You are previewing Network Security Attacks and Countermeasures.
O'Reilly logo
Network Security Attacks and Countermeasures

Book Description

Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board
  6. Preface
    1. FEATURES
    2. ORGANIZATION
  7. Chapter 1: Introduction to Network Security
    1. ABSTRACT
    2. INTRODUCTION
    3. NETWORK SECURITY POLICY
    4. HISTORY OF NETWORK SECURITY
    5. CASE STUDY: MOBILE DEVICE SECURITY – UNDERSTANDING VULNERABILITIES AND MANAGING RISKS
    6. SUMMARY
    7. REFERENCES
  8. Chapter 2: Security Issues in Mobile Wireless Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. FUTURE RECOMMENDATION
    4. CONCLUSION
    5. REFERENCES
  9. Chapter 3: Virtual Private Networks
    1. ABSTRACT
    2. INTRODUCTION
    3. MAIN FOCUS OF THE CHAPTER
    4. 1. THE LAYER TWO FORWARDING (L2F) PROTOCOL—L2F
    5. 2. THE POINT-TO-POINT TUNNELING PROTOCOL (PPTP)
    6. 3. IP SECURITY (IPsec)
    7. RECOMMENDED SCENARIOS FOR IPSec
    8. 4. SECURE SOCKETS LAYER (SSL) AND TRANSPORT LAYER SECURITY (TLS)
    9. 5. SECURE SHELL (SSH)
    10. SOLUTIONS AND RECOMMENDATIONS
    11. FUTURE RESEARCH DIRECTIONS
    12. REFERENCES
  10. Chapter 4: Classification of Network Attacks and Countermeasures of Different Attacks
    1. ABSTRACT
    2. INTRODUCTION
    3. BASIC SECURITY CONCEPTS
    4. HISTORY OF NETWORK SECURITY
    5. DATA SECURITY VS. NETWORK SECURITY
    6. COMPUTER AND NETWORK ATTACKS
    7. INTRODUCTION TO VULNERABILITIES, THREATS AND ATTACKS
    8. LAYERS OF ATTACKS
    9. COUNTER MEASURE OF DIFFERENT ATTACKS
    10. COUNTER MEASURES FOR VARIOUS ATTACKS
    11. CASE STUDY: HOW TO DETECT AND PREVENT BLACK HOLE ATTACK IN MOBILE AD HOC NETWORK
    12. CONCLUSION
    13. SUMMARY
    14. REFERENCES
  11. Chapter 5: Attacks in Wireless Sensor Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. REVIEW OF WSN ATTACKS
    4. 3. CHALLENGES ON DETECTION OF WSN ATTACKS
    5. 4. APPROACHES FOR SECURING WSN
    6. 5. DISCUSSIONS
    7. 6. CONCLUSION AND FUTURE WORK
    8. REFERENCES
    9. ADDITIONAL READING
    10. KEY TERMS AND DEFINITIONS
  12. Chapter 6: Sensors Network
    1. ABSTRACT
    2. INTRODUCTION
    3. SENSORS
    4. WIRELESS SENSOR NETWORKS
    5. FUTURE RESEARCH DIRECTION
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  13. Chapter 7: DDoS Attacks and Their Types
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. DDOS ATTACK TYPES
    5. FUTURE RESEARCH DIRECTIONS
    6. REFERENCES
    7. KEY TERMS AND DEFINITIONS
  14. Chapter 8: Cluster-Based Countermeasures for DDoS Attacks
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND INFORMATION
    4. TAXONOMY OF COURTER MEASURES
    5. LITERATURE REVIEW
    6. THEORETICAL MODEL
    7. RESEARCH METHODOLOGY
    8. RESULTS AND DISCUSSION
    9. CONCLUSION
    10. REFERENCES
    11. ENDNOTE
  15. Chapter 9: Intrusion Detection System (IDS) and Their Types
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. OVERVIEW OF INTRUSION DETECTION SYSTEM
    5. CURRENT INTRUSION DETECTION PRODUCTS
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  16. Chapter 10: Intrusion Prevention System
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. NETWORK IPS AND HOST IPS
    5. DIFFERENT TYPES OF ATTACKS
    6. COMMON COMPONENTS OF IPS
    7. COMMON DETECTION METHODOLOGIES
    8. RELATED WORK
    9. STEPS IN SELECTING AN IPS
    10. CONCLUSION AND FUTURE WORK
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  17. Chapter 11: AdaBoost Algorithm with Single Weak Classifier in Network Intrusion Detection
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. OVERVIEW OF ALGORITHMS
    4. 3. PROPOSED WORK
    5. 4. EXPERIMENTAL ANALYSIS
    6. 5. CONCLUSION
    7. 6. FUTURE RESEARCH DIRECTIONS
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  18. Chapter 12: Countering RSA Vulnerabilities and Its Replacement by ECC
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. PROPOSED ALGORITHM
    5. COMPARISON AND EXPERIMENTAL RESULTS
    6. SUMMARY
    7. REFERENCES
    8. APPENDIX A
    9. APPENDIX B
  19. Chapter 13: Changing Dynamics of Network Security involving Hacking/Cracking with Next Generation Firewalls (NGFW)
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. MAIN FOCUS OF THE CHAPTER
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  20. Compilation of References
  21. About the Contributors