000 | 03724nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-0-387-29444-5 | ||
003 | DE-He213 | ||
005 | 20161121230518.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 xxu| s |||| 0|eng d | ||
020 |
_a9780387294445 _9978-0-387-29444-5 |
||
024 | 7 |
_a10.1007/0-387-29444-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
100 | 1 |
_aHuang, Chin-Tser. _eauthor. |
|
245 | 1 | 0 |
_aHop Integrity in the Internet _h[electronic resource] / _cby Chin-Tser Huang, Mohamed G. Gouda. |
264 | 1 |
_aBoston, MA : _bSpringer US, _c2006. |
|
300 |
_aXI, 112 p. 17 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x1568-2633 ; _v21 |
|
505 | 0 | _aAbstract Protocol Notation -- Abstract Secure Protocols -- Denial-of-Service Attacks -- Secure Address Resolution Protocol -- Weak Hop Integrity Protocol -- Strong Hop Integrity Using Soft Sequence Numbers -- Strong Hop Integrity Using Hard Sequence Numbers -- Implementation Considerations -- Other Uses of Hop Integrity. | |
520 | _aHop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. Hop integrity ensures that if a message, that is part of a denial-of-service attack, is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet. A suite of protocols for providing hop integrity in the Internet is discussed in great detail. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. There are five protocols in this suite: - A secure address resolution protocol - A light-weight key update protocol - A protocol for computing and verifying message digests - An anti-replay protocol that uses soft sequence numbers - An anti-replay protocol that uses hard sequence numbers In addition, other benefits of hop integrity extend to secure routing, mobile IP, and IP multicast. Hop Integrity in the Internet is primarily directed towards designers, reviewers, verifiers, and implementors of secure network protocols. Graduate students who are interested in network security and secure protocols will find this book invaluable. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer organization. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aElectrical engineering. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aComputer Systems Organization and Communication Networks. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aCommunications Engineering, Networks. |
700 | 1 |
_aGouda, Mohamed G. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9780387244266 |
830 | 0 |
_aAdvances in Information Security, _x1568-2633 ; _v21 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/0-387-29444-9 |
912 | _aZDB-2-SCS | ||
950 | _aComputer Science (Springer-11645) | ||
999 |
_c499869 _d499869 |