دانلود کتاب Handbook of Security and Networks

عنوان فارسی :

دانلود کتاب کتابچه راهنمای امنیت و شبکه

عنوان انگلیسی :

Handbook of Security and Networks

زبان : English

موضوع : Computers->Security

نویسندگان : Yang Xiao Frank H. Li Hui Chen

ناشر : World Scientific Publishing Company

ISBN (شابک) : 9814273031, 9789814273039

تعداد صفحات : 574\574

سال نشر : 2011     ویرایش : 1

حجم : 9 MB       فرمت : pdf

قیمت : 20000 تومان

فهرست :



Table of contents :
CONTENTS......Page 6
PREFACE......Page 10
ABOUT EDITORS......Page 12
CONTRIBUTORS......Page 14
ACKNOWLEDGEMENT......Page 22
Part I: Overview of Network Security......Page 23
1.1. Introduction......Page 25
1.2.1. Introduction to Security......Page 26
1.2.2. Introduction to the Wireless Networking......Page 32
1.2.3. Security Attacks......Page 34
1.3. Security in WLAN 802.11......Page 36
1.3.1. IEEE 802.11 Standard......Page 37
1.3.3. WEP Weaknesses......Page 39
1.3.5. IEEE 802.11i Standard......Page 41
1.3.7. WAP......Page 43
1.4. Security in Bluetooth Networks......Page 45
1.5.1. The 802.16 Protocol Layers......Page 47
1.5.2. WMAN Security Concerns......Page 49
1.6.2. Security Policy......Page 50
1.7.1. PANA......Page 51
1.7.2. LWAPP......Page 52
1.7.3. DRKH......Page 55
1.8. Summary......Page 57
References......Page 58
2.1. Introduction......Page 61
2.2.1. Pub/Sub Confidentiality......Page 64
2.3.1. Information Foiling Mechanism......Page 65
2.3.2. Performance Metrics......Page 66
2.3.3. Communication Overhead......Page 67
2.4.1. A Simple Probabilistic Model......Page 68
2.4.2. Fake Message Generation Schemes......Page 69
2.5. Evaluation......Page 70
2.5.1. Experimental Setup......Page 71
2.5.2. Results: Indistinguishability......Page 72
2.6.1. Asymmetric Communications......Page 74
2.7. Related Work......Page 76
References......Page 78
3.1. Introduction......Page 81
3.1.3. Blame the Implementation?......Page 82
3.2. Inadequacies in Protocol RFCs......Page 83
3.2.1. Missing Specification Qualities......Page 84
3.2.2. Poor Definition of Valid Packets......Page 85
3.2.3. Weak Handling of Security Issues......Page 87
3.2.4. Prone to Denials of Service......Page 88
3.2.5. Prone to Unauthorized Use......Page 89
3.3. Specifications v. Designs v. Implementations......Page 90
3.3.2. Formal Methods Brief......Page 91
3.4. Protocol Engine......Page 92
3.4.1. States and State Vectors......Page 93
3.4.3. Histories and Logs......Page 94
3.4.4. Servers......Page 95
3.5.1. RFC Terms......Page 96
3.5.2. Validity of Packet Structure......Page 101
3.5.3. Actions for Illegal Packets......Page 102
3.5.4. Denial of Service......Page 103
3.5.5. Unauthorized Use......Page 104
3.6.1. Formal Methods......Page 105
3.6.2. Code Analysis and Generation......Page 106
3.6.3. Specifiers'/Implementers' Problem?......Page 107
3.7. Conclusion......Page 108
3.7.2. Advice to RFC Approval Bodies......Page 109
3.7.4. Future Work......Page 110
References......Page 111
4.1. Introduction......Page 115
4.2.1. Requirements for Multimedia Authentication Solutions......Page 117
4.2.2. Background and Common Techniques......Page 119
4.3. Authentication of Data Streams and Nonscalable Video Streams......Page 122
4.3.1. Authentication of Data Streams......Page 123
4.3.2. Non-scalable Media Stream Authentication......Page 129
4.4.1. Approaches Based on Hash Chaining......Page 133
4.4.2. Approaches Based on Hash Trees......Page 134
4.5. Comparison......Page 138
4.6. Conclusion and Research Directions......Page 140
References......Page 143
5.1. Introduction......Page 149
5.2.1. Reconnaissance......Page 150
5.2.3. Denial of Service......Page 151
5.3.3. Fine-Grained Privileges......Page 153
5.4.1. BIOS......Page 155
5.4.3. OS Kernel Initialization......Page 156
5.5.1. Expectations of an Init......Page 157
5.5.2. A Tour of Past Exploits......Page 159
5.5.3. Trojaned inits......Page 161
5.6.1. The Buffer Overflow Error......Page 162
5.6.3. Techniques of Avoiding Buffer Overflow......Page 163
5.7.1. IPv4 Exploits......Page 165
5.7.2. UDP Exploits......Page 166
5.7.3. TCP Exploits......Page 167
5.7.5. ICMP Exploits......Page 169
5.7.8. Traffic Scrubbing......Page 170
5.8.2. Proper Configuration......Page 171
5.8.3. Fortification......Page 172
5.9.2. What Makes a Distribution Secure?......Page 173
5.10.1. Kernel Exploits......Page 175
5.10.2. Kernel Patches......Page 178
5.10.3. Synthesis of a New Kernel......Page 181
5.11. Conclusion......Page 184
References......Page 185
Part II: Attacks on Networks......Page 189
6.1. Introduction......Page 191
6.2. Related Work......Page 193
6.3. Design Requirements......Page 194
6.4.1. Mobile Multi-hop Network Domains......Page 195
6.4.2. Mobile Attack Identification......Page 197
6.4.3. Impact of Legitimate Mobility on Traceback......Page 198
6.5. Traffic Monitoring-based Traceback......Page 200
6.5.1. DoS Attacker Traceback......Page 203
6.5.2. DDoS Attacker Traceback......Page 204
6.5.3. Performance Analysis......Page 205
6.6.1. Information Gathering......Page 207
6.6.2. Information Fusion......Page 208
6.6.3. Examples for Mobile Attacker Traceback......Page 209
References......Page 211
7.1. Introduction......Page 213
7.2. Denial of Service Attacks......Page 215
7.2.1. Types of Denial of Service Attacks......Page 216
7.2.2. Detection and Reaction Approaches......Page 218
7.2.3. Prevention and Suppression Approaches......Page 222
7.3. Monitoring to Detect Service Violations and DoS Attacks......Page 223
7.3.1. Core-based Monitoring......Page 224
7.3.2. Edge-based Monitoring......Page 225
7.3.3. Violation and DoS Detection......Page 230
7.4.1. Setup......Page 232
7.4.2. Overhead Calculation......Page 233
7.4.3. Results and Analysis......Page 235
7.4.4. Summary......Page 237
References......Page 239
Part III: Key and Key management......Page 243
8.1. Introduction......Page 245
8.2. Two-Factor AKE Using Smart Cards and Passwords......Page 247
8.2.1. Security Requirements and Adversarial Capabilities......Page 249
8.2.2. Offline Dictionary Attack......Page 252
8.2.3. A Secure Two-Factor Smart-Card-Based Password AKE......Page 253
8.3. Authenticated Key Establishment in Roaming Networks......Page 255
8.3.1. Deposit-case Attack Against Secure Roaming......Page 256
8.3.2. A Secure AKE Protocol for Roaming Networks......Page 258
8.4.1. User Privacy Against Eavesdroppers......Page 260
8.4.2. User Privacy Against both Eavesdroppers and Foreign Networks......Page 262
References......Page 265
9.1. Introduction......Page 267
9.1.1. Motivation......Page 268
9.1.3. Organization......Page 269
9.2. System Models and Design Goals......Page 270
9.3.1. Scheme I: The Naive Approach......Page 271
9.3.2. Scheme II: Cumulative Commitment......Page 273
9.3.3. Scheme III: Distributed Detection......Page 275
9.4. Implementation Issues......Page 283
References......Page 284
10.1. Introduction......Page 287
10.2. Motivation......Page 289
10.3.1. System Models of General-Purpose MANETs......Page 290
10.3.2. Key Revocation Schemes Based on Threshold Cryptography......Page 291
10.3.3. Self-Organized Key Revocation Schemes......Page 293
10.3.4. Other Key Revocation Schemes......Page 295
10.4. Key Revocation Schemes in VANETs......Page 297
10.4.1. System Models of VANETs......Page 298
10.4.2. Certificate Revocation Based on Weighted Voting......Page 299
10.4.4. RSU-Aided Certificate Revocation......Page 300
References......Page 301
Part IV: Malware......Page 305
11.1. Introduction......Page 307
11.2.1. Signature-Based Anti-Virus Technique......Page 311
11.2.2. Hardware Controlled Scanner Anti-Virus Method......Page 312
11.3.1. Structure of Active Detection and Prevention Systematic Approach......Page 313
11.4. Experiments......Page 314
11.5. Related Work......Page 318
11.6.1. Conclusion......Page 319
References......Page 320
12.1. Introduction......Page 323
12.1.1. Methods of Self Replication......Page 324
12.1.2. Historical Examples......Page 325
12.2. Related Literature......Page 327
12.3. Homogeneous Epidemic Models......Page 328
12.3.1. The Simple Homogeneous Epidemic......Page 329
12.3.2. The General Homogeneous Epidemic......Page 330
12.4. Community of Households Model......Page 332
12.4.1. Symmetric Case of COH Model......Page 333
12.5. Epidemic Slowed by Bandwidth Limits......Page 334
12.5.1. Special Symmetric Case of COH-LIHB Model......Page 335
12.6.2. Rate Limiting......Page 338
References......Page 340
13.1. Introduction......Page 343
13.2. Background......Page 345
13.3. Worm Interaction Model and Metrics......Page 349
13.3.2. Basic SIR Model......Page 350
13.3.3. Worm Interaction Model......Page 351
13.3.5. Worm Interaction Model Analysis......Page 352
13.3.6. Node Characteristics......Page 355
13.4.1. Uniform Encounters......Page 358
13.4.2. Non-uniform Encounters......Page 360
13.5. Summary and Future Works......Page 361
References......Page 363
14.1. Introduction......Page 367
14.2. Rootkit Evolution......Page 370
14.3.1. I/O Manager......Page 372
14.3.6. Configuration Manager......Page 373
14.4.1. Hooking......Page 374
14.4.2. Filter Drivers......Page 378
14.4.3. Direct Kernel Object Manipulation (DKOM)......Page 379
14.5.1. Virtual Memory Subversion......Page 381
14.5.3. System Management Mode (SMM) Rootkits......Page 382
14.5.4. BIOS and PCI Rootkits......Page 383
14.5.5. The Big Picture: Rootkit Attack Patterns......Page 384
14.6. Rootkit Detection......Page 385
14.6.1. Software Solutions......Page 386
14.6.2. Hardware Solutions......Page 387
14.7. Conclusion......Page 388
References......Page 389
15.1. Introduction......Page 391
15.2. Background......Page 398
15.2.1. Botnet and Botnet Operation......Page 399
15.2.2. Malware......Page 404
15.3.1. Bot Army Capabilities......Page 407
15.3.2. Bot Army Technology Development......Page 409
15.3.3. Defending Against Bot Armies......Page 414
15.4. Summary......Page 424
References......Page 427
Part V: Latest Security-Related Topics on Computer Networking......Page 433
16.1. Introduction......Page 435
16.2. Operation of 802.15.3 Networks......Page 436
16.3. Interconnecting IEEE 802.15.3 Piconets......Page 438
16.4. Implementing Multi-Piconet Networks with 802.15.3......Page 441
16.5. Related Work......Page 444
16.6. Fixed vs. Adaptive CTA Allocation......Page 446
16.7. Adaptive CTA with Threshold Hysteresis......Page 450
References......Page 453
17.1. Introduction......Page 455
17.2. WLAN/cellular Integrated Service Model Architecture......Page 459
17.2.2. PID Renewal......Page 461
17.2.4. Service Session Setup......Page 462
17.3. Messaging Scheme......Page 463
17.3.2. Proposed Authentication Process......Page 464
17.3.3. Variation of the Proposed Authentication Scheme......Page 467
17.4.1. PID Renewal Process......Page 468
17.4.2. Event-tracking for Billing Support......Page 469
17.5.1. Security Analysis......Page 473
17.5.2. Overhead Analysis......Page 479
17.6. Conclusions......Page 484
References......Page 485
18.1. Introduction......Page 487
18.2. Notations and Definitions......Page 490
18.3. Probabilistic Schemes......Page 493
18.4.1. Centralized Algorithms......Page 494
18.4.2. Distributed Algorithms......Page 502
References......Page 505
19.1. Introduction......Page 509
19.1.1. OMA DRM......Page 510
19.1.2. NTP-DRMT......Page 511
19.1.3. Test Procedure for the DRM Registration......Page 512
19.2.1. DRM Test Management and Control (TMC)......Page 513
19.2.2. DRM TTCN-3 Executable (TE)......Page 516
19.2.3. DRM SUT Adapter (SA)......Page 517
19.3.1. The TTCN-3 Control Interface (TCI) for DRM......Page 518
19.3.2. The TTCN-3 Runtime Interface (TRI) for DRM......Page 520
19.4. A DRM Conformance Test Scenario......Page 522
References......Page 526
Appendix A: The Conformance and Interoperability Test Cases......Page 527
20.1. Introduction......Page 531
20.2. Clinical Information System: Architectural and Security Issues......Page 534
20.3. ECC and Hardware Platform for Healthcare WSNs......Page 535
20.4. Key Generation for the Patient Group......Page 537
20.4.1. Mutual Authentication and Key Generation using CTSS......Page 538
20.4.2. Scaled Multi-Party SSL Protocol with Ephemeral ECC Diffie-Hellman Key Exchange......Page 541
20.4.3. Maintenance of the Session Key......Page 544
20.4.4. Distribution of the Session Key......Page 545
20.5. Analysis of Energy Consumption......Page 546
20.6. Conclusion......Page 547
References......Page 548
21.1. Introduction......Page 551
21.2.1. Reasons of the Need of Link Layer Security......Page 552
21.2.2. TinySec Packet Format......Page 553
21.2.4. Different Modes of Operation in TinySec......Page 554
21.3.1. Introduction......Page 555
21.3.3. Math for RSA vs. ECC......Page 556
21.3.5. Authentication with Asymmetric Cryptography......Page 557
21.3.6. How are Elliptic Curves Used?......Page 558
21.3.7. The Diffie Hellman/DSA Cryptosystems and the Discrete Logarithm Problem......Page 559
21.3.9. Elliptic Curve Groups......Page 560
21.4. LEAP: Localized Encryption & Authentication Protocol......Page 561
21.4.3. Cluster Key......Page 562
21.4.7. Advantages of LEAP......Page 563
21.5. SPINS: Security Protocols for Sensor Networks......Page 564
21.6.1. Types of Message Passing......Page 565
21.6.2. Distribution of Keys......Page 566
21.6.6. Assess Metric......Page 567
21.7.1. Traffic Authentication......Page 568
21.8. Comparisons......Page 569
References......Page 572





کتاب های پزشکی

دانلود کتاب Chronic Obstructive Lung Disease

دانلود کتاب World of Microbiology and Immunology - 2 Volume Set

دانلود کتاب Pesticides are poison

دانلود کتاب Polyomaviruses and Human Diseases

دانلود کتاب Do-In. Uprazhneniya dlya vosstanovleniya zdorov'ya i dostizheniya dolgoletiya

کتاب های کامپیوتر

دانلود کتاب GNU/Linux Application Programming (Programming Series)

دانلود کتاب Java Generics and Collections

دانلود کتاب Cocoa and Objective-C: Up and Running: Foundations of Mac, iPhone, and iPod touch programming

دانلود کتاب Java Enterprise Design Patterns: Patterns in Java

دانلود کتاب Oracle E-Business Suite 12 Financials Cookbook

کتاب های ریاضی

دانلود کتاب Lattices over Orders I

دانلود کتاب Elementary cryptanalysis: A mathematical approach

دانلود کتاب Famous Problems of Elementary Geometry: The Duplication of the Cube, the Trisection of an Angle, the Quadrature of the Circle

دانلود کتاب Oxford User's Guide to Mathematics

دانلود کتاب Advanced Markov chain Monte Carlo methods

کتاب های تکنولوژی

دانلود کتاب Nonlinear magnetization dynamics in nanosystems

دانلود کتاب Bulk Nanostructured Materials

دانلود کتاب Nanomaterials For Solid State Hydrogen Storage

دانلود کتاب Nanomaterials: Risks and Benefits (NATO Science for Peace and Security Series C: Environmental Security)

دانلود کتاب Identification of discharge coefficients of orifice-type restrictors for aerostatic bearings and application examples

کتاب های مذهبی

دانلود کتاب Contested Creations in the Book of Job: The-World-as-It-Ought-and-Ought-Not-to-Be

دانلود کتاب Earth Power: Techniques of Natural Magic

دانلود کتاب Rationalism, Religion, and Domination: A Weberian Perspective

دانلود کتاب The Taoist Canon – A Historical Companion to the Daozang: Vol. 1: Antiquity through the Middle Ages

دانلود کتاب Thinking Towards New Horizons: Collected Communications to the XlXth Congress of the International Organization for the Study of the Old Testament, Ljubljana 2007

کتاب های فیزیولوژی

دانلود کتاب Archetype, Attachment, Analysis: Jungian Psychology and the Emergent Mind

دانلود کتاب Political Psychology

دانلود کتاب Stevens' Handbook of Experimental Psychology, Methodology in Experimental Psychology

دانلود کتاب Leadership Processes and Follower Self-Identity

دانلود کتاب Family Guide Child Psychiatry

کتاب های تاریخی

دانلود کتاب Sopwith Baby

دانلود کتاب The British NAVY from within

دانلود کتاب The American Plains Indians

دانلود کتاب RAF S.E.5

دانلود کتاب Russia's Main Battle Tank T-80U

کتاب های زیست شناسی

دانلود کتاب The Perception of the Environment: Essays on Livelihood, Dwelling and Skill

دانلود کتاب Protein Networks and Pathway Analysis

دانلود کتاب Protein-Protein Interactions: A Molecular Cloning Manual, Second Edition

دانلود کتاب Antibody Phage Display: Methods and Protocols

دانلود کتاب Bioremediation: Methods and Protocols

کتاب های اقتصاد

دانلود کتاب Financial Management Theory And Practice

دانلود کتاب Managing the Margins

دانلود کتاب Network Management, MIBs and MPLS: Principles, Design and Implementation

دانلود کتاب The 7 Irrefutable Rules of Small Business Growth

دانلود کتاب ExamInsight for CFA 2006 level I certification

کتاب های آموزشی

دانلود کتاب Sounds Like Life: Sound-Symbolic Grammar, Performance, and Cognition in Pastaza Quechua (Oxford Studies in Anthropological Linguistics, 2)

دانلود کتاب Current Topics in Membranes and Transport, Vol. 1

دانلود کتاب Ilyushin IL-18/-20/-22: A Versatile Turboprop Transport (Aerofax)

دانلود کتاب Teach Yourself VISUALLY Photoshop CS4

دانلود کتاب Medical Simulation: International Symposium, ISMS 2004, Cambridge, MA, USA, June 17-18, 2004. Proceedings

کتاب های حقوق

دانلود کتاب McMafia: a journey through the global criminal underworld

دانلود کتاب Cyber Crime Investigator's Field Guide

دانلود کتاب The Impact of International Law on International Cooperation: Theoretical Perspectives

دانلود کتاب The Colombian Criminal Justice in Crisis: Fear and Distrust

دانلود کتاب 101 Law Forms for Personal Use, 5th Edition

کتاب های علوم انسانی

دانلود کتاب On Holiday: A History of Vacationing

دانلود کتاب Thinking It Through: An Introduction to Contemporary Philosophy

دانلود کتاب Japanese Emblems and Designs

دانلود کتاب The Politics of the Family: And Other Essays (Selected Works of R.D. Laing, 5)

دانلود کتاب No Gods No Masters: An Anthology of Anarchism