Network infrastructure security

Saved in:
Bibliographic Details
Main Authors: Wong Angus.
Group Author: Yeung Alan.
Published: Springer,
Publisher Address: New York London
Publication Dates: c2009.
Literature type: Book
Language: English
Subjects:
Carrier Form: 264 p.: ill. ; 24 cm.
ISBN: 9781441901651 (hbk.)
1441901655 (hbk.)
1441901663 (ebk.)
9781441901668 (ebk.)
Index Number: TP309
CLC: TP309
Call Number: TP309/W872
Contents: Includes bibliographical references and index.
1: Introduction To Network Infrastructure Security -- 1-1: Internet infrastructure -- 1-2: Key components in the Internet infrastructure -- 1-3: Internet infrastructure security -- 2: Network Infrastructure Security-Switching -- 2-1: Introduction -- 2-2: How switches can be attacked -- 3: Network Infrastructure Security-Routing -- 3-1: Introduction -- 3-2: Overview of Internet routing -- 3-3: External and internal attacks -- 3-4: RIP attacks and countermeasures -- 3-5: OSPF attacks and countermeasures -- 3-6: BGP attacks and countermeasures -- 4: Network Infrastructure Security-Address Configuration And Naming -- 4-1: Introduction -- 4-2: DHCP attack -- 4-3: DNS attack -- 5: Experiments For Illustrating Network Infrastructure Attacks -- 5-1: Purpose of the chapter -- 5-2: Attack experiments -- 6: Protecting Network Infrastructure-A New Approach -- 6-1: Purpose of the chapter -- 6-2: Analysis on security problems of network infrastructure -- 6-3: Steps in hacking network infrastructure -- 6-4: Flat network design model and masquerading -- 6-5: New model to protect network infrastructure -- Index.
"Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security by Angus Wong and Alan Yeung addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised. Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. Daily operations around the world highly depend on the availability and reliability of the Internet, which makes the security of this infrastructure a top priority issue in the field. Network Infrastructure Security is a book that bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions."--Back cover.