Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010159409 | TK5105.875.I57 S56 2007 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers against organisations network and computing resources. This book is a critical investigation of the Internet Protocol Security (IPSec) based on combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the IPSec framework. The bene?ts of IPSec were exploited while the delimiting factors cannot be ignored. Infor- tion security has become a major concern in recent times as more and more computers are being connected to the global Internet. With so much data tra- ferring over public networks, the risk of sensitive information has increased exponentially and the increase of Internet hosts continuously requires ad- tional security support. The IPSec may be used in three different security - mains: Virtual private networks, Application-level security, and Routing se- rity. It comprises of suite of protocols, which are developed to ensure that the integrity, con?dentiality and authentication of data communications over an IP network. The IPSec is predominately used in virtual private networks (VPNs). But when used in application-level security or routing security, the IPSec is not a complete solution and must be coupled with other security measures to be effective. As with other security systems, poor maintenance can easily lead to a critical system failure.
Table of Contents
Dedication | p. v |
List of contributors and organisations | p. xvii |
Preface | p. xix |
Acknowledgements | p. xxi |
Chapter 1 Research overview and conceptual understanding of internet protocol security (IPSec) | |
1 Introduction | p. 1 |
2 Research rationale | p. 2 |
3 Research hypothesis | p. 5 |
5 Methods and methodology | p. 9 |
6 Internet architecture board (IAB)? | p. 10 |
7 IPSec roadmap | p. 12 |
8 Analogy of IPSec | p. 18 |
9 IPSec relationship with other protocols | p. 20 |
10 Business perception | p. 26 |
11 Summary of chapter one | p. 27 |
References | p. 28 |
Chapter 2 Internet communication protocols | |
1 Introduction | p. 31 |
2 TCP/IP protocol | p. 31 |
3 Security problems of TCP/IP layers | p. 34 |
4 Benefits and limitations of implementing security at the application, transport, network, and data link layers | p. 41 |
5 IPSec standards | p. 46 |
6 Why AH | p. 54 |
7 Why ESP | p. 56 |
8 Security association (SA) and key management | p. 62 |
9 IKE: hybrid protocol | p. 64 |
10 Policy | p. 69 |
11 Summary of chapter two | p. 70 |
References | p. 73 |
Chapter 3 Internet protocol versions 4 (IPv4) and 6 (IPv6) | |
1 Introduction | p. 75 |
2 IPv4 standard | p. 76 |
3 IPv4 limitations and possible solution | p. 80 |
4 IPv6 standard | p. 83 |
5 Difference between IPv4 and v6 | p. 92 |
6 Transition | p. 97 |
7 Summary of chapter three | p. 105 |
References | p. 105 |
Chapter 4 Implementations and limitations of the IPSec | |
1 Introduction | p. 107 |
2 Classification and taxonomy of the IPSec | p. 107 |
3 Combining the IPSec protocols to create a Virtual Private Network (VPN) | p. 108 |
4 IPSec in Windows | p. 119 |
5 Linux | p. 127 |
6 Solaris | p. 128 |
7 FreeBSD | p. 132 |
8 Cisco IOS IPSec configuration overview | p. 136 |
9 Routers | p. 139 |
10 Limitations of the IPSec | p. 141 |
11 Summary Of Chapter four | p. 153 |
References | p. 153 |
Chapter 5 Synchronising Internet Protocol Security (SIPsec) model | |
1 Introduction | p. 155 |
2 Analysis of questionnaire survey | p. 155 |
3 Case studies | p. 156 |
4 Laboratory experiments | p. 157 |
5 Current IPSec solutions | p. 157 |
6 Public key algorithms | p. 161 |
7 Analysis of findings | p. 164 |
8 Conceptual understanding of SIPSec model | p. 166 |
9 Policy reconciliation | p. 172 |
10 Palmistry | p. 178 |
11 Fingerprint | p. 182 |
12 Face | p. 184 |
13 Iris | p. 185 |
14 Result summary of hypothesess | p. 187 |
15 Summary of chapter five | p. 188 |
References | p. 188 |
Chapter 6 Discussion | |
1 Introduction | p. 191 |
2 Issues in IPSec | p. 191 |
3 IPSec is an application specific | p. 199 |
4 Current use of biometrics technology | p. 203 |
5 Combining biometrics with IPSec | p. 204 |
6 Underpining assumption of SIPSec | p. 207 |
7 Summary of chapter six | p. 207 |
References | p. 208 |
Chapter 7 Conclusion | |
1 Dependence on information technology | p. 211 |
2 Global issues on internet security | p. 213 |
3 Root causes of attacks | p. 214 |
4 Recommendation | p. 217 |
5 Contribution to knowledge | p. 217 |
6 Future work | p. 218 |
References | p. 218 |
Index | p. 219 |