Unifying the conceptual levels of network security through the use of patterns.
详细信息   
  • 作者:Kumar ; Ajoy.
  • 学历:Ph.D.
  • 年:2014
  • 毕业院校:Florida Atlantic University
  • ISBN:9781303979002
  • CBH:3584924
  • Country:USA
  • 语种:English
  • FileSize:5123202
  • Pages:152
文摘
Network architectures are described by the International Standard for Organization ISO),which contains seven layers. The internet uses four of these layers,of which three are of interest to us. These layers are Internet Protocol IP) or Network Layer,Transport Layer and Application Layer. We need to protect against attacks that may come through any of these layers. In the world of network security,systems are plagued by various attacks,internal and external,and could result in Denial of Service DoS) and/or other damaging effects. Such attacks and loss of service can be devastating for the users of the system. The implementation of security devices such as Firewalls and Intrusion Detection Systems IDS),the protection of network traffic with Virtual Private Networks VPNs),and the use of secure protocols for the layers are important to enhance the security at each of these layers. We have done a survey of the existing network security patterns and we have written the missing patterns. We have developed security patterns for abstract IDS,Behavior--based IDS and Rule-based IDS and as well as for Internet Protocol Security IPSec) and Transport Layer Security TLS) protocols. We have also identified the need for a VPN pattern and have developed security patterns for abstract VPN,an IPSec VPN and a TLS VPN. We also evaluated these patterns with respect to some aspects to simplify their application by system designers. We have tried to unify the security of the network layers using security patterns by tying in security patterns for network transmission,network protocols and network boundary devices.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700