Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks: 1st Edition (Hardback) book cover

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

1st Edition

By R.R. Brooks

CRC Press

400 pages | 186 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9780849322723
pub: 2004-11-29
$165.00
x
eBook (VitalSource) : 9780429075094
pub: 2004-11-29
from $28.98


FREE Standard Shipping!

Description

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms.

Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.

Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.

Table of Contents

OVERVIEW

NETWORK SECURITY PROBLEMS

Vulnerabilities

Attacks

Threat Modeling

Physical Security

Social Engineering

Privacy

Fraud

Scavenging

Trojan Horses

Trapdoors

Viruses

Worms

Reverse Engineering

Covert Communications Channels and Inferencing

Buffer Overflow and Stack Smashing

Denial of Service (DoS)

Distributed Denial of Service (DDoS)

Man in the Middle Attacks

Replay Attacks

Cryptanalysis

DNS and BGP Vulnerabilities

Exercises

CURRENT SECURITY SOLUTIONS

Audits

Encryption

Steganography

Obfuscation

Public Key Infrastructure (PKI)

Code Signing

SSH, SSL, and TLS

Formal Methods

Virus Scanners

Attack Graphs

Security Automata

Sandboxing

Firewalls

Red-Black Separation

Proof Carrying Code

Secure Hardware

Dependability, Safety, Liveness

Quality of Service

Artificial Immune Systems

Exercises

DISRUPTIVE TECHNOLOGIES

Mobile Code

Peer-To-Peer Networks

Field Programmable Gate Arrays (FPGA's)

Adaptation

Conclusion

Exercises

UNDERSTANDING NETWORKS

Internet Protocol Background

Networks of Embedded Control Systems

Network Topology

Scale-Free Graphs

Traffic Flows

Conclusion

Exercises

UNDERSTANDING MOBILE CODE

Existing Paradigms

Existing Implementations

Theoretical Model

Simulator for Model

Models of Paradigms

Simulation Studies of Models

Models of Networking Pathologies

Simulation Studies of Pathologies

Comparison of Cantor with Other Network Simulations

Taxonomies of Mobile Code and Security

Mobile Code Daemon Implementation

Conclusion

Exercises

PROTECTING MOBILE CODE

Control Flow Modification

Bytecode Modification

Protocol for Exchanging Bytecode Tables

Entropy Maximization of Bytecode Mappings

Bytecode Steganography

Use of Secure Co-Processors

Conclusion

Exercises

PROTECTING MOBILE CODE PLATFORMS

Smart Card Applications

Building Control Systems

FPGA Cryptography Engine

Differential Power Analysis

Conclusion

Exercises

MAINTAINING TRUST ON THE NETWORK

Assumptions and Primitives

Mobile Code Verification

Host Verification

Multi-Level Security

Conclusion

Exercises

DESIGNING PEER-TO-PEER SYSTEMS

Graph Theory Background

Random Graph Background

Number of Hops Between Nodes

Dependability of Peer-To-Peer Systems

Vulnerability to Attack

Quality of Service of Peer-To-Peer Systems

Correct Number of Indexes

Key Management

Conclusion

Exercises

EMERGENT ROUTING AND RESOURCE DISCOVERY

Ad Hoc Data Routing Background

Spin-Glass Routing

Multi-Fractal Routing

Pheromone Routing

Comparison of Routing Algorithms

Epidemic Resource Discovery

Conclusion

Exercises

DENIAL OF SERVICE COUNTERMEASURES

Denial of Service (DoS) Background

Traffic Flow Measures

Attack Detection

Verification of Detector

Game Theory Analysis

Network Structure Vulnerabilities

Conclusion

Exercises

CONCLUSIONS

INDEX

About the Originator

Subject Categories

BISAC Subject Codes/Headings:
COM000000
COMPUTERS / General
COM043000
COMPUTERS / Networking / General
COM053000
COMPUTERS / Security / General