安全なネットワークシステムの設計<br>Principles of Secure Network System Design (2002. XXVI, 209 p. w. 91 figs. 24 cm)

個数:

安全なネットワークシステムの設計
Principles of Secure Network System Design (2002. XXVI, 209 p. w. 91 figs. 24 cm)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

  • 提携先の海外書籍取次会社に在庫がございます。通常2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。
  • 製本 Hardcover:ハードカバー版/ページ数 250 p.
  • 商品コード 9780387952130

基本説明

Contents: History of network security and growing interest.- User-level security on demand in ATM networks: a new paradigm, and more.

Table of Contents

Foreword                                           vii
Preface ix
Acknowledgments xiii
List of Tables xxi
List of Figures xiii
Evolution of Network Security and Lessons 1 (18)
Learned from History
Introduction 1 (1)
History of Security and Its Influence on 2 (3)
Information Networks
Lessons Learned from History 5 (2)
Growing Interest in Network Security 7 (3)
Origin and Nature of Security in Networks 10 (1)
Principal Characteristics of Network 11 (6)
Security
Secure Network Designs Through Modeling and 17 (1)
Simulation
Problems and Exercises 18 (1)
A Fundamental Framework for Network Security 19 (18)
Introduction 19 (1)
The Changing Paradigm of Network Security 20 (1)
Review of the Literature on Network Security 21 (5)
The National Security Agency's Network 26 (1)
Rating Model (NRM)
A Fundamental Framework for Network Security 27 (4)
Pillars of Network Security 29 (1)
Attributes of Network Security 30 (1)
Uses of the Fundamental Framework for 31 (4)
Network Security
Problems and Exercises 35 (2)
User-Level Security on Demand in ATM 37 (10)
Networks: A New Paradigm
Review of the Literature on Security in ATM 37 (2)
Networks
The Need for User-Level Security on Demand 39 (1)
Security on Demand in ATM Networks 40 (5)
Unique Characteristics of ATM Networks 40 (1)
Integrating the Unique Characteristics of 41 (4)
ATM Networks with User-Level Security on
Demand
Problems and Exercises 45 (2)
The Concept of Node Status Indicator (NSI) 47 (26)
and Performance Analysis
Introduction 47 (1)
The Concept of Node Status Indicator (NSI): 48 (2)
Refinind Distributed Resource Allocation
Modeling Security on Demand for a 50 (3)
Representative ATM Network and
Implementation Issues
Synthesis of the Input Traffic for Network 53 (6)
Performance Analysis Under Security on
Demand
Call Arrival Distribution and Network 53 (4)
Stability Criterion
Call Bandwidth and Call Duration 57 (1)
Distributions
Call Security Distributions 58 (1)
Traffic Mix: Inter- and Intra-Group Call 59 (1)
Request Distributions
The Design of Experiments, Simulation 59 (12)
Results, and Performance Analysis
Successful Integration of User-Level 60 (1)
Security on Demand in ATM Networks
Metric I: Call Success Rate 60 (1)
Metric II: Call Setup Time 61 (1)
Comparative Analysis of the ``Baseline'' 62 (4)
and ``Security on Demand'' Versions
Analysis of NSI's Influence on Network 66 (5)
Performance
Problems and Exercises 71 (2)
``Mixed-Use'' Network 73 (18)
Introduction 73 (1)
Mixed-use Networks: Integrating the 74 (4)
Military's Secure ATM Networks with the
Public ATM Infrastructure
Modeling and Distributed Simulation of the 78 (1)
Representative ATM Networks
Call Setup in a Mixed-Use ATM Network 78 (4)
Modeling the Representative ATM Networks 82 (1)
Simulation Experiments and performance 82 (8)
Analysis
Metric I: Call Success Rate 84 (2)
Metric II: Call Setup Time 86 (4)
Problems and Exercises 90 (1)
Synthesis of Security Attack Models for ATM 91 (64)
Networks
Brief Review of the Current Literature on 92 (4)
Attack Models
Denial of Service Attack via PING 92 (1)
Password Breaking 93 (1)
TCP Wrapper 93 (1)
Data Encryption 93 (1)
Firewalls 94 (1)
Advantages 94 (1)
Limitations 94 (1)
Trojan Horse 94 (1)
Classification of Attacks on Networks in 95 (1)
the Literature
Recommendations on Mechanisms to Provide 95 (1)
Communications Security
Proposed Approaches to Communications 96 (1)
Security
Fundamental Characteristics of ATM Networks 96 (8)
Key Characteristics 96 (1)
ATM Layers 97 (1)
ATM Network Interfaces 98 (1)
ATM Cell 98 (1)
Cell Header Format 99 (1)
Virtual Paths and Virtual Channels 100 (1)
ATM Switch 100 (1)
Call Establishment and Call Clearing 101 (2)
Mirror-Image Network 103 (1)
Call Processor and Switch Fabric 103 (1)
Operations
Summary 104 (1)
Synthesis of Security Attack Models for ATM 104 (19)
Networks
Vulnerabilities 105 (1)
Unrestricted User Interactions with UNI 105 (1)
In-band Signaling and Nonseparation of 105 (1)
Resources for Traffic and Signaling Cells
Unrestricted Access to Cell Headers 106 (1)
Vulnerability of VPI/VCI-Based Switching 106 (1)
Vulnerability of the Call Processor 106 (1)
Trusting Traffic Controls at the UNI 106 (1)
Access to Knowledge of the State of the 106 (1)
Network
A Methodology for Attack Modeling 107 (1)
Synthesizing Attacks 108 (1)
Attack 1 108 (1)
The Intent 108 (1)
Analysis of Attack Behavior and Design of 109 (1)
Output Metrics:
Attack 2 110 (1)
The Intent 110 (1)
Analysis of Attack Behavior and Design of 110 (1)
Output Metrics
Attack 3 111 (1)
Intent 111 (1)
Analysis of Attack Behavior and Design of 112 (1)
Output Metrics
Attack 4 112 (1)
Intent 112 (1)
Analysis of Attack Behavior and Design of 113 (1)
Output Metrics
Attack 5 113 (1)
The Intent 113 (1)
Analysis of Attack Behavior and Design of 114 (1)
Output Metrics
Attack 6 115 (1)
The Intent 115 (1)
Analysis of Attack Behavior and Design of 116 (1)
Output Metrics
Attack 7 116 (1)
The Intent 116 (1)
Analysis of Attack Behavior and Design of 117 (1)
Output Metrics
Attack 8: Complex Attack 117 (1)
The Intent 118 (3)
Analysis of Attack Behavior and Design of 121 (1)
Output Metrics
Attack 9: Complex Attack 122 (1)
The Intent 122 (1)
Analysis of Attack Behavior and Design of 123 (1)
Output Metrics
Modeling, Simulation, and Behavior Analysis 123 (31)
of Security Attack Models
Choice and Justification of the Network 124 (1)
Topology
Utilizing an Accurate ATM Simulator: 125 (1)
ATMSIM 1.0
Input Files 126 (1)
Output Files 127 (1)
Attack 1 128 (1)
Experiments 128 (1)
Analysis of the Simulation Results 128 (5)
Attack 2 133 (1)
Experiments 133 (1)
Analysis of the Simulation Results 133 (6)
Attack 3 139 (1)
Experiments 139 (1)
Analysis of the Simulation Results 139 (4)
Attack 4 143 (1)
Experiments 143 (1)
Analysis of the Simulation Results 144 (5)
Attack 5 149 (1)
Experiments 149 (1)
Analysis of the Simulation Results 149 (5)
Problems and Exercises 154 (1)
Complex Vulnerabilities and Highly 155 (32)
Sophisticated Attacks
Influence of Source Traffic Distribution on 155 (20)
Quality of Service
Introduction 156 (1)
QoS Guarantee in ATM Networks: Underlying 157 (2)
Assumptions
Review of the Literature on QoS 159 (1)
Guarantees and Traffic Characterization
QoS Gurantees Through Traffic Controls on 159 (3)
a per-Call Basis
Traffic Characterization 162 (1)
The Influence of Number and Nature of 163 (1)
Sources and the Source Traffic Bandwidth
Distribution on QoS for a Uniform Link
Utilization
The Underlying Thinking and Rationale 163 (1)
Experimentation 164 (4)
Modeling the ATM Network, Simulator, and 168 (1)
the Simulation Testbed (ATMSIM)
Simulation Results and Analysis 168 (1)
Impact of Source Bandwidth Distribution 169 (4)
on Cell Delay
Consistency of Cell Delay Behavior Across 173 (1)
Different Switches in the Network
Impact of Source Bandwidth Distribution 173 (1)
on the Delay of Cells Carrying Video
Traffic, Under Different Link Utilization
Choices
Impact of Source Bandwidth Distribution 174 (1)
on the Delay of Cells Carrying Video
Traffic, Under Different Active Interval
Distributions
Impact of Source Bandwidth Distribution 174 (1)
on Network QoS for a Second
Representative Network
Susceptability of the Traditional ATM 175 (10)
Output Buffer Architecture to UNI-Compliant
Traffic
Introduction 176 (1)
Modeling the Traditional Output Buffer 177 (3)
Architecture
Implementing the Traditional Output 180 (1)
Buffer Architecture for a Representative
ATM Network
Input Traffic Modeling and Synthesis of 180 (1)
Input Traffic Distributions
Call Cluster Arrival Distribution and 181 (1)
Network Stability Criterion
Cell Level Traffic Parameters 182 (1)
Simulation Experiments, Results, and 182 (3)
Performance Analysis
Problems and Exercises 185 (2)
Future Issues in Information Systems Security 187 (6)
References 193 (14)
Index 207