IPsec: AH and ESP
A. Meddeb, and N. Boudriga, National Digital Certification Agency and University of Carthage, Tunisia Mohammad S. Obaidat*, Monmouth University, NJ, USA
TCP/IP Limitations and IPsec Response
IPsec Architecture
Security Association Database
Security Policy Database
Authentication Header
Encapsulating Security Protocol (ESP)
IPsec Processing
Outgoing Traffic Management
Incoming Traffic Management
Security Policy Management
IPSec Policy Capabilities
IPSec Policy Configuration
IPsec Implementations
Host Implementation
Router Implementation
Limitations, Perspectives and Advanced Issues of IPsec
Advantages of IPSec
IPSec Limitations
Concluding Remarks
Glossary
Cross References
References
TCP/IP LIMITATIONS AND IPsec RESPONSE
Nowadays, most of the Internet flows are left unprotected against cyber attacks. A packet that traverses the network can be intercepted by any host connected to the network (and lying along the transmission path). The packet can be replayed and its content can be modified or reproduced. Even the checksums, which are part of the Internet Packet format, if used as a security mechanism, cannot protect a packet from unauthorized alteration. The checksums were intended to protect against corruption caused by malfunctioning devices. If the data alteration is intentional, the attacker can recompute the checksum, and the packet will appear to be perfectly intact. This situation exists mainly because no real protection mechanism has been integrated into ...
Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.