Details

Hop Integrity in the Internet


Hop Integrity in the Internet


Advances in Information Security, Band 21

von: Chin-Tser Huang, Mohamed G. Gouda

96,29 €

Verlag: Springer
Format: PDF
Veröffentl.: 24.05.2006
ISBN/EAN: 9780387294445
Sprache: englisch
Anzahl Seiten: 112

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<P><STRONG>Hop Integrity in the Internet</STRONG> introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet.&nbsp; If a message that is part of a denial-of-service attack is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet.</P>
<P></P>
<P>A suite of protocols for providing hop integrity in the Internet is discussed in great detail. In particular, each protocol in the suite is specified and verified using an abstract and formal notation called the Secure Protocol Notation.&nbsp; The protocols include:</P>
<P>- Secure address resolution </P>
<P>-&nbsp;Weak hop integrity&nbsp;</P>
<P>- Strong hop integrity using soft sequence numbers</P>
<P>- Strong hop integrity&nbsp;using hard sequence numbers</P>
<P>Other benefits of hop integrity extend to secure routing, mobile IP, and IP multicast.</P>
<P></P>
Abstract Protocol Notation.- Abstract Secure Protocols.- Denial-of-Service Attacks.- Secure Address Resolution Protocol.- Weak Hop Integrity Protocol.- Strong Hop Integrity Using Soft Sequence Numbers.- Strong Hop Integrity Using Hard Sequence Numbers.- Implementation Considerations.- Other Uses of Hop Integrity.
<P><STRONG>Hop Integrity in the Internet</STRONG> introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. Hop integrity ensures that if a message, that is part of a denial-of-service attack, is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet.</P>
<P></P>
<P>A suite of protocols for providing hop integrity in the Internet is discussed in great detail. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. </P>
<P>There are five protocols in this suite: </P>
<P>- A secure address resolution protocol</P>
<P>- A light-weight key update protocol</P>
<P>- A protocol for computing and verifying message digests</P>
<P>- An anti-replay protocol that uses soft sequence numbers</P>
<P>- An anti-replay protocol that uses hard sequence numbers</P>
<P>In addition, other benefits of hop integrity extend to secure routing, mobile IP, and IP multicast.</P>
<P></P>
<P><STRONG>Hop Integrity in the Internet</STRONG> is primarily directed towards designers, reviewers, verifiers, and implementors of secure network protocols. Graduate students who are interested in network security and secure protocols will find this book invaluable.</P>
<P></P>
Detailed discussion of protocols for providing hop integrity in the Internet Each protocol is specified and verified using an abstract and formal notation called the Secure Protocol Notation Presents an alternative way to achieve strong hop integrity with hard sequence numbers Benefits of hop integrity extend to secure routing, mobile IP, and IP multicast Includes supplementary material: sn.pub/extras
<P>Denial-of-service attacks are one of the most severe challenges confronting the online world. This ground-breaking volume discusses a new method of countering denial-of-service attacks called hop integrity. It details a suite of protocols for providing hop integrity. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. In addition, the book presents an alternative way to achieve strong hop integrity with hard sequence numbers.</P>

Diese Produkte könnten Sie auch interessieren:

Topics in Artificial Intelligence Applied to Industry 4.0
Topics in Artificial Intelligence Applied to Industry 4.0
von: Mahmoud Ragab AL-Refaey, Amit Kumar Tyagi, Abdullah Saad AL-Malaise AL-Ghamdi, Swetta Kukreja
PDF ebook
102,99 €
Effective Vulnerability Management
Effective Vulnerability Management
von: Chris Hughes, Nikki Robinson
EPUB ebook
22,99 €