Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Network Security (eBook)

eBook Download: PDF
2010 | 2010
XII, 280 Seiten
Springer US (Verlag)
978-0-387-73821-5 (ISBN)

Lese- und Medienproben

Network Security -
Systemvoraussetzungen
96,29 inkl. MwSt
(CHF 93,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book provides a reference tool for the increasing number of scientists whose research is more or less involved in network security.

Coverage includes network design and modeling, network management, data management, security and applications.


Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly the Internet, have permeated into every facet of our daily lives. These changes also brought about new challenges, particularly in the area of security. Network security is essential to protect data integrity, con?d- tiality, access control, authentication, user privacy, and so on. All of these aspects are critical to provide fundamental network functionalities. This book covers a comprehensive array of topics in network security including secure metering, group key management, DDoS attacks, and many others. It can be used as a handy reference book for researchers, educators, graduate students, as well as professionals in the ?eld of network security. This book contains 11 r- ereed chapters from prominent researchers working in this area around the globe. Although these selected topics could not cover every aspect, they do represent the most fundamental and practical techniques. This book has been made possible by the great efforts and contributions of many people. First, we thank the authors of each chapter for contributing informative and insightful chapters. Then, we thank all reviewers for their invaluable comments and suggestions that improved the quality of this book. Finally, we thank the staff m- bers from Springer for publishing this work. Besides, we would like to dedicate this book to our families.

Preface 5
Contents 6
Contributors 8
Secure Metering Schemes 11
1 Introduction 11
2 State of the Art 15
2.1 Client Authentication 15
2.2 Micropayments 15
2.3 Pricing via Processing 16
2.4 Threshold Computation of a Function 16
2.5 Secret Sharing 17
3 General Framework 17
3.1 Assumptions and Requirements 18
3.2 Complexity Measures 20
4 Unconditionally Secure Metering Schemes 20
4.1 Threshold Metering Schemes 21
4.1.1 An Entropy Based Model 23
4.2 Metering Schemes with Pricing 25
4.3 Metering Schemes for General Access Structures 28
5 Computationally Secure Metering Schemes 33
5.1 Naor and Pinkas Scheme 33
5.2 Ogata–Kurosawa Scheme 35
5.3 Hash-Based Scheme 36
6 Conclusions 38
References 41
A Cryptographic Framework for the Controlled Release Of Certified Data 43
1 Introduction 43
2 A Cryptographic Framework for the Controlled Release of Certified Data 45
2.1 A Framework of Cryptographic Primitives 46
2.2 Cryptography for the Controlled Release of Certified Data 48
3 Example Applications of the Framework 50
3.1 An Anonymous Credential System with Anonymity Revocation 51
3.2 Anonymous e-cash 51
4 Concrete Framework 52
4.1 Preliminaries 53
4.1.1 Notation 53
4.1.2 Bi-Linear Maps 53
4.2 Commitment Scheme 54
4.2.1 Pedersen's Commitment Scheme 54
4.2.2 An Integer Commitment Scheme 54
4.2.3 Proving the Length of a Discrete Logarithm 55
4.3 The SRSA-CL Signature Scheme and Its Protocols 55
4.3.1 The SRSA-CL Signature Scheme 56
4.3.2 Obtaining of a Signature on Committed Messages 57
4.3.3 Prove Knowledge of a Signature on Committed Messages 58
4.4 The BM-CL Signature Schemes and Its Protocols 58
4.4.1 The Signature Scheme 58
4.4.2 Obtaining of a Signature on Committed Messages 59
4.4.3 Prove Knowledge of a Signature on Committed Messages 60
4.5 The CS Encryption and Verifiable Encryption 61
4.5.1 The Encryption Scheme 61
4.5.2 Verifiable Encryption of Discrete Logarithms 62
5 Bibliographic Notes 63
References 64
Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions 67
1 Introduction 67
2 A Taxonomy of Group Rekeying Protocols 69
2.1 Stateful Protocols 69
2.2 Stateless Protocols 72
2.3 Reliable Key Distribution 75
2.4 Self-Healing Key Distribution 77
2.4.1 Polynomial-Based Self-Healing 77
2.4.2 Self-Healing SDR 79
2.5 Rekeying Optimization 80
2.6 Group Rekeying in Ad-hoc and Sensor Networks 80
2.6.1 Group Rekeying for Ad-hoc Networks 81
2.6.2 Group Rekeying for Sensor Networks 82
3 New Research Directions 83
References 84
Web Forms and Untraceable DDoS Attacks 87
1 Introduction 87
2 Related Work 90
3 The Attack 92
3.1 Description of Vulnerability 92
3.2 Finding the Victim 92
3.3 Phase I: Harvesting Suitable Forms 93
3.4 Phase II: Automatically Filling Forms 94
3.5 Poorly Behaved Sites 94
3.6 Well Behaved Sites 95
3.7 On the Difficulty of Tracing an Attacker 95
4 Experimental Data 96
4.1 Experimental Setup 96
4.2 Results 97
5 Defense Mechanisms 101
5.1 Prevention of Attacks 101
5.2 Detection and Management of Attacks 102
5.3 Synergy Between Defense of Launch Pads and Victims 103
6 Conclusion 104
References 105
Mechanical Verification of Cryptographic Protocols 107
1 Introduction 107
2 Security Protocols 108
3 Flaws in Security Protocols 109
3.1 The Needham–Schroeder Public Key Protocol 109
3.2 Lowe's Attack 110
4 Existing Protocol Verification Methods 111
4.1 State Based Methods 112
4.2 Rule Based Methods 113
5 A Knowledge Based Verification Framework 116
5.1 Basic Notations and Data Structures 116
5.2 Action Functions and Predicates 117
5.3 Assumptions 117
5.4 Rules 118
6 Verifying Needham–Schroeder–Lowe Protocol Mechanically 120
6.1 Modelling the Protocol 120
6.2 Some Important Lemmas 121
6.3 Secrecy of Nonces 122
6.4 Proving Guarantee for B 123
6.5 Proving Guarantee for A 124
6.6 Summary 124
References 124
Routing Security in Ad Hoc Wireless Networks 127
1 Introduction to Ad Hoc Wireless Networks 128
2 Overview of Routing Protocols in Ad Hoc Wireless Networks 129
2.1 Proactive Routing Protocols 130
2.2 Reactive Routing Protocols 131
2.3 Hybrid Routing Protocols 132
2.4 Broadcasting in Ad Hoc Wireless Networks 133
3 Security Services and Challenges in Ad Hoc Wireless Networks 134
4 Security Attacks on Routing Protocols in Ad Hoc Wireless Networks 135
4.1 Attacks Using Impersonation 136
4.2 Attacks Using Modification 136
4.3 Attacks Using Fabrication 137
4.4 Replay Attacks 138
4.5 Denial of Service 138
5 Security Mechanisms and Solutions for Routing Protocols in Ad Hoc WirelessNetworks 139
5.1 Secure Efficient Ad hoc Distance Vector 140
5.2 ARIADNE 140
5.3 Security Aware Routing 141
5.4 Secure Routing Protocol 142
5.5 Secure Routing Protocol for Ad Hoc Networks 143
5.6 Security Protocols for Sensor Network 144
5.7 Cooperation Of Nodes Fairness In Dynamic Ad-hoc NeTworks 144
5.8 Defense Mechanisms Against Rushing Attacks 145
5.9 Defense Mechanisms Against Wormhole Attacks 146
5.10 Defense Mechanisms Against Sybil Attacks 147
5.11 Security Mechanisms for Broadcast Operation 148
6 Conclusions 149
References 151
Insider Threat Assessment: Model, Analysis and Tool 153
1 Introduction 153
1.1 Summary of Contributions 155
1.2 Chapter Organization 156
2 Insider Threat: A Review 156
3 Modeling Insider Threat 157
3.1 Model Overview 157
3.2 The Min-Hack Problem 159
4 Modeling Methodology and Applications 161
4.1 Practical Considerations 161
4.2 Illustrations 163
5 Threat Analysis 166
5.1 On the Complexity of Analyzing Key Challenge Graphs 166
5.1.1 Approximation Algorithms and Approximation Ratios 167
5.1.2 Minimum Label Coverp 167
5.1.3 Minimum Monotone Satisfying Assignment 168
5.1.4 Reducing MMSA to Min-Hack 169
5.1.5 Reducing Label-Cover to Min-Hack 171
5.1.6 Reducing PCP to Min-Hack 174
5.2 Threat Analysis Algorithms 177
5.3 Algorithm Benchmarking 178
6 Related Work 180
6.1 Formal Models 180
6.2 Security Audit Tools 181
6.3 Metrics 182
7 Conclusion And Future Work 182
References 183
Toward Automated Intrusion Alert Analysis 185
1 Introduction 185
2 Correlating Intrusion Alerts Based on Prerequisites and Consequences of Attacks 187
2.1 Prerequisite and Consequence of Attacks 188
2.2 Hyper-Alert Type and Hyper-Alert 188
3 Analyzing Intensive Alerts 194
3.1 Alert Aggregation and Disaggregation 195
3.1.1 Alert Aggregation 195
3.1.2 Alert Disaggregation 197
3.2 Focused Analysis 198
3.3 Clustering Analysis 199
3.4 Frequency Analysis 200
3.5 Link Analysis 200
3.6 Association Analysis 202
3.7 Discussion 203
4 Learning Attack Strategies from Correlated Alerts 203
4.1 Attack Strategy Graph 204
4.2 Learning Attack Strategies 206
4.3 Dealing with Variations of Attacks 207
4.3.1 Automatic Generalization of Hyper-Alert Types 210
5 Related Work 210
6 Conclusion 213
References 213
Conventional Cryptographic Primitives 217
1 Introduction 218
2 Attacks 218
2.1 Cryptanalytic Attacks 218
2.1.1 Classification According to Means 219
2.1.2 Classification According to Result 219
2.2 Side-Channel Attacks 219
2.2.1 Power Attacks 220
2.2.2 Timing Attacks 220
2.2.3 Error Message Attacks 220
2.2.4 Conclusions 220
2.3 Implications 221
3 Stream Ciphers 221
3.1 The One-Time Pad 221
3.2 Description 222
3.3 Requirements 222
3.4 Usage 223
3.5 Example Stream Ciphers 223
3.5.1 Linear Feedback Shift Registers 223
3.5.2 RC4 223
3.5.3 SEAL 224
3.5.4 Stream Ciphers with Integrity Mechanisms 224
4 Block Ciphers 224
4.1 The Substitution Cipher 224
4.2 Description 225
4.3 Requirements 226
4.4 Usage: Modes of Operation 227
4.4.1 Electronic Code Book (ECB) 227
4.4.2 Cipher Block Chaining (CBC) 227
4.4.3 Counter Mode (CTR) 228
4.5 Example Block Ciphers 228
4.5.1 DES 228
4.5.2 3-DES 229
4.5.3 AES 229
5 Hash Functions 230
5.1 Requirements 230
5.2 Breaking a Hash Function 230
5.3 Usage 231
5.3.1 Digital Signature Schemes 231
5.3.2 Storage of Sensitive Information 231
5.4 Example Hash Functions 232
5.4.1 The MD4-Family 232
5.4.2 Block Cipher Based Designs 232
6 Message Authentication Codes 233
6.1 Description 233
6.2 Requirements 233
6.3 Examples 234
6.3.1 CBC–MAC 234
6.3.2 HMAC 234
6.3.3 Universal Hash Functions 235
7 Outlook 235
References 236
Efficient Trapdoor-Based Client Puzzle Against DoS Attacks 239
1 Introduction 239
2 Related Work 242
2.1 Contribution 243
2.2 Organization of the Chapter 243
3 Preliminary 243
3.1 Trapdoor One-Way Function 243
3.2 Security Assumption 244
4 Definition 244
5 The DLP-Based Client Puzzle Scheme 246
5.1 Algorithm 246
5.2 System Description 247
5.3 Security Consideration 249
5.4 Remark 252
6 System Configuration 254
7 Discussion 255
8 Conclusion 257
References 258
Attacks and Countermeasures in Sensor Networks: A Survey 261
1 Introduction 261
2 Physical Layer 262
2.1 Attacks in the Physical Layer 262
2.1.1 Device Tampering 263
2.1.2 Eavesdropping 263
2.1.3 Jamming 263
2.2 Countermeasures in the Physical Layer 264
2.2.1 Access Restriction 264
2.2.2 Encryption 264
3 MAC Layer 266
3.1 Attacks in the MAC Layer 266
3.1.1 Traffic Manipulation 266
3.1.2 Identity Spoofing 267
3.2 Countermeasures in the MAC Layer 267
3.2.1 Misbehavior Detection 267
3.2.2 Identity Protection 269
4 Network Layer 270
4.1 Attacks in the Network Layer 270
4.1.1 False Routing 270
4.1.2 Packet Replication 272
4.1.3 Black Hole 273
4.1.4 Sinkhole 273
4.1.5 Selective Forwarding 273
4.1.6 Wormhole 274
4.2 Countermeasures in Network Layer 274
4.2.1 Routing Access Restriction 274
4.2.2 False Routing Information Detection 275
4.2.3 Wormhole Detection 275
5 Application Layer 276
5.1 Attacks in the Application Layer 276
5.1.1 Clock Skewing 276
5.1.2 Selective Message Forwarding 277
5.1.3 Data Aggregation Distortion 277
5.2 Countermeasures in the Application Layer 278
5.2.1 Data Integrity Protection 278
5.2.2 Data Confidentiality Protection 278
6 Discussion 278
7 Conclusion 279
References 279
Index 283

Erscheint lt. Verlag 16.7.2010
Zusatzinfo XII, 280 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Informatik Weitere Themen Hardware
Naturwissenschaften
Schlagworte Data Management • denial of service • Distributed denial of service • Du • Huang • MacCallum • network design and modeling • Network Management • Network Security • Routing • security
ISBN-10 0-387-73821-5 / 0387738215
ISBN-13 978-0-387-73821-5 / 9780387738215
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 3,7 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
CHF 78,15
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95