Skip to:Content
|
Bottom
Cover image for Synchronizing internet protocol security (SIPSec)
Title:
Synchronizing internet protocol security (SIPSec)
Personal Author:
Series:
Advances in information security ; 34
Publication Information:
New York, NY : Springer, 2007
ISBN:
9780387327242
General Note:
Available online version
Electronic Access:
Fulltext

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010159409 TK5105.875.I57 S56 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers against organisations network and computing resources. This book is a critical investigation of the Internet Protocol Security (IPSec) based on combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the IPSec framework. The bene?ts of IPSec were exploited while the delimiting factors cannot be ignored. Infor- tion security has become a major concern in recent times as more and more computers are being connected to the global Internet. With so much data tra- ferring over public networks, the risk of sensitive information has increased exponentially and the increase of Internet hosts continuously requires ad- tional security support. The IPSec may be used in three different security - mains: Virtual private networks, Application-level security, and Routing se- rity. It comprises of suite of protocols, which are developed to ensure that the integrity, con?dentiality and authentication of data communications over an IP network. The IPSec is predominately used in virtual private networks (VPNs). But when used in application-level security or routing security, the IPSec is not a complete solution and must be coupled with other security measures to be effective. As with other security systems, poor maintenance can easily lead to a critical system failure.


Table of Contents

Dedicationp. v
List of contributors and organisationsp. xvii
Prefacep. xix
Acknowledgementsp. xxi
Chapter 1 Research overview and conceptual understanding of internet protocol security (IPSec)
1 Introductionp. 1
2 Research rationalep. 2
3 Research hypothesisp. 5
5 Methods and methodologyp. 9
6 Internet architecture board (IAB)?p. 10
7 IPSec roadmapp. 12
8 Analogy of IPSecp. 18
9 IPSec relationship with other protocolsp. 20
10 Business perceptionp. 26
11 Summary of chapter onep. 27
Referencesp. 28
Chapter 2 Internet communication protocols
1 Introductionp. 31
2 TCP/IP protocolp. 31
3 Security problems of TCP/IP layersp. 34
4 Benefits and limitations of implementing security at the application, transport, network, and data link layersp. 41
5 IPSec standardsp. 46
6 Why AHp. 54
7 Why ESPp. 56
8 Security association (SA) and key managementp. 62
9 IKE: hybrid protocolp. 64
10 Policyp. 69
11 Summary of chapter twop. 70
Referencesp. 73
Chapter 3 Internet protocol versions 4 (IPv4) and 6 (IPv6)
1 Introductionp. 75
2 IPv4 standardp. 76
3 IPv4 limitations and possible solutionp. 80
4 IPv6 standardp. 83
5 Difference between IPv4 and v6p. 92
6 Transitionp. 97
7 Summary of chapter threep. 105
Referencesp. 105
Chapter 4 Implementations and limitations of the IPSec
1 Introductionp. 107
2 Classification and taxonomy of the IPSecp. 107
3 Combining the IPSec protocols to create a Virtual Private Network (VPN)p. 108
4 IPSec in Windowsp. 119
5 Linuxp. 127
6 Solarisp. 128
7 FreeBSDp. 132
8 Cisco IOS IPSec configuration overviewp. 136
9 Routersp. 139
10 Limitations of the IPSecp. 141
11 Summary Of Chapter fourp. 153
Referencesp. 153
Chapter 5 Synchronising Internet Protocol Security (SIPsec) model
1 Introductionp. 155
2 Analysis of questionnaire surveyp. 155
3 Case studiesp. 156
4 Laboratory experimentsp. 157
5 Current IPSec solutionsp. 157
6 Public key algorithmsp. 161
7 Analysis of findingsp. 164
8 Conceptual understanding of SIPSec modelp. 166
9 Policy reconciliationp. 172
10 Palmistryp. 178
11 Fingerprintp. 182
12 Facep. 184
13 Irisp. 185
14 Result summary of hypothesessp. 187
15 Summary of chapter fivep. 188
Referencesp. 188
Chapter 6 Discussion
1 Introductionp. 191
2 Issues in IPSecp. 191
3 IPSec is an application specificp. 199
4 Current use of biometrics technologyp. 203
5 Combining biometrics with IPSecp. 204
6 Underpining assumption of SIPSecp. 207
7 Summary of chapter sixp. 207
Referencesp. 208
Chapter 7 Conclusion
1 Dependence on information technologyp. 211
2 Global issues on internet securityp. 213
3 Root causes of attacksp. 214
4 Recommendationp. 217
5 Contribution to knowledgep. 217
6 Future workp. 218
Referencesp. 218
Indexp. 219
Go to:Top of Page