000 03706nam a22005415i 4500
001 978-0-387-29444-5
003 DE-He213
005 20250710083944.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 _a9780387294445
_a99780387294445
024 7 _a10.1007/0-387-29444-9
_2doi
082 0 4 _a005.82
_223
100 1 _aHuang, Chin-Tser.
_eauthor.
245 1 0 _aHop Integrity in the Internet
_h[recurso electrónico] /
_cby Chin-Tser Huang, Mohamed G. Gouda.
264 1 _aBoston, MA :
_bSpringer US,
_c2006.
300 _aXI, 112 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x1568-2633 ;
_v21
505 0 _aAbstract Protocol Notation -- Abstract Secure Protocols -- Denial-of-Service Attacks -- Secure Address Resolution Protocol -- Weak Hop Integrity Protocol -- Strong Hop Integrity Using Soft Sequence Numbers -- Strong Hop Integrity Using Hard Sequence Numbers -- Implementation Considerations -- Other Uses of Hop Integrity.
520 _aHop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service attacks in the Internet. Hop integrity ensures that if a message, that is part of a denial-of-service attack, is originated by an adversarial host in the Internet and if the message header includes a wrong address for the originating host (in order to hide the true source of the attack), then the message will be classified as modified or replayed and will be discarded by the first router that receives the message in the Internet. A suite of protocols for providing hop integrity in the Internet is discussed in great detail. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. There are five protocols in this suite: - A secure address resolution protocol - A light-weight key update protocol - A protocol for computing and verifying message digests - An anti-replay protocol that uses soft sequence numbers - An anti-replay protocol that uses hard sequence numbers In addition, other benefits of hop integrity extend to secure routing, mobile IP, and IP multicast. Hop Integrity in the Internet is primarily directed towards designers, reviewers, verifiers, and implementors of secure network protocols. Graduate students who are interested in network security and secure protocols will find this book invaluable.
650 0 _aCOMPUTER SCIENCE.
650 0 _aCOMPUTER NETWORK ARCHITECTURES.
650 0 _aCOMPUTER COMMUNICATION NETWORKS.
650 0 _aDATA STRUCTURES (COMPUTER SCIENCE).
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aCODING THEORY.
650 0 _aTELECOMMUNICATION.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aCOMPUTER COMMUNICATION NETWORKS.
650 2 4 _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY.
650 2 4 _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS.
650 2 4 _aCODING AND INFORMATION THEORY.
650 2 4 _aCOMMUNICATIONS ENGINEERING, NETWORKS.
700 1 _aGouda, Mohamed G.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387244266
830 0 _aAdvances in Information Security,
_x1568-2633 ;
_v21
856 4 0 _uhttp://dx.doi.org/10.1007/0-387-29444-9
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c56959
_d56959