000 03724nam a22005655i 4500
001 978-0-387-29444-5
003 DE-He213
005 20161121230518.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 _a9780387294445
_9978-0-387-29444-5
024 7 _a10.1007/0-387-29444-9
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aHuang, Chin-Tser.
_eauthor.
245 1 0 _aHop Integrity in the Internet
_h[electronic resource] /
_cby Chin-Tser Huang, Mohamed G. Gouda.
264 1 _aBoston, MA :
_bSpringer US,
_c2006.
300 _aXI, 112 p. 17 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v21
505 0 _aAbstract Protocol Notation -- Abstract Secure Protocols -- Denial-of-Service Attacks -- Secure Address Resolution Protocol -- Weak Hop Integrity Protocol -- Strong Hop Integrity Using Soft Sequence Numbers -- Strong Hop Integrity Using Hard Sequence Numbers -- Implementation Considerations -- Other Uses of Hop Integrity.
520 _aHop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. Hop integrity ensures that if a message, that is part of a denial-of-service attack, is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet. A suite of protocols for providing hop integrity in the Internet is discussed in great detail. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. There are five protocols in this suite: - A secure address resolution protocol - A light-weight key update protocol - A protocol for computing and verifying message digests - An anti-replay protocol that uses soft sequence numbers - An anti-replay protocol that uses hard sequence numbers In addition, other benefits of hop integrity extend to secure routing, mobile IP, and IP multicast. Hop Integrity in the Internet is primarily directed towards designers, reviewers, verifiers, and implementors of secure network protocols. Graduate students who are interested in network security and secure protocols will find this book invaluable.
650 0 _aComputer science.
650 0 _aComputer organization.
650 0 _aComputer communication systems.
650 0 _aData structures (Computer science).
650 0 _aData encryption (Computer science).
650 0 _aCoding theory.
650 0 _aElectrical engineering.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aComputer Systems Organization and Communication Networks.
650 2 4 _aCoding and Information Theory.
650 2 4 _aCommunications Engineering, Networks.
700 1 _aGouda, Mohamed G.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387244266
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v21
856 4 0 _uhttp://dx.doi.org/10.1007/0-387-29444-9
912 _aZDB-2-SCS
950 _aComputer Science (Springer-11645)
999 _c499869
_d499869