E-Book, Englisch, 266 Seiten
Wong / Yeung Network Infrastructure Security
1. Auflage 2009
ISBN: 978-1-4419-0166-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 266 Seiten
ISBN: 978-1-4419-0166-8
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised. Network Infrastructure Security bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions.
Autoren/Hrsg.
Weitere Infos & Material
1;About the authors;5
2;Preface;7
3;Goal of writing;8
4;Not goal of writing;9
5;Audience;10
6;Chapter design;11
7;Table of Content;12
8;1. Introduction to Network Infrastructure Security;13
8.1;1.1 Internet infrastructure;13
8.2;1.2 Key components in the Internet infrastructure;16
8.3;1.3 Internet infrastructure security;21
9;2. Network Infrastructure Security -- Switching;31
9.1;2.1 Introduction;31
9.2;2.2 How Switches can be Attacked;34
10;3. Network Infrastructure Security – Routing;71
10.1;3.1 Introduction;71
10.2;3.1.2 Routing protocol vulnerability;73
10.3;3.2 Overview of Internet Routing;75
10.4;3.3 External and internal attacks;84
10.5;3.4 RIP Attacks and Countermeasures;96
10.6;3.5 OSPF Attacks and Countermeasures;106
10.7;3.6 BGP Attacks and Countermeasures;122
11;4. Network Infrastructure Security -- Address Configuration and Naming;148
11.1;4.1 Introduction;148
11.2;4.2 DHCP Attack;149
11.3;4.3 DNS Attack;157
12;5. Experiments for Illustrating Network Infrastructure Attacks;191
12.1;5.1 Purpose of the Chapter;191
12.2;5.2 Attack Experiments;197
13;6. Protecting Network Infrastructure – A New Approach;229
13.1;6.1 Purpose of the Chapter;229
13.2;6.2 Analysis on Security Problems of Network Infrastructure;230
13.3;6.3 Steps in Hacking Network Infrastructure;238
13.4;6.4 Flat Network Design Model and Masquerading;246
13.5;6.5 A New Model to Protect Network Infrastructure;248




