IENA Official Page
During the last decade, the Information Society experienced an exponential growth of Internet-based distributed
services, such as web access, e-mail and many other on-line applications dealing with communications, business
administration, entertainment, education, commerce, banking, government, to name a few. The current scenario, with
hundreds of millions of hosts connected to the network and an ever increasing number of customers and services
available, brings the need for securing information exchange and storage as well as the systems and networks
involved in this process, to prevent any misuse from unauthorized and malicious users. As a consequence, computer
network security has become one of the major concerns both within the scientific community, as a hot research
topic, and among system and network administrators, as a good practice in everyday’s work. It also presents several
legal aspects which are not negligible at all.
Distributed information and communication systems are constantly under attack by malicious Internet users who
want to gain access to or corrupt sensible data, take control of hosts and network devices or simply compromise
specific service availability.
To perpetrate this illegitimate behaviors, a number of techniques are used by the
so-called hackers, such as information gathering, port scanning, vulnerability exploitation, brute force attack, manin-
the-middle attack, remote escalation, (distributed) denial of service and many more . Another very popular
technique to compromise network security is through the spreading of malicious software such as worms, viruses,
trojans, which are able to expose Internet users and services to an extremely serious threat .
For these reasons, a number of system and network security tools such as antivirus and firewall software,
intrusion detection systems (IDS), network IDS (NIDS), intrusion prevention systems (IPS) and many more have
been developed in the past. The model assumed by the deployment of such tools is oriented to the adoption of
a strategy based on closed policies, like strong information and communication encryption, limited and strictly
controlled access to resources, thorough selection of essential services, constantly up-to-date knowledge of service
vulnerabilities and related countermeasures, and so on.
The intent of this work is to revise the common logic of the attack/defense paradigm in today’s network security
and propose a different scheme using a distributed open approach to prevent network services exploitation that,
combined with traditional security techniques, can improve the security level in networked environments.
"TRICK YOUR HACK"
IENA: An open and Distributed security scheme to prevent network service exploitation
This Project born for research target. The founder of this project is Marco Ramilli who built the first IENA Client Server and the first
implementation of IENA StandAlone. Few mounths later, a new client/server IENA implementation is developed
by Ivano Manca. It treats of an entirely JAVA client/server application
which provides a Secure Socket Layer connection between the two parties.
Thanks to the JSSE framework, man in the middle attacks are avoided
using a mutual authentication.
If you want to contribute, or if you have some question or if you want contribute and work with us please send mail to:
When you install IENA you'll find, inside the crrect install directory, all the documentation. If you need more about project and Analysis
you shold click on "Documentation" bottom on the left side of this page.