The Improvements of OTP Authentication Technology in the FTP Proxy Server Applications

2012 ◽  
Vol 263-266 ◽  
pp. 2958-2961
Author(s):  
Zong Fu Zhang ◽  
Wen Da Xie

The application of OTP user authentication technology to the FTP proxy server on the firewall can further improve the security of user login. On the basis of the OTP, a more secure and reliable improved method of OTP authentication appears, which will add the client's MAC address and port number to the uncertainty factors so as to make it difficult for the attacker to masquerade as a normal user login and consequently make process more secure.

2013 ◽  
Vol 284-287 ◽  
pp. 2855-2859
Author(s):  
Li Te Shen ◽  
Shaw Hwa Hwang ◽  
Chi Jung Huang ◽  
Cheng Yu Yeh

The performance improvement on SIP-based VoIP server is given in this paper. The signaling server “SIP Proxy Server” and media streaming server “Media Relay Server” are applied. Firstly, the performance of VoIP server is analyzed and evaluated in detail. Then the effective method is applied to improve the performance of VoIP server. In the analysis results of SIP Proxy Server, the CPU time for the registration and call-setup sessions need 3.241 ms and 7.985 ms respectively. Moreover, in the Media Relay Server system, when the packet size from 1 to 32 bytes, the maximum throughput of packet is about 82,000 and 16,000 per second for UDP and TCP respectively. The large the packet, the less throughput is tenable. There are three methods applied to improve the performance. The capacity by 31 times is achieved. The capacity with 3,524 calls for each Media Relay Server is achieved. The improved method proposed in this paper is reasonable.


Author(s):  
Dalila Boughaci ◽  
Brahim Oubeka ◽  
Abdelkader Aissioui ◽  
Habiba Drias ◽  
Belaïd Benhamou

This chapter presents the design and the implementation of a decentralized firewall. The latter uses autonomous agents to coordinately control the traffic on the network. The proposed framework includes a set of controllers’ agents that ensure the packets filtering services, a proxy agent that plays a role of a proxy server and an identifier agent which is responsible for user authentication. The decentralization of the different agents’ activities is managed by an administrator agent which is a core point for launching the most important operations of the access control. A prototype has been designed and implemented. Furthermore, the authors hope that the underlying framework will inform researchers of a possible way to implement a decentralized firewall to improve the current solution, and will help readers understand the need for techniques and tools such as firewalls that are useful to protect their network traffic.


Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 104
Author(s):  
Yubo Shao ◽  
Tinghan Yang ◽  
He Wang ◽  
Jianzhu Ma

In this paper, we propose AirSign, a novel user authentication technology to provide users with more convenient, intuitive, and secure ways of interacting with smartphones in daily settings. AirSign leverages both acoustic and motion sensors for user authentication by signing signatures in the air through smartphones without requiring any special hardware. This technology actively transmits inaudible acoustic signals from the earpiece speaker, receives echoes back through both built-in microphones to “illuminate” signature and hand geometry, and authenticates users according to the unique features extracted from echoes and motion sensors. To evaluate our system, we collected registered, genuine, and forged signatures from 30 participants, and by applying AirSign on the above dataset, we were able to successfully distinguish between genuine and forged signatures with a 97.1% F-score while requesting only seven signatures during the registration phase.


2020 ◽  
Vol 10 (4) ◽  
pp. 1286 ◽  
Author(s):  
Kyungroul Lee ◽  
Kangbin Yim

Due to the emergence of online society, a representative user authentication method that is password authentication has been a key topic. However, in this authentication method, various attack techniques have emerged to steal passwords input from the keyboard, hence, the keyboard data does not ensure security. To detect and prevent such an attack, a keyboard data protection technique using random keyboard data generation has been presented. This technique protects keyboard data by generating dummy keyboard data while the attacker obtains the keyboard data. In this study, we demonstrate the feasibility of keyboard data exposure under the keyboard data protection technique. To prove the proposed attack technique, we gathered all the dummy keyboard data generated by the defense tool, and the real keyboard data input by the user, and evaluated the cybersecurity threat of keyboard data based on the machine learning-based offensive technique. We verified that an adversary obtains the keyboard data with 96.2% accuracy even if the attack technique that makes it impossible to attack keyboard data exposure is used. Namely, the proposed method in this study obviously differentiates the keyboard data input by the user from dummy keyboard data. Therefore, the contributions of this paper are that we derived and verified a new security threat and a new vulnerability of password authentication. Furthermore, a new cybersecurity threat derived from this study will have advantages over the security assessment of password authentication and all types of authentication technology and application services input from the keyboard.


Author(s):  
E.A. Fischione ◽  
P.E. Fischione ◽  
J.J. Haugh ◽  
M.G. Burke

A common requirement for both Atom Probe Field-Ion Microscopy (APFIM) and Scanning Tunnelling Microscopy (STM) is a sharp pointed tip for use as either the specimen (APFIM) or the probe (STM). Traditionally, tips have been prepared by either chemical or electropolishing techniques. Recently, ion-milling has been successfully employed in the production of APFIM tips [1]. Conventional electropolishing techniques are applicable to a wide variety of metals, but generally require careful manual adjustments during the polishing process and may also be time-consuming. In order to reduce the time and effort involved in the preparation process, a compact, self-contained polishing unit has been developed. This system is based upon the conventional two-stage electropolishing technique in which the specimen/tip blank is first locally thinned or “necked”, and subsequently electropolished until separation occurs.[2,3] The result of this process is the production of two APFIM or STM tips. A mechanized polishing unit that provides these functions while automatically maintaining alignment has been designed and developed.


Author(s):  
J. C. Fanning ◽  
J. F. White ◽  
R. Polewski ◽  
E. G. Cleary

Elastic tissue is an important component of the walls of arteries and veins, of skin, of the lungs and in lesser amounts, of many other tissues. It is responsible for the rubber-like properties of the arteries and for the normal texture of young skin. It undergoes changes in a number of important diseases such as atherosclerosis and emphysema and on exposure of skin to sunlight.We have recently described methods for the localizationof elastic tissue components in normal animal and human tissues. In the study of developing and diseased tissues it is often not possible to obtain samples which have been optimally prepared for immuno-electron microscopy. Sometimes there is also a need to examine retrospectively samples collected some years previously. We have therefore developed modifications to our published methods to allow examination of human and animal tissue samples obtained at surgery or during post mortem which have subsequently been: 1. stored frozen at -35° or -70°C for biochemical examination; 2.


Sign in / Sign up

Export Citation Format

Share Document