Cover image for Internet and intranet security
Title:
Internet and intranet security
Personal Author:
Edition:
2nd ed.
Publication Information:
Boston, Mass. : Artech House, 2002
ISBN:
9781580531665

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004876607 TK5105.875.I57 O67 2002 Open Access Book Book
Searching...
Searching...
30000010020084 TK5105.875.I57 O67 2002 Open Access Book Book
Searching...

On Order

Summary

Summary

This extensively revised, new edition of the 1998 Artech House classic, Internet and Intranet Security, offers professionals an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall technologies to help practitioners provide access control service, and discusses the cryptographic protocols used to provide today's communication security services.


Author Notes

Rolf Oppliger received his M.Sc. and Ph.D. in Computer Science from the University of Berne, Switzerland, and the Venia Legendi in Computer Science from the University of Zürich, Switzerland.

Oppliger is the founder and owner of eSECURITY Technologies Rolf Oppliger (www.esecurity.ch) and works for the Swiss Federal Strategy Unit for Information Technology (FSUIT) . He is also the author of Security Technologies for the World Wide Web (Artech House, 1999) , Internet and Intranet Security (Artech House, 1998), and Authentication Systems for Secure Networks (Artech House, 1996). Dr. Oppliger is the computer security series editor at Artech House.

050


Table of Contents

Prefacep. xv
Referencesp. xxi
Acknowledgmentsp. xxiii
I Fundamentalsp. 1
1 Terminologyp. 3
Referencesp. 10
2 TCP/IP Networkingp. 11
2.1 History and Developmentp. 12
2.2 Internetp. 15
2.3 Internet Standardizationp. 17
2.4 Internet Modelp. 35
Referencesp. 52
3 Attacksp. 55
3.1 Passive Attacksp. 56
3.2 Active Attacksp. 58
Referencesp. 66
4 OSI Security Architecturep. 69
4.1 Introductionp. 69
4.2 Security Servicesp. 72
4.3 Security Mechanismsp. 75
4.4 Security Managementp. 78
Referencesp. 79
5 Cryptographic Techniquesp. 81
5.1 Introductionp. 81
5.2 Cryptographic Hash Functionsp. 84
5.3 Secret Key Cryptographyp. 87
5.4 Public Key Cryptographyp. 90
5.5 Digital Envelopesp. 98
5.6 Protection of Cryptographic Keysp. 101
5.7 Generation of Pseudorandom Bit Sequencesp. 102
5.8 Legal Issuesp. 103
5.9 Notationp. 107
Referencesp. 109
6 Authentication and Key Distributionp. 111
6.1 Authenticationp. 111
6.2 Key Distributionp. 119
Referencesp. 122
II Access Controlp. 125
7 Overviewp. 127
7.1 Introductionp. 128
7.2 Basic Componentsp. 133
7.3 Sources for Further Informationp. 139
Referencesp. 140
8 Packet Filteringp. 141
8.1 Introductionp. 141
8.2 Packet-Filtering Rulesp. 145
8.3 Packet-Filtering Productsp. 151
8.4 Stateful Inspectionp. 156
8.5 Conclusionsp. 157
Referencesp. 160
9 Circuit-Level Gatewaysp. 161
9.1 Introductionp. 161
9.2 SOCKSp. 163
9.3 Conclusionsp. 168
Referencesp. 169
10 Application-Level Gatewaysp. 171
10.1 Introductionp. 171
10.2 User Authentication and Authorizationp. 175
10.3 Proxy Serversp. 177
10.4 Conclusionsp. 178
Referencesp. 180
11 Firewall Configurationsp. 181
11.1 Dual-Homed Firewall Configurationsp. 181
11.2 Screened Host Firewall Configurationsp. 185
11.3 Screened Subnet Firewall Configurationsp. 186
11.4 Network Address Translationp. 188
11.5 Protection Against Denial of Servicep. 190
11.6 Firewall Certificationp. 192
Referencesp. 193
12 Conclusions and Outlookp. 195
Referencesp. 201
III Communication Securityp. 203
13 Network Access Layer Security Protocolsp. 205
13.1 Introductionp. 205
13.2 Layer 2 Forwarding Protocolp. 209
13.3 Point-to-Point Tunneling Protocolp. 210
13.4 Layer 2 Tunneling Protocolp. 218
13.5 Conclusionsp. 219
Referencesp. 220
14 Internet Layer Security Protocolsp. 223
14.1 Previous Workp. 224
14.2 IETF Standardizationp. 226
14.3 IP Security Architecturep. 227
14.4 IPsec Protocolsp. 230
14.5 Key Management Protocolsp. 236
14.6 Implementationsp. 245
14.7 Conclusionsp. 246
Referencesp. 247
15 Transport Layer Security Protocolsp. 251
15.1 Previous Workp. 251
15.2 SSL Protocolp. 252
15.3 TLS Protocolp. 269
15.4 Firewall Tunnelingp. 274
15.5 Conclusionsp. 277
Referencesp. 279
16 Application Layer Security Protocolsp. 283
16.1 Security-Enhanced Application Protocolsp. 284
16.2 Authentication and Key Distribution Systemsp. 295
16.3 Conclusionsp. 307
Referencesp. 308
17 Message Security Protocolsp. 313
17.1 Introductionp. 313
17.2 Secure Messaging Protocolsp. 314
17.3 Conclusionsp. 325
Referencesp. 326
18 Conclusions and Outlookp. 329
Referencep. 333
IV Discussionp. 335
19 Public Key Infrastructuresp. 337
19.1 Introductionp. 337
19.2 Public Key Certificatesp. 339
19.3 Attribute Certificatesp. 342
19.4 IETF PKIX WGp. 345
19.5 Certificate Revocationp. 348
19.6 Conclusionsp. 352
Referencesp. 356
20 Electronic Commercep. 361
Referencesp. 366
21 Risk Managementp. 369
21.1 Introductionp. 369
21.2 Formal Risk Analysisp. 371
21.3 Alternative Approaches and Technologiesp. 373
21.4 Conclusionsp. 375
Referencesp. 376
Epiloguep. 379
Referencesp. 381
Abbreviations and Acronymsp. 383
About the Authorp. 393
Indexp. 395