Cover image for Information Assurance : Dependability and Security in Networked Systems.
Information Assurance : Dependability and Security in Networked Systems.
Title:
Information Assurance : Dependability and Security in Networked Systems.
Author:
Qian, Yi.
ISBN:
9780080555881
Personal Author:
Physical Description:
1 online resource (577 pages)
Series:
The Morgan Kaufmann Series in Networking
Contents:
Front Cover -- Information Assurance -- Copyright Page -- Table of Contents -- Preface -- Contributors -- Chapter 1. Information Assurance -- 1.1 Introduction -- 1.2 Information Assurance: Dependability and Security of Networked Information Systems -- 1.3 Book Organization -- 1.4 Conclusion -- References -- Part I: Foundational Background on Security and Dependability Techniques -- Chapter 2. Network Security -- 2.1 Introduction -- 2.2 Network Attacks and Security Issues -- 2.3 Protection and Prevention -- 2.4 Detection -- 2.5 Assessment and Response -- 2.6 Conclusion -- References -- Chapter 3. Security for Distributed Systems: Foundations of Access Control -- 3.1 Introduction -- 3.2 Identification and Authentication -- 3.3 Access Control -- 3.4 Access Control in Distributed Systems -- 3.5 Digital Identity Management -- 3.6 Conclusion -- References -- Chapter 4. Network Survivability -- 4.1 Introduction -- 4.2 Prevention Techniques -- 4.3 Survivable Network Design and Traffic Restoration Concepts -- 4.4 Transport Network Recovery Techniques -- 4.5 Survivable Network Design Techniques -- 4.6 Multilayer Issues -- 4.7 Conclusion and Future Research Areas -- References -- Chapter 5. System Survivability -- 5.1 Introduction and Background -- 5.2 Survivability and the Impact of Fault Models -- 5.3 Design for Survivability -- 5.4 Decentralized Storage -- 5.5 Survivability of Large Distributed Systems -- 5.6 Borrowing from Well-established Fields -- 5.7 Conlusion -- References -- Part II: Modeling the Interaction Between Dependability and Security -- Chapter 6. Taxonomy and Framework for Integrating Dependability and Security -- 6.1 Introduction -- 6.2 Basic Concepts and Related Work -- 6.3 Proposed Taxonomy and Framework -- 6.4 Dependability, Security, and their Attributes -- 6.5 The Means to Attain Dependability and Security -- 6.6 Conclusion.

References -- Chapter 7. Stochastic Modeling Techniques for Secure and Survivable Systems -- 7.1 Introduction -- 7.2 Analytical Modeling Techniques -- 7.3 Security Modeling -- 7.4 Survivability Modeling -- 7.5 Conclusion -- Acknowledgment -- References -- Chapter 8. Integrated Dependability and Security Evaluation Using Game Theory and Markov Models -- 8.1 Introduction -- 8.2 Stochastic Modeling -- 8.3 Predicting Attacker Behavior -- 8.4 Defining and Solving the Game -- 8.5 Tuning the Game Parameters -- 8.6 Case Study: DNS Service -- 8.7 Conclusion -- References -- Chapter 9. Scenario Graphs Applied to Network Security -- 9.1 Introduction -- 9.2 Algorithms for Generating Scenario Graphs -- 9.3 Attack Graphs are Scenario Graphs -- 9.4 Network Attack Graphs -- 9.5 Example Network -- 9.6 Attack Graph Analysis -- 9.7 Practical Experience -- 9.8 Related Work -- 9.9 Future Work and Conclusion -- Acknowledgments -- References -- Chapter 10. Vulnerability-Centric Alert Correlation -- 10.1 Introduction -- 10.2 Review of Alert Correlation and Related Techniques -- 10.3 Attack Graph -- 10.4 Alert Correlation, Hypothesis, Prediction, and Aggregation -- 10.5 Conclusion -- 10.6 Acknowledgments -- References -- Part III: Design and Architectural Issues for Secure and Dependable Systems -- Chapter 11. Monitoring and Detecting Attacks in All-Optical Networks -- 11.1 Introduction -- 11.2 Crosstalk Attack Features and Monitoring Techniques -- 11.3 Node, Attack, and Monitor Models -- 11.4 Necessary and Sufficient Conditions for Crosstalk Attack Detection -- 11.5 One-Crosstalk Attack Diagnosable Conditions -- 11.6 k-Crosstalk Attacks in the Network -- 11.7 Sparse Monitoring and Routing Algorithms -- 11.8 Sparse Monitoring, Test Connection, and Routing for More than One Original Attack Flow -- 11.9 Conclusion -- References.

Chapter 12. Robustness Evaluation of Operating Systems -- 12.1 Introduction -- 12.2 Evaluation Goals -- 12.3 Target System -- 12.4 Error Model and Workload Selection -- 12.5 Robustness Metrics -- 12.6 Presentation and Interpretation of Results -- 12.7 Conclusion -- References -- Further Reading -- Chapter 13. Intrusion Response Systems: A Survey -- 13.1 Introduction -- 13.2 Static Decision-Making Systems -- 13.3 Dynamic Decision-Making Systems -- 13.4 Intrusion Tolerance Through Diverse Replicas -- 13.5 Responses to Specific Kinds of Attacks -- 13.6 Benchmarking Intrusion Response Systems -- 13.7 Thoughts on Evolution of IRS Technology -- 13.8 Conclusion -- References -- Chapter 14. Secure and Resilient Routing: Building Blocks for Resilient Network Architectures -- 14.1 Introduction -- 14.2 Traffic Engineering Perspective and its Relation to Network Robustness -- 14.3 Components of a Resilient Network Architecture -- 14.4 Threats and Counter Measures in Link-State Routing -- 14.5 Resilient Architecture: Virtualization and Routing -- 14.6 Conclusion -- Acknowledgments -- References -- 14.A Secure Group Communication -- 14.A.1 Using One-Way Function Chain to Build Key Chain -- 14.A.2 Key Distribution -- 14.A.3 Key Agreement Protocol -- 14.A.4 Assessment -- Chapter 15. Security and Survivability of Wireless Systems -- 15.1 Introduction -- 15.2 Background -- 15.3 Current Security Approaches in Wireless Networks -- 15.4 Current Survivability Approaches in Wireless Networks -- 15.5 Framework for Wireless Network Survivability and Security -- 15.6 Interaction Between Survivability and Security in Wireless Networks -- 15.7 Conclusion -- References -- Chapter 16. Integrated Fault and Security Management -- 16.1 Introduction -- 16.2 Active Integrated Fault Identification Framework -- 16.3 Fault and Security Management on High-Speed Networks -- 16.4 Conclusion.

References -- Index.
Abstract:
In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). KEY FEATURES * The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting * Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance * Additional focus on security and survivability issues in wireless networks.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: