A Systematic Mapping of Security Mechanisms

A Systematic Mapping of Security Mechanisms

Gayathri RajaKumaran (VIT University, India) and NeelaNarayanan Venkataraman (VIT University, India)
DOI: 10.4018/978-1-5225-0193-0.ch013
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

In the Internet Era, millions of computer systems are connected to the Internet and the number is increasing infinitely. Maintaining proper Control and configuration for all such networked systems has proved to be impossible. This loophole makes the Internet systems vulnerable to various type of attacks. The objective of this research is to systematically identify a wide list of attacks in transport, session and application layers (Host layers). 148 effective controls are identified for the security attacks in addition to the 113 standard controls. The identified controls are analyzed in order to map and categorize them to the corresponding security layers wise.
Chapter Preview
Top

Internet Infrastructure Attacks

Attacks on the Internet infrastructure can lead to more destruction because different components have implicit relationship with each other. To provide solution for these attacks, Internet infrastructure attacks are broadly classified into the below four categories (Gayathri & Neelanarayanan, 2013):

  • DNS Hacking,

  • Route table poisoning,

  • Packet mistreatment,

  • Denial of Service.

The attacks are classified according to the above major category. Few of the attacks are listed below:

  • Interruption,

  • Modification,

  • Fabrication,

  • Replication,

  • Link state,

  • Distance vector,

  • Interruption.

The impact caused only by the major attacks and general solution measures are tabulated. In this survey, all possible solutions are not provided related to the real time scenario. The attacks considered are restricted to types of DDoS, packet mistreating and link state attacks. The vulnerabilities caused by each attacks and its corresponding impact are not considered.

Present data security (Chakrabarthi & Manimaran, 2002) measures ensure confidentiality and integrity of data. Various solutions and drawbacks are identified in this survey specific to the transport and network layers. Major components in this analysis process are:

Complete Chapter List

Search this Book:
Reset