Internet Security Standards
Raymond R. Panko, University of Hawaii
Introduction
Security Threats
Penetration Attacks
Attacks on Dialogues
An IETF Focus on Dialogue Security
Dialogue Security
Confidentiality
Authentication and Integrity
Initial Authentication
Message-by-Message Authentication
Adding Overlay Security to Individual Dialogues
Cryptographic Protection Systems (CPSs)
PPP and PPTP VPNs
IPsec VPNs
SSL/TLS VPNs
Multilayer Security
Dialogue Security and Firewalls
Adding Security to Individual Internet Standards
A Broad IETF Commitment
Security and Vulnerabilities
The Core Three: IP, TCP, and UDP
Administrative Standards
Application Layer Standards
The State of Internet Security Standards
General Insecurity
The Broad IETF Program
The Authentication Problem
Protection from Denial-of-Service Attacks
Internet Forensics Standards
Glossary
Cross References
References
INTRODUCTION
When the Internet was created, security was left out of its TCP/IP standards. At the time, the crude state of security knowledge may have made this lack of security necessary, and the low frequency of attacks made this lack of security reasonable.
Today, however, security expertise is more mature. In addition, the broad presence of security threats on the Internet means that security today must be addressed deliberately and aggressively In 2004, between 5% and 12% of all sampled traffic moving across ISP networks was malicious (Legard, 2004).
This article describes two ways to add standards-based security ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.