tailieunhanh - The IP security

This article was written as a result of the authors teaching a network security subject in the Faculty of IT, at the University of Technology Sydney. There are many concepts which need to be well understood by network security students and practitioners. To assist in this there have been several attempts to classify different aspects of the subject area. This article lists some of the common taxonomies, shows the relationship between them, and modifies or extends them where appropriate to make them consistent, and then defines an extensible ontology for network security based on this material. The article provides a. | NATO workshop on Advanced Security Technologies in Networking Portoroz May 29 - June 2 2000 1 IP security Madalina Baltatu Antonio Lioy Dip. Automatica e Informatica Politecnico di Torino Torino Italy Abstract This paper presents the network level security services currently available for the Internet infrastructure. Since IPsec is likely to become the largely accepted standard as far as IP level security is concerned the paper describes the IPsec architecture including its defined security formats and the related key management procedures. Finally common IPsec applications are presented and the future directions are outlined. Keywords network level security authentication integrity confidentiality anti-replay I. Introduction TCP IP networks are plagued with security problems because they have been designed to work in a friendly environment with physically secure connections. When these assumptions are no more valid - as it is nowadays -the many security weaknesses of TCP IP become manifest and can be easily exploited. In general IP communications are exposed to several types of attack packet sniffing due to network topology IP packets sent from a source to a specific destination can also be read by other nodes that can then get hold of the payload which may contain passwords or other private information IP spoofing IP addresses can be very easily spoofed both to attack those services whose authentication is based on the sender s address as the rlogin service or several WWW servers and to supply wrong information to subvert the logical organization of the network for example by forging false ICMP messages of the type destination unreachable or redirect connection hijacking whole IP packets can be forged to appear as legal packets coming from one of the two communicating parties the goal of the attack being to insert wrong data in an existing channel. Effective solutions to these and other attacks are not always available. When countermeasures do exist they are .

crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.