1st Edition
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms.
Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.
Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.
NETWORK SECURITY PROBLEMS
Vulnerabilities
Attacks
Threat Modeling
Physical Security
Social Engineering
Privacy
Fraud
Scavenging
Trojan Horses
Trapdoors
Viruses
Worms
Reverse Engineering
Covert Communications Channels and Inferencing
Buffer Overflow and Stack Smashing
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Man in the Middle Attacks
Replay Attacks
Cryptanalysis
DNS and BGP Vulnerabilities
Exercises
CURRENT SECURITY SOLUTIONS
Audits
Encryption
Steganography
Obfuscation
Public Key Infrastructure (PKI)
Code Signing
SSH, SSL, and TLS
Formal Methods
Virus Scanners
Attack Graphs
Security Automata
Sandboxing
Firewalls
Red-Black Separation
Proof Carrying Code
Secure Hardware
Dependability, Safety, Liveness
Quality of Service
Artificial Immune Systems
Exercises
DISRUPTIVE TECHNOLOGIES
Mobile Code
Peer-To-Peer Networks
Field Programmable Gate Arrays (FPGA's)
Adaptation
Conclusion
Exercises
UNDERSTANDING NETWORKS
Internet Protocol Background
Networks of Embedded Control Systems
Network Topology
Scale-Free Graphs
Traffic Flows
Conclusion
Exercises
UNDERSTANDING MOBILE CODE
Existing Paradigms
Existing Implementations
Theoretical Model
Simulator for Model
Models of Paradigms
Simulation Studies of Models
Models of Networking Pathologies
Simulation Studies of Pathologies
Comparison of Cantor with Other Network Simulations
Taxonomies of Mobile Code and Security
Mobile Code Daemon Implementation
Conclusion
Exercises
PROTECTING MOBILE CODE
Control Flow Modification
Bytecode Modification
Protocol for Exchanging Bytecode Tables
Entropy Maximization of Bytecode Mappings
Bytecode Steganography
Use of Secure Co-Processors
Conclusion
Exercises
PROTECTING MOBILE CODE PLATFORMS
Smart Card Applications
Building Control Systems
FPGA Cryptography Engine
Differential Power Analysis
Conclusion
Exercises
MAINTAINING TRUST ON THE NETWORK
Assumptions and Primitives
Mobile Code Verification
Host Verification
Multi-Level Security
Conclusion
Exercises
DESIGNING PEER-TO-PEER SYSTEMS
Graph Theory Background
Random Graph Background
Number of Hops Between Nodes
Dependability of Peer-To-Peer Systems
Vulnerability to Attack
Quality of Service of Peer-To-Peer Systems
Correct Number of Indexes
Key Management
Conclusion
Exercises
EMERGENT ROUTING AND RESOURCE DISCOVERY
Ad Hoc Data Routing Background
Spin-Glass Routing
Multi-Fractal Routing
Pheromone Routing
Comparison of Routing Algorithms
Epidemic Resource Discovery
Conclusion
Exercises
DENIAL OF SERVICE COUNTERMEASURES
Denial of Service (DoS) Background
Traffic Flow Measures
Attack Detection
Verification of Detector
Game Theory Analysis
Network Structure Vulnerabilities
Conclusion
Exercises
CONCLUSIONS
INDEX
Biography
R.R. Brooks