster, M. Balazinska, W. Wang, H. Balakrishnan, and D. Karger, "Thwarting Web censorship with untrusted messenger discovery," in Int.Workshop Privacy Enhancing Technol., 2003, pp. 125-140.
  9. Zittrain and B. Edelman, "Internet filtering in China," IEEE Internet Comput., vol. 7, no. 2, pp. 70-77, Mar. 2003.
  10. (Nov. 2007). Defeat Internet Censorship: Overview ofAdvanced Technologies and Products. Online]. Available: http:// www.internetfreedom.org/archive/DefeatInternet Censorship White Paper.pd
  11. S. Leberknight, M. Chiang, H. V. Poor, and F. Wong. (2010). A Taxonomy of Internet Censorship and Anti-Censorship. Online]. Available: http://www.princeton.edu/ chiangm/anticensorship.pdf
  12. Clarke, S. G. Miller, T. W. Hong, O. Sandberg, and B. Wiley, "Protecting free expression online with freenet," IEEE Internet Comput., vol. 6, no. 1, pp. 40-49, Jan. 2002.
  13. Ultrasurf, accessed on Jan. 7, 2017. Online]. Available: https://ultrasurf.us/
  14. J. Jia and P. Smith. (2004). Psiphon: Analysis and Estimation. Online]. Available: http://www.cdf.toronto.edu/ csc494h/reports/2004- fall/psiphon_ae.html.

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 867-874
Manuscript Number : CSEIT1831258
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

G. Pavan Venkata Naga Sai, Dr. R. Murugadoss, "Secure Shell Tunneling and Secure Shell Port forwarding in Network System", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.867-874, January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT1831258

Article Preview