1st Edition

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

By R.R. Brooks Copyright 2004
    396 Pages 186 B/W Illustrations
    by CRC Press

    The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities exploited by viruses and worms.

    Disruptive Security Technologies With Mobile Code and Peer-To-Peer Networks provides a foundation for developing these adaptive systems by describing the design principles and the fundamentals of a new security paradigm embracing disruptive technologies. In order to provide a thorough grounding, the author covers such topics as mobile code, robust peer-to-peer networks, the multi-fractal model of network flow, security automata, dependability, quality of service, mobile code paradigms, code obfuscation, and distributed adaptation techniques as part of system security.

    Adaptive systems allow network designers to gain equal footing with attackers. This complete guide combines a large body of literature into a single volume that is concise and up to date. With this book, computer scientists, programmers, and electrical engineers, as well as students studying network design will dramatically enhance their systems' ability to overcome potential security threats.

    OVERVIEW
    NETWORK SECURITY PROBLEMS
    Vulnerabilities
    Attacks
    Threat Modeling
    Physical Security
    Social Engineering
    Privacy
    Fraud
    Scavenging
    Trojan Horses
    Trapdoors
    Viruses
    Worms
    Reverse Engineering
    Covert Communications Channels and Inferencing
    Buffer Overflow and Stack Smashing
    Denial of Service (DoS)
    Distributed Denial of Service (DDoS)
    Man in the Middle Attacks
    Replay Attacks
    Cryptanalysis
    DNS and BGP Vulnerabilities
    Exercises
    CURRENT SECURITY SOLUTIONS
    Audits
    Encryption
    Steganography
    Obfuscation
    Public Key Infrastructure (PKI)
    Code Signing
    SSH, SSL, and TLS
    Formal Methods
    Virus Scanners
    Attack Graphs
    Security Automata
    Sandboxing
    Firewalls
    Red-Black Separation
    Proof Carrying Code
    Secure Hardware
    Dependability, Safety, Liveness
    Quality of Service
    Artificial Immune Systems
    Exercises
    DISRUPTIVE TECHNOLOGIES
    Mobile Code
    Peer-To-Peer Networks
    Field Programmable Gate Arrays (FPGA's)
    Adaptation
    Conclusion
    Exercises
    UNDERSTANDING NETWORKS
    Internet Protocol Background
    Networks of Embedded Control Systems
    Network Topology
    Scale-Free Graphs
    Traffic Flows
    Conclusion
    Exercises
    UNDERSTANDING MOBILE CODE
    Existing Paradigms
    Existing Implementations
    Theoretical Model
    Simulator for Model
    Models of Paradigms
    Simulation Studies of Models
    Models of Networking Pathologies
    Simulation Studies of Pathologies
    Comparison of Cantor with Other Network Simulations
    Taxonomies of Mobile Code and Security
    Mobile Code Daemon Implementation
    Conclusion
    Exercises
    PROTECTING MOBILE CODE
    Control Flow Modification
    Bytecode Modification
    Protocol for Exchanging Bytecode Tables
    Entropy Maximization of Bytecode Mappings
    Bytecode Steganography
    Use of Secure Co-Processors
    Conclusion
    Exercises
    PROTECTING MOBILE CODE PLATFORMS
    Smart Card Applications
    Building Control Systems
    FPGA Cryptography Engine
    Differential Power Analysis
    Conclusion
    Exercises
    MAINTAINING TRUST ON THE NETWORK
    Assumptions and Primitives
    Mobile Code Verification
    Host Verification
    Multi-Level Security
    Conclusion
    Exercises
    DESIGNING PEER-TO-PEER SYSTEMS
    Graph Theory Background
    Random Graph Background
    Number of Hops Between Nodes
    Dependability of Peer-To-Peer Systems
    Vulnerability to Attack
    Quality of Service of Peer-To-Peer Systems
    Correct Number of Indexes
    Key Management
    Conclusion
    Exercises
    EMERGENT ROUTING AND RESOURCE DISCOVERY
    Ad Hoc Data Routing Background
    Spin-Glass Routing
    Multi-Fractal Routing
    Pheromone Routing
    Comparison of Routing Algorithms
    Epidemic Resource Discovery
    Conclusion
    Exercises
    DENIAL OF SERVICE COUNTERMEASURES
    Denial of Service (DoS) Background
    Traffic Flow Measures
    Attack Detection
    Verification of Detector
    Game Theory Analysis
    Network Structure Vulnerabilities
    Conclusion
    Exercises
    CONCLUSIONS
    INDEX

    Biography

    R.R. Brooks