Secure Shell Tunneling and Secure Shell Port forwarding in Network System

Authors

  • G. Pavan Venkata Naga Sai  PG Scholar, Department of MCA, St . Ann's College of Engineering & Technology, Chirala, Andhra Pradesh, India
  • Dr. R. Murugadoss  Professor, Department of MCA, St .Ann's College of Engineering & Technology, Chirala, Andhra Pradesh, India

Keywords:

Secure Shell, local area network, Virtual Private Network, Tunneling.

Abstract

Remote access to network resources is progressively a business prerequisite, yet outside system dangers must be killed. A Secure Shell (SSH) capacity called port sending permits nonsecure TCP/IP information to be tunneled crosswise over public and private systems through a protected, scrambled association. The advantages of port sending are shown by a progression of solid illustrations. VanDyke Software's Windows customers and servers give a conclusion to-end tunneling answer for secure customer/server applications, which may fill in as a lightweight contrasting option to a Virtual Private Network (VPN).

References

  1. Cooper and J. Dilley, "Known HTTP proxy/caching problems," IETF, Fremont, CA, USA, Tech. Rep. Internet RFC 3143, Jun. 2001.
  2. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second- generation onion router," in Proc. USENIX Secur. Symp., 2004, pp. 21-37.
  3. Boyan, "The anonymizer: Protecting user privacy on the Web," Comput.-Mediated Commun. Mag., vol. 4, no. 9, pp. 1-6, Sep. 1997.
  4. DynaWeb, accessed on Jan. 7, 2017. Online]. Available: http://www.dongtaiwang.com/home_en.php
  5. Clayton, S. J. Murdoch, and R. N. M. Watson, "Ignoring the greatfirewall of China," in Proc. Int. Workshop Privacy Enhancing Technol., 2006, pp. 20-35.
  6. Sovran, A. Libonati, and J. Li, "Pass it on: Social networks stymie censors," in Proc. 7th Int. Conf. Peer-to-Peer Syst., Feb. 2008, p. 3. Online]. Available: http://www.iptps.org/papers-2008/73.pdf
  7. McCoy, J. A. Morales, and K. Levchenko, "Proximax: A measure- ment based system for proxies dissemination," Financial Cryptogr. Data Secur., vol. 5, no. 9, pp. 1-10, 2011.
  8. Feamster, M. Balazinska, W. Wang, H. Balakrishnan, and D. Karger, "Thwarting Web censorship with untrusted messenger discovery," in Int.Workshop Privacy Enhancing Technol., 2003, pp. 125-140.
  9. Zittrain and B. Edelman, "Internet filtering in China," IEEE Internet Comput., vol. 7, no. 2, pp. 70-77, Mar. 2003.
  10. (Nov. 2007). Defeat Internet Censorship: Overview ofAdvanced Technologies and Products. Online]. Available: http:// www.internetfreedom.org/archive/DefeatInternet Censorship White Paper.pd
  11. S. Leberknight, M. Chiang, H. V. Poor, and F. Wong. (2010). A Taxonomy of Internet Censorship and Anti-Censorship. Online]. Available: http://www.princeton.edu/ chiangm/anticensorship.pdf
  12. Clarke, S. G. Miller, T. W. Hong, O. Sandberg, and B. Wiley, "Protecting free expression online with freenet," IEEE Internet Comput., vol. 6, no. 1, pp. 40-49, Jan. 2002.
  13. Ultrasurf, accessed on Jan. 7, 2017. Online]. Available: https://ultrasurf.us/
  14. J. Jia and P. Smith. (2004). Psiphon: Analysis and Estimation. Online]. Available: http://www.cdf.toronto.edu/ csc494h/reports/2004- fall/psiphon_ae.html.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
G. Pavan Venkata Naga Sai, Dr. R. Murugadoss, " Secure Shell Tunneling and Secure Shell Port forwarding in Network System, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.867-874, January-February-2018.