| About the Authors | p. ix |
| Network Security Overview | p. 1 |
| Cryptographic Tools | p. 2 |
| Key Predistribution | p. 12 |
| Authentication Protocols | p. 17 |
| Secure Systems | p. 25 |
| Firewalls | p. 38 |
| Conclusion | p. 42 |
| Further Reading | p. 44 |
| Network Attacks | p. 47 |
| Introduction | p. 47 |
| Network Attacks and Security Issues | p. 47 |
| Protection and Prevention | p. 54 |
| Detection | p. 61 |
| Assessment and Response | p. 62 |
| Conclusion | p. 63 |
| References | p. 63 |
| Security and Privacy Architecture | p. 65 |
| Objectives | p. 65 |
| Background | p. 66 |
| Developing a Security and Privacy Plan | p. 67 |
| Security and Privacy Administration | p. 68 |
| Security and Privacy Mechanisms | p. 72 |
| Architectural Considerations | p. 80 |
| Conclusion | p. 85 |
| Network Security Algorithms | p. 87 |
| Searching for Multiple Strings in Packet Payloads | p. 89 |
| Approximate String Matching | p. 93 |
| IP Traceback via Probabilistic Marking | p. 95 |
| IP Traceback via Logging | p. 99 |
| Detecting Worms | p. 102 |
| Conclusion | p. 105 |
| Concepts in IP Security | p. 107 |
| The Need for Security | p. 108 |
| Choosing Where to Apply Security | p. 110 |
| Components of Security Models | p. 114 |
| IPsec | p. 118 |
| Transport-Layer Security | p. 125 |
| Securing the Hypertext Transfer Protocol | p. 132 |
| Hashing and Encryption: Algorithms and Keys | p. 133 |
| Exchanging Keys | p. 140 |
| Further Reading | p. 146 |
| IP Security in Practice | p. 149 |
| IP Security Issues | p. 150 |
| Security Goals | p. 152 |
| Encryption and Authentication Algorithms | p. 155 |
| IPsec: The Protocols | p. 160 |
| IP and IPsec | p. 162 |
| Implementing and Deploying IPsec | p. 172 |
| Conclusion | p. 173 |
| Security in Wireless Systems | p. 175 |
| Introduction | p. 175 |
| Security and Privacy Needs of a Wireless System | p. 177 |
| Required Features for a Secured Wireless Communications System | p. 185 |
| Methods of Providing Privacy and Security in Wireless Systems | p. 185 |
| Wireless Security and Standards | p. 187 |
| IEEE 802.11 Security | p. 187 |
| Security in North American Cellular/PCS Systems | p. 189 |
| Security in GSM, GPRS, and UMTS | p. 193 |
| Data Security | p. 198 |
| Air Interface Support for Authentication Methods | p. 206 |
| Summary of Security in Current Wireless Systems | p. 207 |
| Conclusion | p. 210 |
| References | p. 210 |
| Mobile Security and Privacy | p. 211 |
| Security Primer | p. 212 |
| Cellular Network Security | p. 231 |
| Wireless LAN Security | p. 237 |
| Bluetooth Security | p. 245 |
| Ad Hoc Network Security | p. 248 |
| Mobile Privacy | p. 253 |
| Conclusion | p. 258 |
| Further Reading | p. 259 |
| References | p. 260 |
| Optical Network Survivability | p. 263 |
| Basic Concepts | p. 265 |
| Protection in SONET/SDH | p. 269 |
| Protection in IP Networks | p. 282 |
| Why Optical Layer Protection | p. 283 |
| Optical Layer Protection Schemes | p. 291 |
| Interworking between Layers | p. 304 |
| Conclusion | p. 305 |
| Further Reading | p. 306 |
| References | p. 306 |
| Intrusion Response Systems: A Survey | p. 309 |
| Introduction | p. 309 |
| Static Decision-Making Systems | p. 312 |
| Dynamic Decision-Making Systems | p. 317 |
| Intrusion Tolerance through Diverse Replicas | p. 327 |
| Responses to Specific Kinds of Attacks | p. 331 |
| Benchmarking Intrusion Response Systems | p. 335 |
| Thoughts on Evolution of IRS Technology | p. 338 |
| Conclusion | p. 339 |
| References | p. 340 |
| Index | p. 343 |
| Table of Contents provided by Ingram. All Rights Reserved. |