Title
A Protocol Layer Survey of Network Security
Abstract
It is difficult to estimate how much more the Internet will impact modern society. The use of this ubiquitous computing and communication platform to provide instant worldwide communication, increase business productivity, create more effective markets, and overcome geographical boundaries, is only now starting to be fully appreciated. Unfortunately, all of the benefits mentioned above, and the potential for any future benefits, are at risk of being lost due to security vulnerabilities. Cybercriminals and cyberterrorists, including both state-sponsored and individual, are attacking computing and networking systems at an increasing rate. And all individuals, corporations and governments who utilize these systems are at risk. This chapter provides a survey of this electronic information battlefield. This survey differs from others in that it presents common categories of attacks from the perspective of the TCP/IP protocol stack layers. By presenting categories of attacks by protocol layer, one may focus on the nature of the vulnerabilities, rather than become mired in the minutiae. After presenting categories of attacks, an overview of the techniques that has been created to defend against the various attack categories is presented.
Year
DOI
Venue
2005
10.1016/S0065-2458(04)64003-4
ADVANCES IN COMPUTERS, VOL 64: NEW PROGRAMMING PARADIGMS
Keywords
Field
DocType
network security
Internet Protocol,Internet privacy,Battlefield,Computer science,Computer security,Minutiae,Network security,Ubiquitous computing,Vulnerability,The Internet
Journal
Volume
ISSN
Citations 
64
0065-2458
1
PageRank 
References 
Authors
0.54
5
2
Name
Order
Citations
PageRank
John V. Harrison110629.65
Hal Berghel2617123.28