1. Trang chủ
  2. » Công Nghệ Thông Tin

Handbook of information and communication security: Part 1

409 42 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 409
Dung lượng 8,24 MB

Nội dung

(BQ) The Handbook of information and communication security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. The book is divided into 2 parts, part 1 from chapter 1 to chapter 20.

Handbook of Information and Communication Security Peter Stavroulakis · Mark Stamp (Editors) Handbook of Information and Communication Security 123 Editors Prof Peter Stavroulakis Technical University of Crete 73132 Chania, Crete Greece pete_tsi@yahoo.gr Prof Mark Stamp Dept Computer Science San Jose State University One Washington Square San Jose, CA 95192 USA stamp@cs.sjsu.edu ISBN 978-3-642-04116-7 e-ISBN 978-3-642-04117-4 DOI 10.1007/978-1-84882-684-7 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2009943513 © Springer-Verlag Berlin Heidelberg 2010 This work is subject to copyright All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer Violations are liable to prosecution under the German Copyright Law The use of general descriptive names, registered names, trademarks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use Cover illustration: Teodoro Cipresso Cover design: WMXDesign, Heidelberg Typesetting and production: le-tex publishing services GmbH, Leipzig, Germany Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Preface At its core, information security deals with the secure and accurate transfer of information While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue The Y2K scare was the fear that computer networks and the systems that are controlled or operated by software would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work cooperatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment The terrorist attacks of 11 September 2001 raised security concerns to a new level The international community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about potential terrorists As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communications conference (for example, Globecom and ICC) has organized workshops and sessions on security issues In addition, the IEEE has created a technical committee on Communication and Information Security The first editor was intimately involved with security for the Athens Olympic Games of 2004 These games provided a testing ground for much of the existing security technology One lesson learned from these games was that security-related technology often cannot be used effectively without violating the legal framework This problem is discussed – in the context of the Athens Olympics – in the final chapter of this handbook In this handbook, we have attempted to emphasize the interplay between communications and the field of information security Arguably, this is the first time in the security literature that this duality has been recognized in such an integral and explicit manner It is important to realize that information security is a large topic – far too large to cover exhaustively within a single volume Consequently, we cannot claim to provide a complete view of the subject Instead, we have chosen to include several surveys of some of the most important, interesting, and timely topics, along with a significant number of research-oriented papers Many of the research papers are very much on the cutting edge of the field Specifically, this handbook covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues The editors’ intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics v vi Preface Finally, we believe this handbook will be useful to researchers and graduate students in academia, as well as being an invaluable resource for university instructors who are searching for new material to cover in their security courses In addition, the topics in this volume are highly relevant to the real world practice of information security, which should make this book a valuable resource for working IT professionals In short, we believe that this handbook will be a valuable resource for a diverse audience for many years to come Mark Stamp Peter Stavroulakis San Jose Chania Contents Part A Fundamentals and Cryptography A Framework for System Security Clark Thomborson 1.1 Introduction 1.2 Applications 1.3 Dynamic, Collaborative, and Future Secure Systems References The Author Public-Key Cryptography Jonathan Katz 2.1 Overview 2.2 Public-Key Encryption: Definitions 2.3 Hybrid Encryption 2.4 Examples of Public-Key Encryption Schemes 2.5 Digital Signature Schemes: Definitions 2.6 The Hash-and-Sign Paradigm 2.7 RSA-Based Signature Schemes 2.8 References and Further Reading References The Author Elliptic Curve Cryptography David Jao 3.1 Motivation 3.2 Definitions 3.3 Implementation Issues 3.4 ECC Protocols 3.5 Pairing-Based Cryptography 3.6 Properties of Pairings 3.7 Implementations of Pairings 3.8 Pairing-Friendly Curves 3.9 Further Reading References The Author 3 13 18 19 20 21 21 23 26 27 30 31 32 33 33 34 35 35 36 39 41 44 46 48 54 55 55 57 vii viii Contents Cryptographic Hash Functions Praveen Gauravaram and Lars R Knudsen 4.1 Notation and Definitions 4.2 Iterated Hash Functions 4.3 Compression Functions of Hash Functions 4.4 Attacks on Hash Functions 4.5 Other Hash Function Modes 4.6 Indifferentiability Analysis of Hash Functions 4.7 Applications 4.8 Message Authentication Codes 4.9 SHA-3 Hash Function Competition References The Authors Block Cipher Cryptanalysis Christopher Swenson 5.1 Breaking Ciphers 5.2 Differential Cryptanalysis 5.3 Conclusions and Further Reading References The Author Chaos-Based Information Security Jerzy Pejaś and Adrian Skrobek 6.1 Chaos Versus Cryptography 6.2 Paradigms to Design Chaos-Based Cryptosystems 6.3 Analog Chaos-Based Cryptosystems 6.4 Digital Chaos-Based Cryptosystems 6.5 Introduction to Chaos Theory 6.6 Chaos-Based Stream Ciphers 6.7 Chaos-Based Block Ciphers 6.8 Conclusions and Further Reading References The Authors Bio-Cryptography Kai Xi and Jiankun Hu 7.1 Cryptography 7.2 Overview of Biometrics 7.3 Bio-Cryptography 7.4 Conclusions References The Authors Quantum Cryptography Christian Monyk 8.1 Introduction 8.2 Development of QKD 8.3 Limitations for QKD 8.4 QKD-Network Concepts 8.5 Application of QKD 59 60 61 62 64 66 68 69 70 73 73 79 81 81 85 88 89 89 91 92 93 94 97 100 103 113 123 124 128 129 129 138 145 154 155 157 159 159 160 164 165 168 Contents ix 8.6 Towards ‘Quantum-Standards’ 8.7 Aspects for Commercial Application 8.8 Next Steps for Practical Application References The Author 170 171 173 174 174 Part B Intrusion Detection and Access Control 10 11 12 13 Intrusion Detection and Prevention Systems Karen Scarfone and Peter Mell 9.1 Fundamental Concepts 9.2 Types of IDPS Technologies 9.3 Using and Integrating Multiple IDPS Technologies References The Authors 177 Intrusion Detection Systems Bazara I A Barry and H Anthony Chan 10.1 Intrusion Detection Implementation Approaches 10.2 Intrusion Detection System Testing 10.3 Intrusion Detection System Evaluation 10.4 Summary References The Authors 193 Intranet Security via Firewalls Inderjeet Pabla, Ibrahim Khalil, and Jiankun Hu 11.1 Policy Conflicts 11.2 Challenges of Firewall Provisioning 11.3 Background: Policy Conflict Detection 11.4 Firewall Levels 11.5 Firewall Dependence 11.6 A New Architecture for Conflict-Free Provisioning 11.7 Message Flow of the System 11.8 Conclusion References The Authors 177 182 190 191 192 193 196 201 203 204 205 207 207 209 210 213 213 213 216 217 218 218 Distributed Port Scan Detection Himanshu Singh and Robert Chun 12.1 Overview 12.2 Background 12.3 Motivation 12.4 Approach 12.5 Results 12.6 Conclusion References The Authors 221 Host-Based Anomaly Intrusion Detection Jiankun Hu 13.1 Background Material 235 221 222 223 225 230 231 233 234 236 x 14 15 16 17 Contents 13.2 Intrusion Detection System 13.3 Related Work on HMM-Based Anomaly Intrusion Detection 13.4 Emerging HIDS Architectures 13.5 Conclusions References The Author 239 245 250 254 254 255 Security in Relational Databases Neerja Bhatnagar 14.1 Relational Database Basics 14.2 Classical Database Security 14.3 Modern Database Security 14.4 Database Auditing Practices 14.5 Future Directions in Database Security 14.6 Conclusion References The Author 257 258 260 263 269 270 270 271 272 Anti-bot Strategies Based on Human Interactive Proofs Alessandro Basso and Francesco Bergadano 15.1 Automated Tools 15.2 Human Interactive Proof 15.3 Text-Based HIPs 15.4 Audio-Based HIPs 15.5 Image-Based HIPs 15.6 Usability and Accessibility 15.7 Conclusion References The Authors 273 Access and Usage Control in Grid Systems Maurizio Colombo, Aliaksandr Lazouski, Fabio Martinelli, and Paolo Mori 16.1 Background to the Grid 16.2 Standard Globus Security Support 16.3 Access Control for the Grid 16.4 Usage Control Model 16.5 Sandhu’s Approach for Collaborative Computing Systems 16.6 GridTrust Approach for Computational Services 16.7 Conclusion References The Authors 293 ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17.1 Background of ECG 17.2 What Can ECG Based Biometrics Be Used for? 17.3 Classification of ECG Based Biometric Techniques 17.4 Comparison of Existing ECG Based Biometric Systems 17.5 Implementation of an ECG Biometric 17.6 Open Issues of ECG Based Biometrics Applications 17.7 Security Issues for ECG Based Biometric 273 275 276 278 279 288 289 289 291 293 294 295 300 302 303 305 306 307 309 310 313 313 316 318 323 327 ... Application of QKD 59 60 61 62 64 66 68 69 70 73 73 79 81 81 85 88 89 89 91 92 93 94 97 10 0 10 3 11 3 12 3 12 4 12 8 12 9 12 9 13 8 14 5 15 4 15 5 15 7 15 9 15 9 16 0 16 4... 17 7 18 2 19 0 19 1 19 2 19 3 19 6 2 01 203 204 205 207 207 209 210 213 213 213 216 217 218 218 Distributed Port Scan Detection Himanshu Singh and Robert... 17 0 17 1 17 3 17 4 17 4 Part B Intrusion Detection and Access Control 10 11 12 13 Intrusion Detection and Prevention Systems Karen Scarfone and Peter Mell 9 .1 Fundamental

Ngày đăng: 30/01/2020, 13:13

TỪ KHÓA LIÊN QUAN