IENA Official Page

During the last decade, the Information Society experienced an exponential growth of Internet-based distributed services, such as web access, e-mail and many other on-line applications dealing with communications, business administration, entertainment, education, commerce, banking, government, to name a few. The current scenario, with hundreds of millions of hosts connected to the network and an ever increasing number of customers and services available, brings the need for securing information exchange and storage as well as the systems and networks involved in this process, to prevent any misuse from unauthorized and malicious users. As a consequence, computer network security has become one of the major concerns both within the scientific community, as a hot research topic, and among system and network administrators, as a good practice in everydayÕs work. It also presents several legal aspects which are not negligible at all. Distributed information and communication systems are constantly under attack by malicious Internet users who want to gain access to or corrupt sensible data, take control of hosts and network devices or simply compromise specific service availability. To perpetrate this illegitimate behaviors, a number of techniques are used by the so-called hackers, such as information gathering, port scanning, vulnerability exploitation, brute force attack, manin- the-middle attack, remote escalation, (distributed) denial of service and many more [1]. Another very popular technique to compromise network security is through the spreading of malicious software such as worms, viruses, trojans, which are able to expose Internet users and services to an extremely serious threat [2]. For these reasons, a number of system and network security tools such as antivirus and firewall software, intrusion detection systems (IDS), network IDS (NIDS), intrusion prevention systems (IPS) and many more have been developed in the past. The model assumed by the deployment of such tools is oriented to the adoption of a strategy based on closed policies, like strong information and communication encryption, limited and strictly controlled access to resources, thorough selection of essential services, constantly up-to-date knowledge of service vulnerabilities and related countermeasures, and so on. The intent of this work is to revise the common logic of the attack/defense paradigm in todayÕs network security and propose a different scheme using a distributed open approach to prevent network services exploitation that, combined with traditional security techniques, can improve the security level in networked environments.

"TRICK YOUR HACK"


IENA: An open and Distributed security scheme to prevent network service exploitation

This Project born for research target. The founder of this project is Marco Ramilli who built the first IENA Client Server and the first implementation of IENA StandAlone. Few mounths later, a new client/server IENA implementation is developed by Ivano Manca. It treats of an entirely JAVA client/server application which provides a Secure Socket Layer connection between the two parties. Thanks to the JSSE framework, man in the middle attacks are avoided using a mutual authentication. If you want to contribute, or if you have some question or if you want contribute and work with us please send mail to:

Documentation

When you install IENA you'll find, inside the crrect install directory, all the documentation. If you need more about project and Analysis you shold click on "Documentation" bottom on the left side of this page.

 

webbed-polypetalous
webbed-polypetalous
webbed-polypetalous
webbed-polypetalous