Information assurance : dependability and security in networked systems /
In an age of electronic espionage and Homeland Security threats, protect your data and delivery system from prying eyes and irreversible collapse.
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington, Mass. :
Elsevier/Morgan Kaufmann,
©2008.
|
Colección: | Morgan Kaufmann series in computer security.
Morgan Kaufmann series in networking. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- 1. Information Assurance / Yi Qian, James Joshi, David Tipper and Prashant Krishnamurthy
- Information Assurance: Dependability and Security of Networked Information Systems
- Book Organization
- pt. I. Foundational Background on Security and Dependability Techniques
- 2. Network Security / James Joshi and Prashant Krishnamurthy
- Network Attacks and Security Issues
- Protection and Prevention
- Detection
- Assessment and Response
- 3. Security for Distributed Systems: Foundations of Access Control / Elisa Bertino and Jason Crampton
- Identification and Authentication
- Access Control
- Access Control in Distributed Systems
- Digital Identity Management
- 4. Network Survivability / Bjorn Jager, John Doucette and David Tipper
- Prevention Techniques
- Survivable Network Design and Traffic Restoration Concepts
- Transport Network Recovery Techniques
- Survivable Network Design Techniques
- Multilayer Issues
- Conclusion and Future Research Areas
- 5. System Survivability / Axel Krings
- Survivability and the Impact of Fault Models
- Design for Survivability
- Decentralized Storage
- Survivability of Large Distributed Systems
- Borrowing from Well-established Fields
- pt. II. Modeling the Interaction between Dependability and Security
- 6. Taxonomy and Framework for Integrating Dependability and Security / Jiankun Hu, Peter Bertok and Zahir Tari
- Basic Concepts and Related Work
- Proposed Taxonomy and Framework
- Dependability, Security, and their Attributes
- The Means to Attain Dependability and Security
- 7. Stochastic Modeling Techniques for Secure and Survivable Systems / Kishor S. Trivedi, Vaneeta Jindal and Selvamuthu Dharmaraja
- Analytical Modeling Techniques
- Security Modeling
- Survivability Modeling
- 8. Integrated Dependability and Security Evaluation Using Game Theory and Markov Models / Bjarne E. Helvik, Karin Sallhammar and Svein J. Knapskog
- Stochastic Modeling
- Predicting Attacker Behavior
- Defining and Solving the Game
- Tuning the Game Parameters
- Case Study: DNS Service
- 9. Scenario Graphs Applied to Network Security / Jeannette M. Wing
- Algorithms for Generating Scenario Graphs
- Attack Graphs are Scenario Graphs
- Network Attack Graphs
- Example Network
- Attack Graph Analysis
- Practical Experience
- Related Work
- Future Work and Conclusion
- 10. Vulnerability-Centric Alert Correlation / Lingyu Wang and Sushil Jajodia
- Review of Alert Correlation and Related Techniques
- Attack Graph
- Alert Correlation, Hypothesis, Prediction, and Aggregation
- pt. III. Design and Architectural Issues for Secure and Dependable Systems
- 11. Monitoring and Detecting Attacks in All-Optical Networks / Arun K. Somani and Tao Wu
- Crosstalk Attack Features and Monitoring Techniques
- Node, Attack, and Monitor Models
- Necessary and Sufficient Conditions for Crosstalk Attack Detection
- One-crosstalk Attack Diagnosable Conditions
- k-Crosstalk Attacks in the Network
- Sparse Monitoring and Routing Algorithms
- Sparse Monitoring, Test Connection, and Routing for More than One Original Attack Flow
- 12. Robustness Evaluation of Operating Systems / Andreas Johansson and Neeraj Suri
- Evaluation Goals
- Target System
- Error Model and Workload Selection
- Robustness Metrics
- Presentation and Interpretation of Results
- 13. Intrusion Response Systems: A Survey / Bingrui Foo, Matthew W. Glause, Gaspar M. Howard, Yu-Sung Wu, Saurabh Bagchi and Eugene H. Spafford
- Static Decision-making Systems
- Dynamic Decision-making Systems
- Intrusion Tolerance through Diverse Replicas
- Responses to Specific Kinds of Attacks
- Benchmarking Intrusion Response Systems
- Thoughts on Evolution of IRS Technology
- 14. Secure and Resilient Routing: Building Blocks for Resilient Network Architectures / Deep Medhi and Dijiang Huang
- Traffic Engineering Perspective and its Relation to Network Robustness
- Components of a Resilient Network Architecture
- Threats and Countermeasures in Link-State Routing
- Resilient Architecture: Virtualization and Routing
- Secure Group Communication
- 15. Security and Survivability of Wireless Systems / Yi Qian, Puerto Rico, Prashant Krishnamurthy and David Tipper
- Background
- Current Security Approaches in Wireless Networks
- Current Survivability Approaches in Wireless Networks
- Framework for Wireless Network Survivability and Security
- Interaction between Survivability and Security in Wireless Networks
- 16. Integrated Fault and Security Management / Ehab Al-Shaer and Yan Chen
- Active Integrated Fault Identification Framework
- Fault and Security Management on High-speed Networks.