Inter Domain Routing Security

個数:

Inter Domain Routing Security

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 320 p.
  • 言語 ENG
  • 商品コード 9781848215399
  • DDC分類 004.62

Full Description

Inter-domain routing security is a big actor in end-to-end network connectivity. The protocol currently implemented was not designed to cover such a critical aspect, and so many vulnerabilities crop up, having a strong impact on the whole system. Despite much effort in the past focusing in addressing security issues, no solutions have become a reality, hence novel solutions must be sought to reduce the vulnerabilities space. The Border Gateway Protocol (BGP) is a critical component of the Internet's infrastructure used as the de facto inter-domain routing protocol among autonomous systems. It was conceived without an internal security mechanism and hence is prone to a number of vulnerabilities and attacks, which have resulted in partial paralysis of the Internet. Thus, securing BGP has been an active research area for almost a decade now. Several strategies, ranging from complete replacement of BGP to addition of new features in it, were proposed for the purpose of security but none of them were pragmatic enough to be adopted. Recently, the Secure Inter-Domain Routing (SIDR) working group of the IETF has put forward a set of recommendations which seem promising to some extent. This book introduces the reader to the main concepts in inter-domain security, reviewing the most significant contributions and also introducing the current efforts being developed by the scientific community to deal with the overall weaknesses and limitations that still exist.

Contents

Section I: The Big Picture

• Chapter 1: Introduction

• Chapter 2: Pre-Requisites

• Chapter 3: BGP-4 Protocol

• Chapter 4: BGP Threat Model

• Chapter 5: Attacks on BGP

Section II: Securing BGP

• Chapter 6: Secure BGP (S-BGP), Secure Origin BGP (SO-BGP) and Pretty Secure BGP (PS-BGP)

• Chapter 7: Inter-domain Route Validation (IRV)

• Chapter 8: Secure Path Vector (SPV)

• Chapter 9: Listen and Whisper

Subsection II B: Ongoing Efforts

• Chapter 10: Resource Public Key Infrastructure (RPKI)

• Chapter 11: Route Origination Authorization (ROA)

• Chapter 12: BGPSEC Protocol

• Chapter 13: Analysis of SIDR WG Proposals

Section III: Future Way Forward

• Chapter 14: BGP Security Management using Overlay Networks

最近チェックした商品