Secure Shell Tunneling and Secure Shell Port forwarding in Network System
Keywords:
Secure Shell, local area network, Virtual Private Network, Tunneling.Abstract
Remote access to network resources is progressively a business prerequisite, yet outside system dangers must be killed. A Secure Shell (SSH) capacity called port sending permits nonsecure TCP/IP information to be tunneled crosswise over public and private systems through a protected, scrambled association. The advantages of port sending are shown by a progression of solid illustrations. VanDyke Software's Windows customers and servers give a conclusion to-end tunneling answer for secure customer/server applications, which may fill in as a lightweight contrasting option to a Virtual Private Network (VPN).
References
- Cooper and J. Dilley, "Known HTTP proxy/caching problems," IETF, Fremont, CA, USA, Tech. Rep. Internet RFC 3143, Jun. 2001.
- Dingledine, N. Mathewson, and P. Syverson, "Tor: The second- generation onion router," in Proc. USENIX Secur. Symp., 2004, pp. 21-37.
- Boyan, "The anonymizer: Protecting user privacy on the Web," Comput.-Mediated Commun. Mag., vol. 4, no. 9, pp. 1-6, Sep. 1997.
- DynaWeb, accessed on Jan. 7, 2017. Online]. Available: http://www.dongtaiwang.com/home_en.php
- Clayton, S. J. Murdoch, and R. N. M. Watson, "Ignoring the greatfirewall of China," in Proc. Int. Workshop Privacy Enhancing Technol., 2006, pp. 20-35.
- Sovran, A. Libonati, and J. Li, "Pass it on: Social networks stymie censors," in Proc. 7th Int. Conf. Peer-to-Peer Syst., Feb. 2008, p. 3. Online]. Available: http://www.iptps.org/papers-2008/73.pdf
- McCoy, J. A. Morales, and K. Levchenko, "Proximax: A measure- ment based system for proxies dissemination," Financial Cryptogr. Data Secur., vol. 5, no. 9, pp. 1-10, 2011.
- Feamster, M. Balazinska, W. Wang, H. Balakrishnan, and D. Karger, "Thwarting Web censorship with untrusted messenger discovery," in Int.Workshop Privacy Enhancing Technol., 2003, pp. 125-140.
- Zittrain and B. Edelman, "Internet filtering in China," IEEE Internet Comput., vol. 7, no. 2, pp. 70-77, Mar. 2003.
- (Nov. 2007). Defeat Internet Censorship: Overview ofAdvanced Technologies and Products. Online]. Available: http:// www.internetfreedom.org/archive/DefeatInternet Censorship White Paper.pd
- S. Leberknight, M. Chiang, H. V. Poor, and F. Wong. (2010). A Taxonomy of Internet Censorship and Anti-Censorship. Online]. Available: http://www.princeton.edu/ chiangm/anticensorship.pdf
- Clarke, S. G. Miller, T. W. Hong, O. Sandberg, and B. Wiley, "Protecting free expression online with freenet," IEEE Internet Comput., vol. 6, no. 1, pp. 40-49, Jan. 2002.
- Ultrasurf, accessed on Jan. 7, 2017. Online]. Available: https://ultrasurf.us/
- J. Jia and P. Smith. (2004). Psiphon: Analysis and Estimation. Online]. Available: http://www.cdf.toronto.edu/ csc494h/reports/2004- fall/psiphon_ae.html.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.