Home Page Icon
Home Page
Table of Contents for
References
Close
References
by James Joshi, Prashant Krishnamurthy, David Tipper, Yi Qian
Information Assurance
Copyright
Dedication
The Morgan Kaufmann Series in Networking, Series Editor, David Clark, M.I.T.
The Morgan Kaufmann Series in Computer Security
Preface
Why This Book Is Needed
Approach
Acknowledgments
Contributors
Information Assurance
Introduction
Information Assurance: Dependability and Security of Networked Information Systems
Book Organization
Conclusion
References
Foundational Background on Security and Dependability Techniques
Network Security
Introduction
Network Attacks and Security Issues
Protection and Prevention
Detection
Assessment and Response
Conclusion
References
Security for Distributed Systems: Foundations of Access Control
Introduction
Identification and Authentication
Access Control
Access Control in Distributed Systems
Digital Identity Management
Conclusion
References
Network Survivability
Introduction
Prevention Techniques
Survivable Network Design and Traffic Restoration Concepts
Transport Network Recovery Techniques
Survivable Network Design Techniques
Multilayer Issues
Conclusion and Future Research Areas
References
System Survivability
Introduction and Background
Survivability and the Impact of Fault Models
Design for Survivability
Decentralized Storage
Survivability of Large Distributed Systems
Borrowing from Well-Established Fields
Conlusion
References
Modeling the Interaction between Dependability and Security
Taxonomy and Framework for Integrating Dependability and Security
Introduction
Basic Concepts and Related Work
Proposed Taxonomy and Framework
Dependability, Security, and Their Attributes
The Means to Attain Dependability and Security
Conclusion
References
Stochastic Modeling Techniques for Secure and Survivable Systems
Introduction
Analytical Modeling Techniques
Security Modeling
Survivability Modeling
Conclusion
Acknowledgment
References
Integrated Dependability and Security Evaluation Using Game Theory and Markov Models
Stochastic Modeling
Defining and Solving the Game
Tuning the Game Parameters
Case Study: DNS Service
Conclusion
References
Introduction
Algorithms for Generating Scenario Graphs
Attack Graphs are Scenario Graphs
Network Attack Graphs
Example Network
Attack Graph Analysis
Practical Experience
Related Work
Future Work and Conclusion
Acknowledgments
References
Vulnerability-Centric Alert Correlation
Introduction
Review of Alert Correlation and Related Techniques
Attack Graph
Alert Correlation, Hypothesis, Prediction, and Aggregation
Conclusion
Acknowledgments
References
Design and Architectural Issues for Secure and Dependable Systems
Monitoring and Detecting Attacks in All-Optical Networks
Introduction
Crosstalk Attack Features and Monitoring Techniques
Node, Attack, and Monitor Models
Necessary and Sufficient Conditions for Crosstalk Attack Detection
One-Crosstalk Attack Diagnosable Conditions
k-Crosstalk Attacks in the Network
Sparse Monitoring and Routing Algorithms
Sparse Monitoring, Test Connection, and Routing for More than One Original Attack Flow
Conclusion
References
Robustness Evaluation of Operating Systems
Introduction
Evaluation Goals
Target System
Error Model and Workload Selection
Robustness Metrics
Presentation and Interpretation of Results
Conclusion
References
Further Reading
Intrusion Response Systems: A Survey
Introduction
Static Decision-Making Systems
Dynamic Decision-Making Systems
Intrusion Tolerance Through Diverse Replicas
Responses to Specific Kinds of Attacks
Benchmarking Intrusion Response Systems
Thoughts on Evolution of IRS Technology
Conclusion
References
Secure and Resilient Routing: Building Blocks for Resilient Network Architectures
Introduction
Traffic Engineering Perspective and its Relation to Network Robustness
Components of a Resilient Network Architecture
Threats and Countermeasures in Link-State Routing
Resilient Architecture: Virtualization and Routing
Conclusion
Acknowledgments
References
Secure Group Communication
Security and Survivability of Wireless Systems
Introduction
Background
Current Security Approaches in Wireless Networks
Current Survivability Approaches in Wireless Networks
Framework for Wireless Network Survivability and Security
Interaction Between Survivability and Security in Wireless Networks
Conclusion
References
Integrated Fault and Security Management
Introduction
Active Integrated Fault Identification Framework
Fault and Security Management on High-Speed Networks
Conclusion
References
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Acknowledgment
Next
Next Chapter
References
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset