Patterns and Interactions in Network Security

12/31/2019
by   Pamela Zave, et al.
0

Networks play a central role in cyber-security: networks deliver security attacks, suffer from them, defend against them, and sometimes even cause them. This article is a concise tutorial on the large subject of networks and security, written for all those interested in networking, whether their specialty is security or not. To achieve this goal, we derive our focus and organization from two perspectives. The first perspective is that, although mechanisms for network security are extremely diverse, they are all instances of a few patterns. Consequently, after a pragmatic classification of security attacks, the main sections of the tutorial cover the four patterns for providing network security, of which the familiar three are cryptographic protocols, packet filtering, and dynamic resource allocation. Although cryptographic protocols hide the data contents of packets, they cannot hide packet headers. When users need to hide packet headers from adversaries, which may include the network from which they are receiving service, they must resort to the pattern of compound sessions and overlays. The second perspective comes from the observation that security mechanisms interact in important ways, with each other and with other aspects of networking, so each pattern includes a discussion of its interactions.

READ FULL TEXT

page 13

page 24

research
06/27/2020

Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services

The 5G network systems are evolving and have complex network infrastruct...
research
08/12/2023

On the Security Bootstrapping in Named Data Networking

By requiring all data packets been cryptographically authenticatable, th...
research
02/27/2019

Security Function Analysis on Performance of High-Speed Router Networking

A router is a device, in the computer networks, that is used to forward ...
research
05/25/2022

P4Filter: A two level defensive mechanism against attacks in SDN using P4

The advancements in networking technologies have led to a new paradigm o...
research
04/15/2020

Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks

As the Routing Protocol for Low Power and Lossy Networks (RPL) became th...
research
09/24/2017

A Model for Enhancing Human Behaviour with Security Questions: A Theoretical Perspective

Security questions are one of the mechanisms used to recover passwords. ...
research
01/27/2020

Design of the Ouroboros packet network

The 5-layer TCP and 7-layer OSI models are taught as high-level framewor...

Please sign up or login with your details

Forgot password? Click here to reset