Wir verwenden Cookies und Analyse-Tools, um die Nutzerfreundlichkeit der Internet-Seite zu verbessern und für Marketingzwecke. Wenn Sie fortfahren, diese Seite zu verwenden, nehmen wir an, dass Sie damit einverstanden sind. Zur Datenschutzerklärung.
Hop Integrity in the Internet
Details
Denial-of-service attacks are one of the most severe challenges confronting the online world. This ground-breaking volume discusses a new method of countering denial-of-service attacks called hop integrity. It details a suite of protocols for providing hop integrity. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. In addition, the book presents an alternative way to achieve strong hop integrity with hard sequence numbers.
Detailed discussion of protocols for providing hop integrity in the Internet Each protocol is specified and verified using an abstract and formal notation called the Secure Protocol Notation Presents an alternative way to achieve strong hop integrity with hard sequence numbers Benefits of hop integrity extend to secure routing, mobile IP, and IP multicast Includes supplementary material: sn.pub/extras
Autorentext
Mohamed G. Gouda, PhD, is the Mike A. Meyers Centennial Professor in Computing Science at the University of Texas at Austin and a leading researcher in distributed and concurrent computing. His research interests include abstraction, nondeterminism, atomicity, convergence, stability, formality, correctness, and efficiency.
Klappentext
Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. Hop integrity ensures that if a message, that is part of a denial-of-service attack, is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet.
A suite of protocols for providing hop integrity in the Internet is discussed in great detail. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation.
There are five protocols in this suite:
A secure address resolution protocol
A light-weight key update protocol
A protocol for computing and verifying message digests
An anti-replay protocol that uses soft sequence numbers
An anti-replay protocol that uses hard sequence numbers
In addition, other benefits of hop integrity extend to secure routing, mobile IP, and IP multicast.
Hop Integrity in the Internet is primarily directed towards designers, reviewers, verifiers, and implementors of secure network protocols. Graduate students who are interested in network security and secure protocols will find this book invaluable.
Inhalt
Abstract Protocol Notation.- Abstract Secure Protocols.- Denial-of-Service Attacks.- Secure Address Resolution Protocol.- Weak Hop Integrity Protocol.- Strong Hop Integrity Using Soft Sequence Numbers.- Strong Hop Integrity Using Hard Sequence Numbers.- Implementation Considerations.- Other Uses of Hop Integrity.
Weitere Informationen
- Allgemeine Informationen
- GTIN 09780387244266
- Anzahl Seiten 128
- Lesemotiv Verstehen
- Genre Allgemein & Lexika
- Auflage 2006
- Herausgeber Springer US
- Gewicht 366g
- Untertitel A Defense Against Denial-of-Servic Attacks, Advances in Information Security 21
- Größe H241mm x B160mm x T12mm
- Jahr 2005
- EAN 9780387244266
- Format Fester Einband
- ISBN 0387244263
- Veröffentlichung 17.11.2005
- Titel Hop Integrity in the Internet
- Autor Mohamed G. Gouda , Chin-Tser Huang
- Sprache Englisch