Network Infrastructure Security (eBook)
XIV, 266 Seiten
Springer US (Verlag)
978-1-4419-0166-8 (ISBN)
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised.
Network Infrastructure Security bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions.
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security by Angus Wong and Alan Yeung addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised.Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. Daily operations around the world highly depend on the availability and reliability of the Internet, which makes the security of this infrastructure a top priority issue in the field. Network Infrastructure Security is a book that bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions. About the authorsAngus Kin-Yeung Wong obtained his BSc and PhD degrees from City University of Hong Kong and is currently an associate professor at Macao Polytechnic Institute. Alan Kai-Hau Yeung obtained his BSc and PhD degrees from the Chinese University of Hong Kong and is currently an associate professor at City University of Hong Kong. Wong and Yeung have been collaborating in network-related research for over 10 years.
About the authors 5
Preface 7
Goal of writing 8
Not goal of writing 9
Audience 10
Chapter design 11
Table of Content 12
1. Introduction to Network Infrastructure Security 13
1.1 Internet infrastructure 13
1.2 Key components in the Internet infrastructure 16
1.3 Internet infrastructure security 21
2. Network Infrastructure Security -- Switching 31
2.1 Introduction 31
2.2 How Switches can be Attacked 34
3. Network Infrastructure Security – Routing 71
3.1 Introduction 71
3.1.2 Routing protocol vulnerability 73
3.2 Overview of Internet Routing 75
3.3 External and internal attacks 84
3.4 RIP Attacks and Countermeasures 96
3.5 OSPF Attacks and Countermeasures 106
3.6 BGP Attacks and Countermeasures 122
4. Network Infrastructure Security -- Address Configuration and Naming 148
4.1 Introduction 148
4.2 DHCP Attack 149
4.3 DNS Attack 157
5. Experiments for Illustrating Network Infrastructure Attacks 191
5.1 Purpose of the Chapter 191
5.2 Attack Experiments 197
6. Protecting Network Infrastructure – A New Approach 229
6.1 Purpose of the Chapter 229
6.2 Analysis on Security Problems of Network Infrastructure 230
6.3 Steps in Hacking Network Infrastructure 238
6.4 Flat Network Design Model and Masquerading 246
6.5 A New Model to Protect Network Infrastructure 248
Erscheint lt. Verlag | 21.4.2009 |
---|---|
Zusatzinfo | XIV, 266 p. 10 illus. |
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
Informatik ► Weitere Themen ► Hardware | |
Schlagworte | Bridge • Configuration • cryptography • data confidentiality • Data Link • Data Security • information assurance • Infrastructure • Internet • Network • Router • Routing • security • Switch • TCP/IP |
ISBN-10 | 1-4419-0166-3 / 1441901663 |
ISBN-13 | 978-1-4419-0166-8 / 9781441901668 |
Haben Sie eine Frage zum Produkt? |
Größe: 12,4 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich