Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming t...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Tác giả chính: Brooks, R.R.
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1494
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1494
record_format dspace
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms. Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security. Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.
format Book
author Brooks, R.R.
spellingShingle Brooks, R.R.
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
author_facet Brooks, R.R.
author_sort Brooks, R.R.
title Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
title_short Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
title_full Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
title_fullStr Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
title_full_unstemmed Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
title_sort disruptive security technologies with mobile code and peer-to-peer networks
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1494
_version_ 1757667377005199360
spelling oai:scholar.dlu.edu.vn:DLU123456789-14942009-12-03T08:13:00Z Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks Brooks, R.R. The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms. Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security. Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats. OVERVIEW NETWORK SECURITY PROBLEMS Vulnerabilities Attacks Threat Modeling Physical Security Social Engineering Privacy Fraud Scavenging Trojan Horses Trapdoors Viruses Worms Reverse Engineering Covert Communications Channels and Inferencing Buffer Overflow and Stack Smashing Denial of Service (DoS) Distributed Denial of Service (DDoS) Man in the Middle Attacks Replay Attacks Cryptanalysis DNS and BGP Vulnerabilities Exercises CURRENT SECURITY SOLUTIONS Audits Encryption Steganography Obfuscation Public Key Infrastructure (PKI) Code Signing SSH, SSL, and TLS Formal Methods Virus Scanners Attack Graphs Security Automata Sandboxing Firewalls Red-Black Separation Proof Carrying Code Secure Hardware Dependability, Safety, Liveness Quality of Service Artificial Immune Systems Exercises DISRUPTIVE TECHNOLOGIES Mobile Code Peer-To-Peer Networks Field Programmable Gate Arrays (FPGA's) Adaptation Conclusion Exercises UNDERSTANDING NETWORKS Internet Protocol Background Networks of Embedded Control Systems Network Topology Scale-Free Graphs Traffic Flows Conclusion Exercises UNDERSTANDING MOBILE CODE Existing Paradigms Existing Implementations Theoretical Model Simulator for Model Models of Paradigms Simulation Studies of Models Models of Networking Pathologies Simulation Studies of Pathologies Comparison of Cantor with Other Network Simulations Taxonomies of Mobile Code and Security Mobile Code Daemon Implementation Conclusion Exercises PROTECTING MOBILE CODE Control Flow Modification Bytecode Modification Protocol for Exchanging Bytecode Tables Entropy Maximization of Bytecode Mappings Bytecode Steganography Use of Secure Co-Processors Conclusion Exercises PROTECTING MOBILE CODE PLATFORMS Smart Card Applications Building Control Systems FPGA Cryptography Engine Differential Power Analysis Conclusion Exercises MAINTAINING TRUST ON THE NETWORK Assumptions and Primitives Mobile Code Verification Host Verification Multi-Level Security Conclusion Exercises DESIGNING PEER-TO-PEER SYSTEMS Graph Theory Background Random Graph Background Number of Hops Between Nodes Dependability of Peer-To-Peer Systems Vulnerability to Attack Quality of Service of Peer-To-Peer Systems Correct Number of Indexes Key Management Conclusion Exercises EMERGENT ROUTING AND RESOURCE DISCOVERY Ad Hoc Data Routing Background Spin-Glass Routing Multi-Fractal Routing Pheromone Routing Comparison of Routing Algorithms Epidemic Resource Discovery Conclusion Exercises DENIAL OF SERVICE COUNTERMEASURES Denial of Service (DoS) Background Traffic Flow Measures Attack Detection Verification of Detector Game Theory Analysis Network Structure Vulnerabilities Conclusion Exercises CONCLUSIONS INDEX 2009-12-03T08:13:00Z 2009-12-03T08:13:00Z 2004 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1494 en application/rar CRC Press