메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-262

Network infrastructure security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84892282714     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4419-0166-8     Document Type: Book
Times cited : (22)

References (99)
  • 2
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • Nov/Dec
    • A. Chakrabarti and G. Manimaran, "Internet Infrastructure Security: A Taxonomy, " IEEE Network, vol.16, no.6, pp.13-21, Nov/Dec. 2002.
    • (2002) IEEE Network , vol.16 , Issue.6 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 4
    • 0031378491 scopus 로고    scopus 로고
    • Security issues in networks with internet access
    • Dec
    • C.E Landwehr and D.M. Goldschlag, "Security issues in networks with Internet access, " Proceedings of the IEEE, vol. 85, issu. 12, Dec. 1997, pp. 2034-2051.
    • (1997) Proceedings of the IEEE , vol.85 , Issue.12 , pp. 2034-2051
    • Landwehr, C.E.1    Goldschlag, D.M.2
  • 5
    • 0037255740 scopus 로고    scopus 로고
    • Fame, but no riches, for cybersecurity
    • Jan
    • D. Farber, "Fame, but No Riches, For Cybersecurity, " IEEE Spectrum, vol. 40, iss. 1, Jan. 2003, pp. 51-52.
    • (2003) IEEE Spectrum , vol.40 , Issue.1 , pp. 51-52
    • Farber, D.1
  • 6
    • 0036999868 scopus 로고    scopus 로고
    • Computer attack trends challenge internet security
    • Allen Householder, Kevin Houle, and Chad Dougherty, "Computer Attack Trends Challenge Internet Security, " Security & Privacy, 2002, pp. 5-7.
    • (2002) Security & Privacy , pp. 5-7
    • Householder, A.1    Houle, K.2    Dougherty, C.3
  • 7
    • 77953833989 scopus 로고    scopus 로고
    • The internet outage and attacks of october 2002
    • William F. Slater, "The Internet Outage and Attacks of October 2002, " The Chicago Chapter of the Internet Society, http://www.isoc-chicago. org/internetoutage.pdf.
    • The Chicago Chapter of the Internet Society
    • Slater, W.F.1
  • 8
    • 0036469431 scopus 로고    scopus 로고
    • Security: Technical, social, and legal challenges
    • Feb
    • Bill Arbaugh, "Security: Technical, Social, and Legal Challenges, " Computer, vol. 35, no. 2, pp. 109-111, Feb., 2002.
    • (2002) Computer , vol.35 , Issue.2 , pp. 109-111
    • Arbaugh, B.1
  • 9
    • 0041296659 scopus 로고
    • Internet security enters the middle ages
    • Oct
    • Rolf Oppliger, "Internet Security Enters the Middle Ages, " Computer, vol. 28, no. 10, pp. 100-101, Oct., 1995.
    • (1995) Computer , vol.28 , Issue.10 , pp. 100-101
    • Oppliger, R.1
  • 15
    • 84892202714 scopus 로고    scopus 로고
    • Security sage's guide to hardening the network infrastructure
    • Erik Pace Birkholz, Brian Kenyon, and Steven Andres, "Security Sage's guide to hardening the network infrastructure, " Syngress, c2004.
    • (2004) Syngress
    • Birkholz, E.P.1    Kenyon, B.2    Andres, S.3
  • 16
    • 84926626225 scopus 로고    scopus 로고
    • Hack proofing your network: Internet tradecraft
    • 1 edition
    • Ryan Russell and Stace Cunningham, "Hack proofing your network: Internet tradecraft, " Syngress; 1 edition, 2000.
    • (2000) Syngress
    • Russell, R.1    Cunningham, S.2
  • 17
    • 84926626225 scopus 로고    scopus 로고
    • Hack proofing your network
    • 2 edition
    • Ryan Russell, "Hack proofing your network, " Syngress, 2 edition, 2002.
    • (2002) Syngress
    • Russell, R.1
  • 26
    • 84892214814 scopus 로고    scopus 로고
    • Layer 2 - The weakest link
    • first quarter
    • Connie Howard, "Layer 2-the weakest link, " Packet, vol. 15, no. 1, first quarter 2003.
    • (2003) Packet , vol.15 , Issue.1
    • Howard, C.1
  • 27
    • 84892281249 scopus 로고    scopus 로고
    • "Configuring Port Security, " http://www.cisco.com/en/US/docs/ switches/lan/catalyst2950/software/release/12.1-19-ea1/configuration/guide/ swtrafc.html#wp1038501.
    • Configuring Port Security
  • 31
    • 84892214814 scopus 로고    scopus 로고
    • Layer 2 - The weakest link
    • first quarter
    • Connie Howard, "Layer 2-the weakest link, " Packet, vol. 15, no. 1, first quarter 2003.
    • (2003) Packet , vol.15 , Issue.1
    • Howard, C.1
  • 35
    • 40949087228 scopus 로고    scopus 로고
    • MSc thesis in Computer Science of the University of California Davis
    • Guillermo Mario Marro, "Attacks at the data link layer, " MSc thesis in Computer Science of the University of California Davis, http://seclab.cs.ucdavis.edu/papers/Marro-masters-thesis.pdf.
    • Attacks at the Data Link Layer
    • Marro, G.M.1
  • 43
    • 0038734641 scopus 로고    scopus 로고
    • A scalable algorithm for malicious update detection & recovery in distance vector protocols
    • July
    • Anirban Chakrabarti and G. Manimaran, "A Scalable Algorithm for Malicious Update Detection & Recovery in Distance Vector Protocols, " in DCNL Technical Report, July 2002.
    • (2002) DCNL Technical Report
    • Chakrabarti, A.1    Manimaran, G.2
  • 44
    • 0033296081 scopus 로고    scopus 로고
    • Lowering security overhead in link state routing
    • April
    • Ralf Hauser, Tony Przygienda, and Gene Tsudik, "Lowering security overhead in link state routing, " Computer Network, vol. 31, iss. 9, April 1999, pp. 885-894.
    • (1999) Computer Network , vol.31 , Issue.9 , pp. 885-894
    • Hauser, R.1    Przygienda, T.2    Tsudik, G.3
  • 45
    • 0036805086 scopus 로고    scopus 로고
    • Securing the Internet routing infrastructure
    • Oct
    • Panagiotis Papadimitratos and Zygmunt J. Haas, "Securing the Internet routing infrastructure, " IEEE Communications Magazine, Oct. 2002, pp. 60-68.
    • (2002) IEEE Communications Magazine , pp. 60-68
    • Papadimitratos, P.1    Haas, Z.J.2
  • 46
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security a taxonomy
    • Nov/Dec
    • Anirban Chakrabarti and G. Manimaran, "Internet Infrastructure Security A Taxonomy, " IEEE Network, vol.16, no.6, pp.13-21, Nov/Dec. 2002.
    • (2002) IEEE Network , vol.16 , Issue.6 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 48
    • 0038647019 scopus 로고    scopus 로고
    • An efficient algorithm for malicious update detection & recovery in distance vector protocols
    • A. Chakrabarti and G. Manimaran, "An efficient algorithm for malicious update detection & recovery in distance vector protocols, " Proc. IEEE Int'l Conf. Communications (ICC'03), pp.1952-1956, 2003.
    • (2003) Proc. IEEE Int'l Conf. Communications (ICC'03) , pp. 1952-1956
    • Chakrabarti, A.1    Manimaran, G.2
  • 52
    • 0031383687 scopus 로고    scopus 로고
    • An efficient message authentication scheme for link state routing
    • Dec
    • Steven Cheung, "An Efficient Message Authentication Scheme for Link State Routing, " Proc. Computer Security Applications Conference, Dec. 1997, pp. 90-98.
    • (1997) Proc. Computer Security Applications Conference , pp. 90-98
    • Cheung, S.1
  • 53
  • 62
    • 33845214846 scopus 로고    scopus 로고
    • Recent developments in securing Internet routing protocols
    • Oct
    • L He, "Recent developments in securing Internet routing protocols, " BT Technology Journal, vol. 24, iss. 4, Oct. 2006, pp. 180-196.
    • (2006) BT Technology Journal , vol.24 , Issue.4 , pp. 180-196
    • He, L.1
  • 65
    • 34547345799 scopus 로고    scopus 로고
    • Securing the border gateway protocol
    • Sept
    • Stephen, T. Kent, "Securing the Border Gateway Protocol, " The Internet Protocol Journal, Sept. 2003, vol. 6, no. 3, pp.2-14.
    • (2003) The Internet Protocol Journal , vol.6 , Issue.3 , pp. 2-14
    • Stephen, T.K.1
  • 66
    • 27544500277 scopus 로고    scopus 로고
    • Securing BGP through secure origin bgp
    • Sept
    • Russ White, "Securing BGP Through Secure Origin BGP, " The Internet Protocol Journal, Sept. 2003, vol. 6, no. 3, pp.15-22.
    • (2003) The Internet Protocol Journal , vol.6 , Issue.3 , pp. 15-22
    • White, R.1
  • 73
    • 0036539506 scopus 로고    scopus 로고
    • DHCP: Another untrustworthy service
    • Apr 5
    • Rik Farrow, "DHCP: Another Untrustworthy Service, " Network Magazine, Apr 5, 2002.
    • (2002) Network Magazine
    • Farrow, R.1
  • 76
    • 0033154263 scopus 로고    scopus 로고
    • Automated configuration of TCPIP with DHCP
    • Jul.-Aug
    • Ralph Droms, "Automated configuration of TCPIP with DHCP, " IEEE Internet Computing, vol. 3, iss. 4, Jul.-Aug. 1999, pp. 45-53.
    • (1999) IEEE Internet Computing , vol.3 , Issue.4 , pp. 45-53
    • Droms, R.1
  • 79
    • 84892262854 scopus 로고    scopus 로고
    • Securing the domain name system
    • Jan
    • Diane Davidowicz and Paul Vixie, "Securing the Domain Name System, " Network Magazine, Jan. 2000, vol. 15, no. 1, pp. 92-97.
    • (2000) Network Magazine , vol.15 , Issue.1 , pp. 92-97
    • Davidowicz, D.1    Vixie, P.2
  • 90
    • 84892191476 scopus 로고    scopus 로고
    • Wireshark & ethereal network protocol analyzer toolkit
    • Sept
    • Angela Orebaugh, Gilbert Ramirez, and Jay Beale, "Wireshark & Ethereal Network Protocol Analyzer Toolkit, " Syngress, Sept. 2006.
    • (2006) Syngress
    • Orebaugh, A.1    Ramirez, G.2    Beale, J.3
  • 91
    • 84892281420 scopus 로고    scopus 로고
    • The writing of this chapter is PARTly supported by Hong Kong Government General Research Fund numbered CityU-123608 and City University of Hong Kong Strategic Research Grants numbered 7001941 and 7001764
    • The writing of this chapter is PARTly supported by Hong Kong Government General Research Fund numbered CityU-123608 and City University of Hong Kong Strategic Research Grants numbered 7001941 and 7001764.
  • 92
    • 84867009939 scopus 로고    scopus 로고
    • Building secure network infrastructure for LANs
    • July
    • K. H. Yeung and T. C. Leung "Building Secure Network Infrastructure for LANs", IPSI Transactions on Advance Research, vol. 2, no. 2, July 2006, pp.32-37.
    • (2006) IPSI Transactions on Advance Research , vol.2 , Issue.2 , pp. 32-37
    • Yeung, K.H.1    Leung, T.C.2
  • 93
    • 40949131821 scopus 로고    scopus 로고
    • Improving network infrastructure security by PARTitioning networks running spanning tree protocol
    • France, Aug
    • K. H. Yeung, F. Yan and T. C. Leung, "Improving Network Infrastructure Security by PARTitioning Networks Running Spanning Tree Protocol", Proc. Int'l Conf. Internet Surveillance and Protection, France, Aug. 2006.
    • (2006) Proc. Int'l Conf. Internet Surveillance and Protection
    • Yeung, K.H.1    Yan, F.2    Leung, T.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.