Vol. 18 No. 4 (2016)
Case report

Determine the operation of a firewall to block avoidance internet censorship systems based on proxy

Christian Augusto Romero Goyzueta
National University of the Altiplano Puno Peru
Ferdinand Edgardo Pineda Ancco
National University of the Altiplano Puno Peru
Jesús Vidal Lopez Flores
National University of the Altiplano Puno Peru

Published 2016-12-20

Keywords

  • ultrasurf,
  • torbrowser,
  • network security,
  • security policies

How to Cite

Romero Goyzueta, C. A. ., Pineda Ancco, F. E. ., & Lopez Flores, J. V. . (2016). Determine the operation of a firewall to block avoidance internet censorship systems based on proxy. Revista De Investigaciones Altoandinas - Journal of High Andean Research, 18(4), 475-482. https://doi.org/10.18271/ria.2016.240

Abstract

Within the policies of an organization is possible find not to allow users to access sites on the Internet for entertainment or social networks, as in the case of production organizations and educational therefore a firewall that is used implemented certain rules based on the policies of the organization, blocks access to certain defined sites while you let others free. However there is no implemented rules to block proxies of Avoidance Internet Censorship Systems, the user can access easily to those proxies. The addresses of these proxies change very frequently, so it is almost impossible to block them all, and eventually they appear more. The proposed solution is to create a firewall that uses dynamic rules, these rules are created for the dynamic firewall. A test of each address to a destination is made and if it finds that the destination is a proxy of one of these evation systems; the firewall creates a new rule and automatically implemented. In this way the user will lose access to the proxy.

References

  1. delstein, T & Lubanovic, B. (2007). Linux System Administration. United States of America, O’Reilly Media Inc.
  2. Bhargava, A.; Kumar, D.; Jain, P. and Dhar, J. (2016). Dynamics of attack of malicious codes on the targeted network: Effect of firewall. IEEE Xplore. Visited September 20th on http://ieeexplore.ieee.org/document/7569534/
  3. Lammle, T. (2014). CCNA/CCENT IOS Commands Survival Guide: Exams 100-101, 200-101, and 200-120 2nd Edition. United States of America, Sybex.
  4. Lammle, T. (2013). CCNA Routing and Switching Study Guide: Exams 100-101, 200-101, and 200-120 1st Edition. United States of America, Sybex.
  5. Maddumala, M. & Kumar, V. (2016). Efficient Determine the operation of a firewall Temporal Policies. IEEE Xplore. Visited September 20th on http://ieeexplore.ieee.org/document/7552253/
  6. Mauerer, W. (2008). Professional Linux Kernel Architecture. United States of America, Wiley Publishing Inc.
  7. Negus, C. (2013). Ubuntu Linux Toolbox 2nd ed. United States of America, John Wiley & Sons.
  8. Negus, C. (2009). Linux Bible. United States of America, Wiley Publishing Inc.
  9. Saini, K. (2011). Squid Proxy Server 3.1. United States of America, Packt Publishing.
  10. Smith, R.W. (2011). LPIC-2 Linux Professional Institute Certification. United States of America, Wiley Publishing Inc.
  11. Smith, R.W. (2011). LPIC-1 Linux Professional Institute Certification 2nd ed. United States of America,Wiley Publishing Inc.
  12. Van Vugt, S. (2013). Red Hat Enterprise Linux 6 Administration. United States of America, John Wiley & Sons.
  13. Van Vugt, S. (2008). Beginning Ubuntu LTS Server Administration: From Novice to Professional 2nd ed. United States of America, Apres.