Muutke küpsiste eelistusi

Information Assurance: Dependability and Security in Networked Systems [Kõva köide]

(Associate Professor, University of Pittsburgh, PA, U.S.A.), (Associate Professor, University of Pittsburgh, PA, U.S.A.), (Assistant Professor, University of Pittsburgh, PA, US), (Assistant Professor, University of Puerto Rico, Mayaguez)
  • Formaat: Hardback, 576 pages, kõrgus x laius: 235x191 mm, kaal: 1120 g, Approx. 130 illustrations; Illustrations, unspecified
  • Sari: The Morgan Kaufmann Series in Networking
  • Ilmumisaeg: 11-Dec-2007
  • Kirjastus: Morgan Kaufmann Publishers In
  • ISBN-10: 0123735661
  • ISBN-13: 9780123735669
Teised raamatud teemal:
  • Formaat: Hardback, 576 pages, kõrgus x laius: 235x191 mm, kaal: 1120 g, Approx. 130 illustrations; Illustrations, unspecified
  • Sari: The Morgan Kaufmann Series in Networking
  • Ilmumisaeg: 11-Dec-2007
  • Kirjastus: Morgan Kaufmann Publishers In
  • ISBN-10: 0123735661
  • ISBN-13: 9780123735669
Teised raamatud teemal:
In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).

KEY FEATURES
* The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting
* Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance
* Additional focus on security and survivability issues in wireless networks

Muu info

A "must have" book for working professionals and researchers interested in information assurance via network survivability and security
Preface xxiii
Contributors xxvii
Information Assurance
1(16)
Yi Qian
Puerto Rico
James Joshi
David Tipper
Prashant Krishnamurthy
Introduction
1(2)
Information Assurance: Dependability and Security of Networked Information Systems
3(4)
Book Organization
7(7)
The Three Parts of the Book
7(1)
Network Security
8(1)
Security for Distributed Systems: Foundations of Access Control
8(1)
Network Survivability
9(1)
System Survivability
9(1)
Taxonomy and Framework for Integrating Dependability and Security
9(1)
Stochastic Models/Techniques for Secure and Survivable Systems
10(1)
Integrated Dependability and Security Evaluation Using Game Theory and Markov Models
10(1)
Scenario Graphs Applied to Network Security
11(1)
Vulnerability-Centric Alert Correlation
11(1)
Monitoring and Detecting Attacks in All-Optical Networks
11(1)
Robustness Evaluation of Operating Systems
12(1)
Intrusion Response Systems: A Survey
12(1)
Secure and Resilient Routing: A Framework for Resilient Network Architectures
13(1)
Wireless Systems Security and Survivability
13(1)
Integrated Fault and Security Management
14(1)
Conclusion
14(3)
References
14(3)
Part I: Foundational Background on Security and Dependability Techniques
17(130)
Network Security
19(20)
James Joshi
Prashant Krishnamurthy
Introduction
19(1)
Network Attacks and Security Issues
19(8)
Network Communications
20(3)
Some Example Security Attacks
23(3)
Security Attacks, Services, and Architecture
26(1)
Protection and Prevention
27(7)
Firewalls and Perimeter Security
27(3)
Cryptographic Protocols
30(4)
Detection
34(2)
Assessment and Response
36(1)
Conclusion
37(2)
References
37(2)
Security for Distributed Systems: Foundations of Access Control
39(42)
Elisa Bertino
Jason Crampton
Introduction
39(1)
Identification and Authentication
40(6)
Password-Based Authentication
41(1)
Insecure Communication Channels
42(1)
Challenge-Response Systems
42(1)
Authentication in Distributed Systems
43(3)
Access Control
46(14)
Access Control Based on Subject-Object Relationships
48(1)
Protection Matrix Model
48(5)
An Information Flow Policy for Confidentiality
53(2)
Bell-LaPadula Model
55(1)
Clark-Wilson Model
56(3)
Role-Based Access Control
59(1)
Access Control in Distributed Systems
60(12)
Overview of Relevant Standards
61(4)
Advanced Approaches
65(7)
Digital Identity Management
72(4)
Shibboleth
73(1)
Card Space
74(1)
Higgins Trust Framework
75(1)
Research Approaches
75(1)
Conclusion
76(5)
References
77(4)
Network Survivability
81(32)
Bjorn Jager
John Doucette
David Tipper
Introduction
81(2)
Prevention Techniques
83(1)
Survivable Network Design and Traffic Restoration Concepts
84(7)
Typical Network Architecture
84(2)
Basic Survivability Concepts
86(1)
Basic Network Management Concepts
87(1)
Protection versus Restoration
88(1)
Other Issues
89(2)
Transport Network Recovery Techniques
91(10)
Automatic Protection Switching
91(2)
Ring-Based Survivability
93(2)
Span Restoration
95(1)
Shared Path Protection
96(1)
Shared Path Restoration
97(1)
p-Cycles
98(3)
Survivable Network Design Techniques
101(3)
Multilayer Issues
104(3)
Conclusion and Future Research Areas
107(6)
References
108(5)
System Survivability
113(34)
Axel Krings
Introduction and Background
113(2)
Survivability and the Impact of Fault Models
115(4)
Dependability Considerations
116(2)
Survivability Considerations
118(1)
Design for Survivability
119(7)
Identification of Essential Functionalities
121(2)
Tolerating Faults
123(1)
Dealing with Common-Mode Faults
124(1)
Applying the Notion of Optimality
125(1)
Decentralized Storage
126(2)
Survivability of Large Distributed Systems
128(5)
Borrowing from Well-established Fields
133(8)
Problem Transformation
133(3)
Scheduling Problems
136(3)
Case Study: Autonomous Mobile Agents
139(2)
Conclusion
141(6)
References
142(5)
Part II: Modeling the Interaction between Dependability and Security
147(158)
Taxonomy and Framework for Integrating Dependability and Security
149(22)
Jiankun Hu
Peter Bertok
Zahir Tari
Introduction
149(1)
Basic Concepts and Related Work
150(4)
Dependability
150(2)
Integration of Dependability and Security
152(2)
Proposed Taxonomy and Framework
154(1)
Key Notations of the Feedback Control System Model
154(1)
Definitions of Basic Concepts of Dependability and Security within the Proposed Framework
155(1)
Dependability, Security, and their Attributes
155(9)
Taxonomy of Faults
157(7)
The Means to Attain Dependability and Security
164(4)
Fault Prevention
164(2)
Fault Tolerance
166(1)
Fault Removal
166(2)
Conclusion
168(3)
References
168(3)
Stochastic Modeling Techniques for Secure and Survivable Systems
171(38)
Kishor S. Trivedi
Vaneeta Jindal
Selvamuthu Dharmaraja
Introduction
171(2)
Survivability and Security
172(1)
Analytical Modeling Techniques
173(6)
Markov Models
174(2)
Semi-Markov Process
176(1)
Higher-Level Model Formalisms
177(2)
Security Modeling
179(11)
Intrusion-Tolerant Systems [ 3]
180(8)
Security Modeling of SITAR Security System [ 4]
188(2)
Survivability Modeling
190(15)
System Description [ 31]
192(13)
Conclusion
205(4)
References
205(4)
Integrated Dependability and Security Evaluation Using Game Theory and Markov Models
209(38)
Bjarne E. Helvik
Karin Sallhammar
Svein J. Knapskog
Introduction
209(4)
Previous Work
212(1)
Outline
213(1)
Stochastic Modeling
213(8)
Failure Process
215(1)
Modeling Intrusion as Transitions
216(1)
Modeling the System
217(1)
Obtaining System Measures
218(2)
Model Parametrization
220(1)
Predicting Attacker Behavior
221(4)
Reward and Cost Concept
222(1)
Modeling Interactions as a Game
223(1)
Stochastic Game Model
224(1)
Defining and Solving the Game
225(5)
Tuning the Game Parameters
230(6)
One Possible Attack Action
231(2)
Two Possible Attack Actions
233(2)
Attacker Profiling
235(1)
Case Study: DNS Service
236(4)
Stochastic Model
237(1)
Stochastic Game
237(1)
Four Scenarios
238(1)
Comparing the Scenarios
239(1)
Conclusion
240(7)
References
243(4)
Scenario Graphs Applied to Network Security
247(32)
Jeannette M. Wing
Introduction
247(1)
Algorithms for Generating Scenario Graphs
248(3)
Symbolic Algorithm
248(2)
Explicit-State Algorithm
250(1)
Attack Graphs are Scenario Graphs
251(2)
Network Attack Graphs
253(4)
Network Attack Model
253(1)
Network Components
254(3)
Example Network
257(9)
Example Network Components
259(5)
Sample Attack Graphs
264(2)
Attack Graph Analysis
266(3)
Single Action Removal
267(1)
Critical Action Set Minimization
267(2)
Practical Experience
269(3)
Performance
269(2)
Toolkit
271(1)
Related Work
272(2)
Future Work and Conclusion
274(5)
References
276(3)
Vulnerability-Centric Alert Correlation
279(26)
Lingyu Wang
Sushil Jajodia
Introduction
279(3)
Review of Alert Correlation and Related Techniques
282(2)
Attack Graph
284(3)
Alert Correlation, Hypothesis, Prediction, and Aggregation
287(13)
Alert Correlation in Offline Applications
287(2)
Vulnerability-Centric Alert Correlation
289(3)
Alert Hypothesis and Prediction
292(4)
Alert Aggregation
296(2)
Empirical Results
298(2)
Conclusion
300(1)
Acknowledgments
300(5)
References
301(4)
Part III: Design and Architectural Issues for Secure and Dependable Systems
305(218)
Monitoring and Detecting Attacks in All-Optical Networks
307(42)
Arun K. Somani
Tao Wu
Introduction
307(4)
Security Problems in All-Optical Networks
308(1)
Possible Attacks
308(1)
All-Optical Network Attack Types
309(1)
Issues in Crosstalk Attack Diagnostic Algorithms
310(1)
Crosstalk Attack Features and Monitoring Techniques
311(4)
Crosstalk Attack Features
311(1)
Security Consideration
312(1)
Overview of Current Monitoring Methods
313(2)
Node, Attack, and Monitor Models
315(5)
Node Model
315(1)
Crosstalk Attack Model
315(3)
Monitor Node Model
318(2)
Necessary and Sufficient Conditions for Crosstalk Attack Detection
320(5)
Single Crosstalk Attack in a Network
320(1)
Monitoring Relationship
320(5)
One-Crosstalk Attack Diagnosable Conditions
325(4)
Detecting the Status of a Connection under One-Original Attack Flow Conditions
327(2)
Computational Complexity
329(1)
k-Crosstalk Attacks in the Network
329(7)
k-Crosstalk Attack Diagnosable Condition
330(4)
Detecting Global Status of Connections
334(1)
Computational Complexity
335(1)
Sparse Monitoring and Routing Algorithms
336(6)
Sparse Monitoring, Test Connection, and Routing for a Single Original Attack Flow Policy I
336(1)
Examples
337(1)
Sparse Monitoring, Test Connection, and Routing Policy II
338(2)
Connection Routing Algorithm in One-Original Attack Flow Networks
340(1)
Example
341(1)
Sparse Monitoring, Test Connection, and Routing for More than One Original Attack Flow
342(3)
Examples
343(2)
Conclusion
345(4)
References
345(4)
Robustness Evaluation of Operating Systems
349(28)
Andreas Johansson
Neeraj Suri
Introduction
349(3)
Case Study
351(1)
Evaluation Goals
352(1)
Case Study
353(1)
Target System
353(2)
Case Study
354(1)
Error Model and Workload Selection
355(6)
Error Type
356(2)
Error Location
358(1)
Error Timing
358(1)
Workload Selection
358(1)
Case Study
359(2)
Robustness Metrics
361(4)
Case Study
362(3)
Presentation and Interpretation of Results
365(4)
Conclusion
369(8)
References
370(7)
Intrusion Response Systems: A Survey
377(40)
Bingrui Foo
Matthew W. Glause
Gaspar M. Howard
Yu-Sung Wu
Saurabh Bagchi
Eugene H. Spafford
Introduction
377(4)
Static Decision-making Systems
381(6)
Generic Authorization and Access Control---Application Programming Interface
381(3)
Snort Inline
384(1)
McAfee Internet Security Suite
385(1)
Other Systems
386(1)
Dynamic Decision-making Systems
387(10)
Broad Research Issues
387(1)
Adepts
388(2)
Alphatech Light Autonomic Defense System
390(2)
Cooperating Security Managers and Adaptive, Agent-Based Intrusion Response Systems
392(2)
Emerald
394(2)
Other Dynamic Intrusion Response Systems
396(1)
Intrusion Tolerance through Diverse Replicas
397(6)
Broad Research Issues
398(1)
Building Survivable Services Using Redundancy and Adaptation
398(1)
Scalable Intrusion-Tolerant Architecture
399(1)
Survival by Defense Enabling
400(1)
Implementing Trustworthy Services Using Replicated State Machines
401(1)
Distributing Trust on the Internet
402(1)
Responses to Specific Kinds of Attacks
403(4)
Primitives for Responding to DDoS
404(1)
CITRA
404(2)
Cooperative Counter-DDoS Entity
406(1)
Benchmarking Intrusion Response Systems
407(3)
Thoughts on Evolution of IRS Technology
410(2)
Conclusion
412(5)
References
412(5)
Secure and Resilient Routing: Building Blocks for Resilient Network Architectures
417(42)
Deep Medhi
Dijiang Huang
Introduction
417(2)
Traffic Engineering Perspective and its Relation to Network Robustness
419(4)
An Illustrative Example
421(2)
Components of a Resilient Network Architecture
423(1)
Threats and Countermeasures in Link-State Routing
424(11)
Link-State Routing Model and Threat Model
424(4)
Preventive Cryptographic Countermeasures against Attacks
428(7)
Resilient Architecture: Virtualization and Routing
435(11)
An Enabling Framework for Adaptive and Secure Virtualized Networking
435(5)
Routing Protocol Extension: OSPF-E
440(4)
Network Analysis: Preliminary Results
444(2)
Conclusion
446(3)
References
446(3)
Secure Group Communication
449(10)
Using One-Way Function Chain to Build Key Chain
449(2)
Key Distribution
451(3)
Key Agreement Protocol
454(2)
Assessment
456(3)
Security and Survivability of Wireless Systems
459(30)
Yi Qian
Puerto Rico
Prashant Krishnamurthy
David Tipper
Introduction
459(1)
Background
460(3)
Current Security Approaches in Wireless Networks
463(2)
Current Survivability Approaches in Wireless Networks
465(2)
Framework for Wireless Network Survivability and Security
467(3)
Interaction between Survivability and Security in Wireless Networks
470(14)
Extending the Framework to Include Interactions between Security and Survivability
472(3)
Case Study I: Idle Handoffs
475(1)
Case Study II: Key Management in Heterogeneous Sensor Networks
476(8)
Conclusion
484(5)
References
485(4)
Integrated Fault and Security Management
489(34)
Ehab Al-Shaer
Yan Chen
Introduction
489(1)
Active Integrated Fault Identification Framework
490(16)
Background
490(1)
Related Work
491(1)
Challenges and Problem Formalization
492(3)
Integrated Fault Intrusion Reasoning
495(7)
Simulation Study
502(4)
Fault and Security Management on High-speed Networks
506(14)
Background
506(2)
Related Work
508(3)
Architecture of the HiFIND System
511(4)
Evaluation
515(5)
Conclusion
520(3)
References
520(3)
Index 523