-
2
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
Nov/Dec
-
A. Chakrabarti and G. Manimaran, "Internet Infrastructure Security: A Taxonomy, " IEEE Network, vol.16, no.6, pp.13-21, Nov/Dec. 2002.
-
(2002)
IEEE Network
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
3
-
-
0005238259
-
Security of the internet
-
Thomas A. Longstaff, James T. Ellis, Shawn V. Hernan, Howard F. Lipson, Robert D. McMillan, Linda Hutz Pesante, and Derek Simmel, "Security of the Internet, " The Froehlich/Kent Encyclopedia of Telecommunications, vol. 15, pp. 231-255, 1997.
-
(1997)
The Froehlich/Kent Encyclopedia of Telecommunications
, vol.15
, pp. 231-255
-
-
Longstaff, T.A.1
Ellis, J.T.2
Hernan, S.V.3
Lipson, H.F.4
McMillan, R.D.5
Pesante, L.H.6
Simmel, D.7
-
4
-
-
0031378491
-
Security issues in networks with internet access
-
Dec
-
C.E Landwehr and D.M. Goldschlag, "Security issues in networks with Internet access, " Proceedings of the IEEE, vol. 85, issu. 12, Dec. 1997, pp. 2034-2051.
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.12
, pp. 2034-2051
-
-
Landwehr, C.E.1
Goldschlag, D.M.2
-
5
-
-
0037255740
-
Fame, but no riches, for cybersecurity
-
Jan
-
D. Farber, "Fame, but No Riches, For Cybersecurity, " IEEE Spectrum, vol. 40, iss. 1, Jan. 2003, pp. 51-52.
-
(2003)
IEEE Spectrum
, vol.40
, Issue.1
, pp. 51-52
-
-
Farber, D.1
-
6
-
-
0036999868
-
Computer attack trends challenge internet security
-
Allen Householder, Kevin Houle, and Chad Dougherty, "Computer Attack Trends Challenge Internet Security, " Security & Privacy, 2002, pp. 5-7.
-
(2002)
Security & Privacy
, pp. 5-7
-
-
Householder, A.1
Houle, K.2
Dougherty, C.3
-
7
-
-
77953833989
-
The internet outage and attacks of october 2002
-
William F. Slater, "The Internet Outage and Attacks of October 2002, " The Chicago Chapter of the Internet Society, http://www.isoc-chicago. org/internetoutage.pdf.
-
The Chicago Chapter of the Internet Society
-
-
Slater, W.F.1
-
8
-
-
0036469431
-
Security: Technical, social, and legal challenges
-
Feb
-
Bill Arbaugh, "Security: Technical, Social, and Legal Challenges, " Computer, vol. 35, no. 2, pp. 109-111, Feb., 2002.
-
(2002)
Computer
, vol.35
, Issue.2
, pp. 109-111
-
-
Arbaugh, B.1
-
9
-
-
0041296659
-
Internet security enters the middle ages
-
Oct
-
Rolf Oppliger, "Internet Security Enters the Middle Ages, " Computer, vol. 28, no. 10, pp. 100-101, Oct., 1995.
-
(1995)
Computer
, vol.28
, Issue.10
, pp. 100-101
-
-
Oppliger, R.1
-
15
-
-
84892202714
-
Security sage's guide to hardening the network infrastructure
-
Erik Pace Birkholz, Brian Kenyon, and Steven Andres, "Security Sage's guide to hardening the network infrastructure, " Syngress, c2004.
-
(2004)
Syngress
-
-
Birkholz, E.P.1
Kenyon, B.2
Andres, S.3
-
16
-
-
84926626225
-
Hack proofing your network: Internet tradecraft
-
1 edition
-
Ryan Russell and Stace Cunningham, "Hack proofing your network: Internet tradecraft, " Syngress; 1 edition, 2000.
-
(2000)
Syngress
-
-
Russell, R.1
Cunningham, S.2
-
17
-
-
84926626225
-
Hack proofing your network
-
2 edition
-
Ryan Russell, "Hack proofing your network, " Syngress, 2 edition, 2002.
-
(2002)
Syngress
-
-
Russell, R.1
-
19
-
-
58249120295
-
-
O'Reilly Media, 1 edition
-
Nitesh Dhanjani and Justin Clarke, "Network Security Tools: Writing, Hacking, and Modifying Security Tools, " O'Reilly Media, 1 edition, 2005.
-
(2005)
Network Security Tools: Writing, Hacking, and Modifying Security Tools
-
-
Dhanjani, N.1
Clarke, J.2
-
26
-
-
84892214814
-
Layer 2 - The weakest link
-
first quarter
-
Connie Howard, "Layer 2-the weakest link, " Packet, vol. 15, no. 1, first quarter 2003.
-
(2003)
Packet
, vol.15
, Issue.1
-
-
Howard, C.1
-
27
-
-
84892281249
-
-
"Configuring Port Security, " http://www.cisco.com/en/US/docs/ switches/lan/catalyst2950/software/release/12.1-19-ea1/configuration/guide/ swtrafc.html#wp1038501.
-
Configuring Port Security
-
-
-
31
-
-
84892214814
-
Layer 2 - The weakest link
-
first quarter
-
Connie Howard, "Layer 2-the weakest link, " Packet, vol. 15, no. 1, first quarter 2003.
-
(2003)
Packet
, vol.15
, Issue.1
-
-
Howard, C.1
-
35
-
-
40949087228
-
-
MSc thesis in Computer Science of the University of California Davis
-
Guillermo Mario Marro, "Attacks at the data link layer, " MSc thesis in Computer Science of the University of California Davis, http://seclab.cs.ucdavis.edu/papers/Marro-masters-thesis.pdf.
-
Attacks at the Data Link Layer
-
-
Marro, G.M.1
-
42
-
-
0030695529
-
Securing distance-vector routing protocols
-
Feb
-
Bradley R. Smith, Shree Murthy, and J.J. Garcia-Luna-Aceves, "Securing distance-vector routing protocols, " Proc. Symp. Network and Distributed System Security (SNDSS), Feb. 1997, pp. 85-92.
-
(1997)
Proc. Symp. Network and Distributed System Security (SNDSS)
, pp. 85-92
-
-
Smith, B.R.1
Murthy, S.2
Garcia-Luna-Aceves, J.J.3
-
43
-
-
0038734641
-
A scalable algorithm for malicious update detection & recovery in distance vector protocols
-
July
-
Anirban Chakrabarti and G. Manimaran, "A Scalable Algorithm for Malicious Update Detection & Recovery in Distance Vector Protocols, " in DCNL Technical Report, July 2002.
-
(2002)
DCNL Technical Report
-
-
Chakrabarti, A.1
Manimaran, G.2
-
44
-
-
0033296081
-
Lowering security overhead in link state routing
-
April
-
Ralf Hauser, Tony Przygienda, and Gene Tsudik, "Lowering security overhead in link state routing, " Computer Network, vol. 31, iss. 9, April 1999, pp. 885-894.
-
(1999)
Computer Network
, vol.31
, Issue.9
, pp. 885-894
-
-
Hauser, R.1
Przygienda, T.2
Tsudik, G.3
-
46
-
-
0036871268
-
Internet infrastructure security a taxonomy
-
Nov/Dec
-
Anirban Chakrabarti and G. Manimaran, "Internet Infrastructure Security A Taxonomy, " IEEE Network, vol.16, no.6, pp.13-21, Nov/Dec. 2002.
-
(2002)
IEEE Network
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
47
-
-
84961751347
-
Retrofitting security into Internet infrastructure protocols
-
S. Murphy, O. Gudmundsson, R. Mundy, and B. Wellington, "Retrofitting security into Internet infrastructure protocols, " Proc. DARPA Information Survivability Conference and Exposition, vol. 1, 2000, pp. 3-17.
-
(2000)
Proc. DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 3-17
-
-
Murphy, S.1
Gudmundsson, O.2
Mundy, R.3
Wellington, B.4
-
48
-
-
0038647019
-
An efficient algorithm for malicious update detection & recovery in distance vector protocols
-
A. Chakrabarti and G. Manimaran, "An efficient algorithm for malicious update detection & recovery in distance vector protocols, " Proc. IEEE Int'l Conf. Communications (ICC'03), pp.1952-1956, 2003.
-
(2003)
Proc. IEEE Int'l Conf. Communications (ICC'03)
, pp. 1952-1956
-
-
Chakrabarti, A.1
Manimaran, G.2
-
49
-
-
0842289243
-
Detection of invalid routing announcements in RIP protocol
-
Dec
-
D. Pei, D. Massey, and L. Zhang, "Detection of invalid routing announcements in RIP protocol, " Proc. IEEE Global Telecommunications Conference (GLOBECOM '03), vol. 3, Dec. 2003, pp. 1450-1455.
-
(2003)
Proc. IEEE Global Telecommunications Conference (GLOBECOM '03)
, vol.3
, pp. 1450-1455
-
-
Pei, D.1
Massey, D.2
Zhang, L.3
-
52
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
Dec
-
Steven Cheung, "An Efficient Message Authentication Scheme for Link State Routing, " Proc. Computer Security Applications Conference, Dec. 1997, pp. 90-98.
-
(1997)
Proc. Computer Security Applications Conference
, pp. 90-98
-
-
Cheung, S.1
-
53
-
-
85017067350
-
Real-time protocol analysis for detecting link-state routing protocol attacks
-
Feb
-
Ho-Yen Chang, S. Felix Wu, and Y. Frank Jou, "Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks, " ACM Transactions on Information and System Security (TISSEC), vol. 4, iss. 1, Feb. 2001, pp. 1-36.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.1
, pp. 1-36
-
-
Chang, H.-Y.1
Wu, S.F.2
Jou, Y.F.3
-
54
-
-
84892201733
-
-
Kirk A. Bradley, Steven Cheung, Nick Puketza, Biswanath Mukherjee, and Ronald A. Olsson, "Detecting Disruptive Routers A Distributed Network Monitoring, " http://www.cs.ucdavis.edu/research/tech-reports/1997/CSE-97- 17.pdf.
-
Detecting Disruptive Routers A Distributed Network Monitoring
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
58
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
April
-
Stephen Kent, Charles Lynn, and Karen Seo, "Secure Border Gateway Protocol (S-BGP), " IEEE Journal on Selected Areas in Communications, vol. 18, no. 4, April 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
61
-
-
84892350397
-
-
Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick McDaniel, and Aviel Rubin, "Working Around BGP An Incremental Approach to Improving Security and Accuracy of Interdomain Routing, " http://www.isoc.org/isoc/conferences/ndss/03/proceedings/papers/5.pdf.
-
Working Around BGP An Incremental Approach to Improving Security and Accuracy of Interdomain Routing
-
-
Goodell, G.1
Aiello, W.2
Griffin, T.3
Ioannidis, J.4
Mcdaniel, P.5
Rubin, A.6
-
62
-
-
33845214846
-
Recent developments in securing Internet routing protocols
-
Oct
-
L He, "Recent developments in securing Internet routing protocols, " BT Technology Journal, vol. 24, iss. 4, Oct. 2006, pp. 180-196.
-
(2006)
BT Technology Journal
, vol.24
, Issue.4
, pp. 180-196
-
-
He, L.1
-
63
-
-
11244338691
-
Beware of BGP attacks
-
Apr
-
O. Nordström and C. Dovrolis, "Beware of BGP attacks, " SIGCOMM Computer Communication Review, vol. 34, iss. 2, Apr. 2004, pp. 1-8.
-
(2004)
SIGCOMM Computer Communication Review
, vol.34
, Issue.2
, pp. 1-8
-
-
Nordström, O.1
Dovrolis, C.2
-
64
-
-
17744396158
-
A BGP attack against traffic engineering
-
Dec
-
J. Kim, S.Y. Ko, D.M. Nicol, X.A. Dimitropoulos, and G.F. Riley, "A BGP attack against traffic engineering, " Proc. Simulation Conference, 2004, vol. 1, Dec. 2004.
-
(2004)
Proc. Simulation Conference, 2004
, vol.1
-
-
Kim, J.1
Ko, S.Y.2
Nicol, D.M.3
Dimitropoulos, X.A.4
Riley, G.F.5
-
65
-
-
34547345799
-
Securing the border gateway protocol
-
Sept
-
Stephen, T. Kent, "Securing the Border Gateway Protocol, " The Internet Protocol Journal, Sept. 2003, vol. 6, no. 3, pp.2-14.
-
(2003)
The Internet Protocol Journal
, vol.6
, Issue.3
, pp. 2-14
-
-
Stephen, T.K.1
-
66
-
-
27544500277
-
Securing BGP through secure origin bgp
-
Sept
-
Russ White, "Securing BGP Through Secure Origin BGP, " The Internet Protocol Journal, Sept. 2003, vol. 6, no. 3, pp.15-22.
-
(2003)
The Internet Protocol Journal
, vol.6
, Issue.3
, pp. 15-22
-
-
White, R.1
-
69
-
-
0013380935
-
-
RFC 2136, April
-
P. Vixie, S. Thomson, Y. Rekhter, and J. Bound, "Dynamic Updates in the Domain Name System (DNS UPDATE), " RFC 2136, April 1997.
-
(1997)
Dynamic Updates in the Domain Name System (DNS UPDATE)
-
-
Vixie, P.1
Thomson, S.2
Rekhter, Y.3
Bound, J.4
-
70
-
-
33144488680
-
-
RFC 4034, Mar
-
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, "Resource Records for the DNS Security Extensions, " RFC 4034, Mar. 2005.
-
(2005)
Resource Records for the DNS Security Extensions
-
-
Arends, R.1
Austein, R.2
Larson, M.3
Massey, D.4
Rose, S.5
-
71
-
-
33144481198
-
-
RFC 4035, Mar
-
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, "Protocol Modifications for the DNS Security Extensions, " RFC 4035, Mar. 2005.
-
(2005)
Protocol Modifications for the DNS Security Extensions
-
-
Arends, R.1
Austein, R.2
Larson, M.3
Massey, D.4
Rose, S.5
-
72
-
-
1642317410
-
-
RFC 2845, May
-
P. Vixie, O. Gudmundsson, D. Eastlake, and B. Wellington, "Secret Key Transaction Authentication for DNS (TSIG), " RFC 2845, May 2000.
-
(2000)
Secret Key Transaction Authentication for DNS (TSIG)
-
-
Vixie, P.1
Gudmundsson, O.2
Eastlake, D.3
Wellington, B.4
-
73
-
-
0036539506
-
DHCP: Another untrustworthy service
-
Apr 5
-
Rik Farrow, "DHCP: Another Untrustworthy Service, " Network Magazine, Apr 5, 2002.
-
(2002)
Network Magazine
-
-
Farrow, R.1
-
76
-
-
0033154263
-
Automated configuration of TCPIP with DHCP
-
Jul.-Aug
-
Ralph Droms, "Automated configuration of TCPIP with DHCP, " IEEE Internet Computing, vol. 3, iss. 4, Jul.-Aug. 1999, pp. 45-53.
-
(1999)
IEEE Internet Computing
, vol.3
, Issue.4
, pp. 45-53
-
-
Droms, R.1
-
79
-
-
84892262854
-
Securing the domain name system
-
Jan
-
Diane Davidowicz and Paul Vixie, "Securing the Domain Name System, " Network Magazine, Jan. 2000, vol. 15, no. 1, pp. 92-97.
-
(2000)
Network Magazine
, vol.15
, Issue.1
, pp. 92-97
-
-
Davidowicz, D.1
Vixie, P.2
-
82
-
-
33144457195
-
-
RFC 4033
-
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose, "DNS Security Introduction and Requirements, " RFC 4033, 2005.
-
(2005)
DNS Security Introduction and Requirements
-
-
Arends, R.1
Austein, R.2
Larson, M.3
Massey, D.4
Rose, S.5
-
84
-
-
4544282970
-
Enabling secure on-line DNS dynamic update
-
Dec
-
Xunhua Wang, Yih Huang, Y. Desmedt, and D. Rine, "Enabling secure on-line DNS dynamic update, " Proc. 16th Annual Conference on Computer Security Applications (ACSAC '00), Dec. 2000, pp. 52-58.
-
(2000)
Proc. 16th Annual Conference on Computer Security Applications (ACSAC '00)
, pp. 52-58
-
-
Wang, X.1
Huang, Y.2
Desmedt, Y.3
Rine, D.4
-
88
-
-
78651481542
-
-
McGraw-Hill Osborne, Jan
-
Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky, and Janis N. Vizulis, "Hacking Exposed Cisco Networks: Cisco Security Secrets and Solutions, " McGraw-Hill Osborne, Jan 2006.
-
(2006)
Hacking Exposed Cisco Networks: Cisco Security Secrets and Solutions
-
-
Vladimirov, A.A.1
Gavrilenko, K.V.2
Mikhailovsky, A.A.3
Vizulis, J.N.4
-
89
-
-
0003795084
-
-
McGraw-Hill Osborne, 5 edition, 1 May
-
Stuart McClure, Joel Scambray, and George Kurtz, "Hacking Exposed: Network Security Secrets and Solutions, " McGraw-Hill Osborne, 5 edition, 1 May 2005.
-
(2005)
Hacking Exposed: Network Security Secrets and Solutions
-
-
Mcclure, S.1
Scambray, J.2
Kurtz, G.3
-
90
-
-
84892191476
-
Wireshark & ethereal network protocol analyzer toolkit
-
Sept
-
Angela Orebaugh, Gilbert Ramirez, and Jay Beale, "Wireshark & Ethereal Network Protocol Analyzer Toolkit, " Syngress, Sept. 2006.
-
(2006)
Syngress
-
-
Orebaugh, A.1
Ramirez, G.2
Beale, J.3
-
91
-
-
84892281420
-
-
The writing of this chapter is PARTly supported by Hong Kong Government General Research Fund numbered CityU-123608 and City University of Hong Kong Strategic Research Grants numbered 7001941 and 7001764
-
The writing of this chapter is PARTly supported by Hong Kong Government General Research Fund numbered CityU-123608 and City University of Hong Kong Strategic Research Grants numbered 7001941 and 7001764.
-
-
-
-
92
-
-
84867009939
-
Building secure network infrastructure for LANs
-
July
-
K. H. Yeung and T. C. Leung "Building Secure Network Infrastructure for LANs", IPSI Transactions on Advance Research, vol. 2, no. 2, July 2006, pp.32-37.
-
(2006)
IPSI Transactions on Advance Research
, vol.2
, Issue.2
, pp. 32-37
-
-
Yeung, K.H.1
Leung, T.C.2
-
93
-
-
40949131821
-
Improving network infrastructure security by PARTitioning networks running spanning tree protocol
-
France, Aug
-
K. H. Yeung, F. Yan and T. C. Leung, "Improving Network Infrastructure Security by PARTitioning Networks Running Spanning Tree Protocol", Proc. Int'l Conf. Internet Surveillance and Protection, France, Aug. 2006.
-
(2006)
Proc. Int'l Conf. Internet Surveillance and Protection
-
-
Yeung, K.H.1
Yan, F.2
Leung, T.C.3
-
94
-
-
70349147977
-
-
McGraw-Hill Osborne Media
-
Shon Harris, Allen Haper, Chris Eagle, Jonathan Ness and Michael Lester, "Gray Hat Hacking: The Ethical Hacker's Hanbook, " McGraw-Hill Osborne Media, 2004.
-
(2004)
Gray Hat Hacking: The Ethical Hacker's Hanbook
-
-
Harris, S.1
Haper, A.2
Eagle, C.3
Ness, J.4
Lester, M.5
-
97
-
-
51049119235
-
The development of novel switching devices by using embedded microprocessing system running linux
-
Miami, Florida, April
-
F. Yan and K. H. Yeung, "The Development of Novel Switching Devices by Using Embedded Microprocessing System Running Linux, " Proc. International Parallel and Distributed Processing Symposium 2008, Workshop on Security in Systems and Networks, Miami, Florida, April 2008.
-
(2008)
Proc. International Parallel and Distributed Processing Symposium 2008, Workshop on Security in Systems and Networks
-
-
Yan, F.1
Yeung, K.H.2
-
98
-
-
10444287684
-
-
Prentice Hall
-
Klaus Whrle, Frank Pahlke Hartmut Ritter, Daniel Muller, and Marc Bechler, "The linux networking architecture, " Prentice Hall, 2005.
-
(2005)
The Linux Networking Architecture
-
-
Whrle, K.1
Ritter, F.P.H.2
Muller, D.3
Bechler, M.4
|