期刊名称:Lecture Notes in Engineering and Computer Science
印刷版ISSN:2078-0958
电子版ISSN:2078-0966
出版年度:2019
卷号:2239
页码:216-221
出版社:Newswood and International Association of Engineers
摘要:A wide range of communication protocols has
been developed recently to address service diversification. At
the same time, firewalls(FWs) are installed at the boundary
between internal networks such as those owned by companies
and homes, and the Internet. In general, FWs are configured as
whitelists is whitelist that release only the port corresponding
to the service to be used and block communication from other
ports. This means that many protocols except those well used
are blocked by FWs resulting in users not being able to benefit
from any new protocols. In this paper, we propose a method
for traversing an FW and enabling communication by inserting
a pseudo TCP header imitating HTTPS into a packet, which
will be blocked by the FW. Since the packet capsulated by
the proposed method disguised by HTTPS camouflaging only
when passing through the FW, the TCP control of the end node
is not executed, and the advantages of Quick UDP Internet
Connection are not lost. In this study, we implemented the
proposed method as a loadable kernel module using Netflter in
Linux and verified its operation and performance.