Cargando…

Information assurance : dependability and security in networked systems /

In an age of electronic espionage and Homeland Security threats, protect your data and delivery system from prying eyes and irreversible collapse.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Qian, Yi, 1962-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, Mass. : Elsevier/Morgan Kaufmann, ©2008.
Colección:Morgan Kaufmann series in computer security.
Morgan Kaufmann series in networking.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • 1. Information Assurance / Yi Qian, James Joshi, David Tipper and Prashant Krishnamurthy
  • Information Assurance: Dependability and Security of Networked Information Systems
  • Book Organization
  • pt. I. Foundational Background on Security and Dependability Techniques
  • 2. Network Security / James Joshi and Prashant Krishnamurthy
  • Network Attacks and Security Issues
  • Protection and Prevention
  • Detection
  • Assessment and Response
  • 3. Security for Distributed Systems: Foundations of Access Control / Elisa Bertino and Jason Crampton
  • Identification and Authentication
  • Access Control
  • Access Control in Distributed Systems
  • Digital Identity Management
  • 4. Network Survivability / Bjorn Jager, John Doucette and David Tipper
  • Prevention Techniques
  • Survivable Network Design and Traffic Restoration Concepts
  • Transport Network Recovery Techniques
  • Survivable Network Design Techniques
  • Multilayer Issues
  • Conclusion and Future Research Areas
  • 5. System Survivability / Axel Krings
  • Survivability and the Impact of Fault Models
  • Design for Survivability
  • Decentralized Storage
  • Survivability of Large Distributed Systems
  • Borrowing from Well-established Fields
  • pt. II. Modeling the Interaction between Dependability and Security
  • 6. Taxonomy and Framework for Integrating Dependability and Security / Jiankun Hu, Peter Bertok and Zahir Tari
  • Basic Concepts and Related Work
  • Proposed Taxonomy and Framework
  • Dependability, Security, and their Attributes
  • The Means to Attain Dependability and Security
  • 7. Stochastic Modeling Techniques for Secure and Survivable Systems / Kishor S. Trivedi, Vaneeta Jindal and Selvamuthu Dharmaraja
  • Analytical Modeling Techniques
  • Security Modeling
  • Survivability Modeling
  • 8. Integrated Dependability and Security Evaluation Using Game Theory and Markov Models / Bjarne E. Helvik, Karin Sallhammar and Svein J. Knapskog
  • Stochastic Modeling
  • Predicting Attacker Behavior
  • Defining and Solving the Game
  • Tuning the Game Parameters
  • Case Study: DNS Service
  • 9. Scenario Graphs Applied to Network Security / Jeannette M. Wing
  • Algorithms for Generating Scenario Graphs
  • Attack Graphs are Scenario Graphs
  • Network Attack Graphs
  • Example Network
  • Attack Graph Analysis
  • Practical Experience
  • Related Work
  • Future Work and Conclusion
  • 10. Vulnerability-Centric Alert Correlation / Lingyu Wang and Sushil Jajodia
  • Review of Alert Correlation and Related Techniques
  • Attack Graph
  • Alert Correlation, Hypothesis, Prediction, and Aggregation
  • pt. III. Design and Architectural Issues for Secure and Dependable Systems
  • 11. Monitoring and Detecting Attacks in All-Optical Networks / Arun K. Somani and Tao Wu
  • Crosstalk Attack Features and Monitoring Techniques
  • Node, Attack, and Monitor Models
  • Necessary and Sufficient Conditions for Crosstalk Attack Detection
  • One-crosstalk Attack Diagnosable Conditions
  • k-Crosstalk Attacks in the Network
  • Sparse Monitoring and Routing Algorithms
  • Sparse Monitoring, Test Connection, and Routing for More than One Original Attack Flow
  • 12. Robustness Evaluation of Operating Systems / Andreas Johansson and Neeraj Suri
  • Evaluation Goals
  • Target System
  • Error Model and Workload Selection
  • Robustness Metrics
  • Presentation and Interpretation of Results
  • 13. Intrusion Response Systems: A Survey / Bingrui Foo, Matthew W. Glause, Gaspar M. Howard, Yu-Sung Wu, Saurabh Bagchi and Eugene H. Spafford
  • Static Decision-making Systems
  • Dynamic Decision-making Systems
  • Intrusion Tolerance through Diverse Replicas
  • Responses to Specific Kinds of Attacks
  • Benchmarking Intrusion Response Systems
  • Thoughts on Evolution of IRS Technology
  • 14. Secure and Resilient Routing: Building Blocks for Resilient Network Architectures / Deep Medhi and Dijiang Huang
  • Traffic Engineering Perspective and its Relation to Network Robustness
  • Components of a Resilient Network Architecture
  • Threats and Countermeasures in Link-State Routing
  • Resilient Architecture: Virtualization and Routing
  • Secure Group Communication
  • 15. Security and Survivability of Wireless Systems / Yi Qian, Puerto Rico, Prashant Krishnamurthy and David Tipper
  • Background
  • Current Security Approaches in Wireless Networks
  • Current Survivability Approaches in Wireless Networks
  • Framework for Wireless Network Survivability and Security
  • Interaction between Survivability and Security in Wireless Networks
  • 16. Integrated Fault and Security Management / Ehab Al-Shaer and Yan Chen
  • Active Integrated Fault Identification Framework
  • Fault and Security Management on High-speed Networks.