Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
Network and internetwork security: principles and practiceJanuary 1995
Publisher:
  • Prentice-Hall, Inc.
  • Division of Simon and Schuster One Lake Street Upper Saddle River, NJ
  • United States
ISBN:978-0-02-415483-5
Published:10 January 1995
Pages:
462
Skip Bibliometrics Section
Reflects downloads up to 26 Sep 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Al-Bastaki Y, Herath A, Al-Mutawah K, Baqer M, Herath S and Goonatilake R e-learning of security and information assurance with sequence diagrams Proceedings of the 2012 Joint International Conference on Human-Centered Computer Environments, (19-22)
  2. Benali F, Bennani N, Gianini G and Cimato S A distributed and privacy-preserving method for network intrusion detection Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II, (861-875)
  3. Buford J, Yu H and Lua E (2008). P2P Networking and Applications, 10.5555/1523319, Online publication date: 12-Dec-2008.
  4. Koukopoulos D, Nikolopoulos S, Palios L and Spirakis P Optimal algorithms for detecting network stability Proceedings of the 2nd international conference on Algorithms and computation, (188-199)
  5. ACM
    Maddi S and Srinivas M A unified and reconfigurable Montgomery Multiplier architecture without four-to-two CSA Proceedings of the 20th annual conference on Integrated circuits and systems design, (147-152)
  6. Kim Y, Choi S, Lee G and Lee G Entity Based Message Authentication System Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, (948-955)
  7. Ciaramella A, D'Arco P, De Santis A, Galdi C and Tagliaferri R (2006). Neural Network Techniques for Proactive Password Checking, IEEE Transactions on Dependable and Secure Computing, 3:4, (327-339), Online publication date: 1-Oct-2006.
  8. Hämäläinen P, Kuorilehto M, Alho T, Hännikäinen M and Hämäläinen T Security in wireless sensor networks Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation, (167-177)
  9. Noh S, Kim J and Lee D Assurance method of high availability in information security infrastructure system Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks, (1110-1116)
  10. Elbirt A and Paar C (2005). An Instruction-Level Distributed Processor for Symmetric-Key Cryptography, IEEE Transactions on Parallel and Distributed Systems, 16:5, (468-480), Online publication date: 1-May-2005.
  11. Reifer D, Baxi P, Hirata F, Schifman J and Tsao R Addressing malicious code in COTS Proceedings of the 4th international conference on COTS-Based Software Systems, (157-167)
  12. van der Merwe A, Loock M and Dabrowski M Characteristics and responsibilities involved in a Phishing attack Proceedings of the 4th international symposium on Information and communication technologies, (249-254)
  13. C J and S V Distributed group access control architecture for secure multicast Proceedings of the Third international conference on Advances in Information Systems, (585-594)
  14. ACM
    Shaikh S Information security education in the UK Proceedings of the 1st annual conference on Information security curriculum development, (53-58)
  15. Tak S and Park E (2019). A Software Framework for Non-Repudiation Service based on Adaptive~Secure Methodology in Electronic Commerce, Information Systems Frontiers, 6:1, (47-66), Online publication date: 1-Mar-2004.
  16. Álvarez G and Petrović S (2019). Refereed paper, Computers and Security, 22:5, (435-449), Online publication date: 1-Jul-2003.
  17. Karras D and Zorkadis V (2019). On neural network techniques in the secure management of communication systems through improving and quality assessing pseudorandom stream generators, Neural Networks, 16:5-6, (899-905), Online publication date: 1-Jun-2003.
  18. Bhalla N (2003). Refereed Is the mouse click mighty enough to bring society to its knees?, Computers and Security, 22:4, (322-336), Online publication date: 1-May-2003.
  19. Brooks R and Orr N (2002). A Model for Mobile Code Using Interacting Automata, IEEE Transactions on Mobile Computing, 1:4, (313-326), Online publication date: 1-Oct-2002.
  20. Boukerche A and Notare M (2002). Behavior-based intrusion detection in mobile phone systems, Journal of Parallel and Distributed Computing, 62:9, (1476-1490), Online publication date: 1-Sep-2002.
  21. Ye N, Emran S, Chen Q and Vilbert S (2002). Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection, IEEE Transactions on Computers, 51:7, (810-820), Online publication date: 1-Jul-2002.
  22. Ye N (2019). QoS-Centric Stateful Resource Management in Information Systems, Information Systems Frontiers, 4:2, (149-160), Online publication date: 1-Jul-2002.
  23. Buchegger S and Le Boudec J Nodes bearing grudges Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing, (403-410)
  24. ACM
    Patiyoot D (2002). Security issues for wireless ATM networks, ACM SIGOPS Operating Systems Review, 36:1, (31-57), Online publication date: 1-Jan-2002.
  25. Chang K, Lee B and Kim T (2019). Open Authentication Model Supporting Electronic Commerce in Distributed Computing, Electronic Commerce Research, 2:1-2, (135-149), Online publication date: 1-Jan-2002.
  26. ACM
    Yi S, Naldurg P and Kravets R Security-aware ad hoc routing for wireless networks Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (299-302)
  27. ACM
    Alsinet T, Béjar R, Fernanadez C and Manyà F A Multi-agent system architecture for monitoring medical protocols Proceedings of the fourth international conference on Autonomous agents, (499-505)
  28. Prevelakis V A secure station for network monitoring and control Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (10-10)
  29. ACM
    de Vivo M, de Vivo G and Isern G (1998). Internet security attacks at the basic levels, ACM SIGOPS Operating Systems Review, 32:2, (4-15), Online publication date: 1-Apr-1998.
  30. Valia R and Al-Salqan Y Secure Workflow Environment Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, (269-276)
Contributors
  • The U.S. Military Academy at West Point

Reviews

James P. Anderson

Stallings covers the basics of network and Internet security by illuminating the issues and the technical responses to problems of network security. The book has ten chapters in two parts: “Internetwork Security Principles” and “Internetwork Security Practice.” In spite of the word “internetwork” in the part titles, the book is principally about cryptography and its applications. The first chapter is an overview, which deals with the characteristics of networks and internetworks that require protection. There follows an extensive discussion of attacks, security services, and security mechanisms, which sets the stage for the balance of the book. Chapter 2, “Conventional Encryption,” deals with conventional (symmetric) single-key encryption, including the Data Encryption Standard (DES) in its various modes. The DES discussion is thorough, although the discussion of differential cryptanalysis is not as informative as it might have been. Chapter 3, “Confidentiality Using Conventional Encryption,” starts with a discussion of the placement of the encryption functions. An extended section on key distribution as a fundamental problem in any kind of cryptographic application follows. Chapter 4, “Public Key Encryption,” covers the principles of public key cryptosystems, including the Knapsack problem and the RSA algorithm. It includes a thorough discussion of key management issues. The chapter has two appendices, “An Introduction to Number Theory” and “The Complexity of Algorithms.” Chapter 5, “Authentication and Digital Signatures,” covers the requirements for each, and includes sections on cryptographic checksums, hash functions, digital signatures, and authentication protocols. The final chapter of Part 1, “Intruders, Viruses and Worms,” deals with various kinds of network attacks. This is where trusted systems enter the picture (much too late for my taste). Part 2 has four chapters. The first chapter of this section, “Cryptographic Algorithms,” covers the MD5 message digest algorithm, the secure hash algorithm, IDEA, SKIPJACK, and the LUC public key algorithm. Chapter 8, “Authentication and Key Exchange,” includes an extended discussion of Kerberos, X. 509 Directory Authentication Service, the Diffie-Hellman key exchange, and the Digital Signature Standard. Three appendices cover Kerberos encryption techniques, discrete logarithms, and a proof of the DSS algorithm. Chapter 9, “Electronic Mail Security,” presents two possibly competing approaches to the problem, PGP and PEM. The three appendices, covering data compression using Zip, Radix-64 compression, and PGP's random number generation scheme, are only partially or tangentially related to the chapter's main topics. The final chapter, “Network Management Security,” includes sections on the Simple Network Management Protocol (SNMP), the SNMPv1 community facility, and the SNMPv2 security facility. The balance of the book contains a glossary, a list of standards and specifications used, an extensive set of references, and an index. Each chapter (except the first) includes problems. No answers are provided, but as most of them are essay questions, it is not clear that answers are required. The chapters are well illustrated with diagrams and tables that summarize the key points. The part of the book I enjoyed most was the appendices. The author does a good job of showing the mathematical basis for most of modern cryptography. He writes clearly and provides enough detail for anyone interested in the problems to follow. While a few of the juxtapositions are not intuitive, overall the book reads easily and well. It appears to be well suited for an undergraduate or first-year graduate course in network security. The chapter appendices explaining the relevant math help those of us who are not number theorists understand what is going on. Because of all of the detail provided, the book is eminently suited for self-study. The book, although not designed as such, is a convenient quick reference to the more important technical components of modern network security. I recommend it unreservedly to anyone in the computer or network security field. No matter how much you think you know, you will learn something of value from this book.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations