Network Security
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network Security
Network Security

Network Security


     0     
5
4
3
2
1



International Edition


X
About the Book

This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.

Table of Contents:
PREFACE xi ABBREVIATIONS xxxiii CHAPTER 1. INTRODUCTION TO CRYPTOGRAPHY 1 1.1. The encryption function 1 1.1.1. 3DES algorithm 3 1.1.2. AES algorithm 6 1.1.3. RSA algorithm 10 1.1.4. ECC algorithm 12 1.2. Hash function 13 1.2.1. MD5 algorithm 13 1.2.2. SHA algorithm 16 1.2.3. HMAC mechanism 20 1.3. Key exchange 22 1.3.1. Secret-key generation 22 1.3.2. Public key distribution 24 CHAPTER 2. 802.1X MECHANISM 27 2.1. General introduction 27 2.2. EAPOL protocol 28 2.2.1. EAPOL-Start message 30 2.2.2. EAPOL-Logoff message 30 2.2.3. EAPOL-Key message 30 2.2.4. EAPOL-Encapsulated-ASF-Alert message 31 2.2.5. EAPOL-MKA message 31 2.2.6. EAPOL-Announcement message 31 2.2.7. EAPOL-Announcement-Req message 32 2.3. EAP protocol 32 2.3.1. EAP-Method Identity 35 2.3.2. EAP-Method Notification 35 2.3.3. EAP-Method NAK 36 2.4. RADIUS protocol 36 2.4.1. RADIUS messages 38 2.4.2. RADIUS attributes 39 2.5. Authentication procedures 42 2.5.1. EAP-MD5 procedure 44 2.5.2. EAP-TLS procedure 45 2.5.3. EAP-TTLS procedure 48 CHAPTER 3. WPA MECHANISMS 51 3.1. Introduction to Wi-Fi technology 51 3.2. Security mechanisms 54 3.3. Security policies 55 3.4. Key management 59 3.4.1. Key hierarchy 59 3.4.2. EAPOL-key messages 61 3.4.3. Four-way handshake procedure 63 3.4.4. Group key handshake procedure 67 3.5. WEP protocol 68 3.6. TKIP protocol 70 3.7. CCMP protocol 73 CHAPTER 4. IPSEC MECHANISM 77 4.1. Review of IP protocols 77 4.1.1. IPv4 protocol 77 4.1.2. IPv6 protocol 80 4.2. IPSec architecture 83 4.2.1. Security headers 85 4.2.2. Security association 89 4.2.3. PMTU processing 92 4.3. IKEv2 protocol 93 4.3.1. Message header 93 4.3.2. Blocks 96 4.3.3. Procedure 102 CHAPTER 5. SSL, TLS AND DTLS PROTOCOLS 109 5.1. Introduction 109 5.2. SSL/TLS protocols 111 5.2.1. Record header 111 5.2.2. Change_cipher_spec message 112 5.2.3. Alert message 112 5.2.4. Handshake messages 114 5.2.5. Cryptographic information 124 5.3. DTLS protocol 126 5.3.1. Adaptation to UDP transport 126 5.3.2. Adaptation to DCCP transport 129 5.3.3. Adaption to SCTP transport 130 5.3.4. Adaption to SRTP transport 131 CHAPTER 6. NETWORK MANAGEMENT 133 6.1. SNMPv3 management 133 6.1.1. Introduction 133 6.1.2. SNMPv3 architecture 135 6.1.3. SNMPv3 message structure 143 6.2. SSH protocol 146 6.2.1. SSH-TRANS protocol 146 6.2.2. SSH-USERAUTH protocol 151 6.2.3. SSH-CONNECT protocol 152 CHAPTER 7. MPLS TECHNOLOGY 155 7.1. MPLS overview 155 7.1.1. Network architecture 155 7.1.2. LSR router tables 157 7.1.3. PHP function 158 7.1.4. MPLS header format 159 7.1.5. DiffServ support 160 7.2. LDP protocol 162 7.2.1. Principles of functioning 162 7.2.2. LDP PDU format 165 7.2.3. LDP messages 167 7.3. VPN construction 170 7.3.1. Network architecture 170 7.3.2. Differentiation of routes 174 7.3.3. Route target 175 7.3.4. Principles of operation 177 7.4. Network interconnection 180 7.4.1. Hierarchical mode 181 7.4.2. Recursive mode 182 CHAPTER 8. ETHERNET VPN 185 8.1. Ethernet technology 185 8.1.1. Physical layer 186 8.1.2. MAC layer 188 8.1.3. VLAN isolation 191 8.2. PBT technology 194 8.3. VPLS technology 196 8.3.1. Network architecture 196 8.3.2. EoMPLS header 199 8.3.3. LDP 201 8.4. L2TPv3 technology 203 8.4.1. Data message 203 8.4.2. Control messages 205 8.4.3. Procedures 208 CHAPTER 9. FIREWALLS 215 9.1. Technologies 215 9.1.1. Packet filter 216 9.1.2. Applicative gateway 218 9.1.3. NAT/NAPT device 219 9.2. NAT/NAPT device crossing 222 9.2.1. ICMP protocol 223 9.2.2. IPSec mechanism 224 9.2.3. SIP, SDP and RTP protocols 227 9.2.4. FTP protocol 233 9.2.5. Fragmentation 235 CHAPTER 10. INTRUSION DETECTION 237 10.1. Typology of attacks 237 10.2. Methods of detection 239 10.2.1. Signature-based detection 240 10.2.2. Anomaly-based detection 240 10.2.3. Protocol analysis 241 10.3. Technologies 242 10.3.1. N-IDPS device 243 10.3.2. WIDPS device 246 10.3.3. H-IDPS device 248 10.3.4. NBA device 249 BIBLIOGRAPHY 253 INDEX 259

About the Author :
André Perez is a consultant and teacher in networks and telecommunications. He works with industrialists and operators regarding architecture studies and leads training on the 4G and IMS networks for NEXCOM SYSTEMS.


Best Sellers


Product Details
  • ISBN-13: 9781848217584
  • Publisher: ISTE Ltd and John Wiley & Sons Inc
  • Publisher Imprint: ISTE Ltd and John Wiley & Sons Inc
  • Height: 236 mm
  • No of Pages: 304
  • Returnable: N
  • Weight: 657 gr
  • ISBN-10: 1848217587
  • Publisher Date: 04 Nov 2014
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Spine Width: 23 mm
  • Width: 158 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Network Security
ISTE Ltd and John Wiley & Sons Inc -
Network Security
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Network Security

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!