Determine the operation of a firewall to block avoidance internet censorship systems based on proxy

Descripción del Articulo

Within the policies of an organization is possible find not to allow users to access sites on the Internet for entertainment or social networks, as in the case of production organizations and educational therefore a firewall that is used implemented certain rules based on the policies of the organiz...

Descripción completa

Detalles Bibliográficos
Autores: Romero Goyzueta, Christian Augusto, Pineda Ancco, Ferdinand Edgardo, Lopez Flores, Jesús Vidal
Formato: artículo
Fecha de Publicación:2016
Institución:Universidad Nacional del Altiplano
Repositorio:Revista UNAP - Revista de Investigaciones Altoandinas - Journal of High Andean Research
Lenguaje:español
OAI Identifier:oai:huajsapata.unap.edu.pe:article/89
Enlace del recurso:https://huajsapata.unap.edu.pe/index.php/ria/article/view/89
Nivel de acceso:acceso abierto
Materia:ultrasurf
torbrowser
network security
security policies
políticas de seguridad
seguridad de red
Descripción
Sumario:Within the policies of an organization is possible find not to allow users to access sites on the Internet for entertainment or social networks, as in the case of production organizations and educational therefore a firewall that is used implemented certain rules based on the policies of the organization, blocks access to certain defined sites while you let others free. However there is no implemented rules to block proxies of Avoidance Internet Censorship Systems, the user can access easily to those proxies. The addresses of these proxies change very frequently, so it is almost impossible to block them all, and eventually they appear more. The proposed solution is to create a firewall that uses dynamic rules, these rules are created for the dynamic firewall. A test of each address to a destination is made and if it finds that the destination is a proxy of one of these evation systems; the firewall creates a new rule and automatically implemented. In this way the user will lose access to the proxy.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).