Application-Layer Security Protocols for Networks
نویسنده
چکیده
WE ARE NOT IN KANSAS ANYMORE The incredible growth of Internet usage has shifted routine business transactions from fax machine and telephones to e-mail and E-commerce. This shift can be attributed in part to the economical worldwide connectivity of the Internet, but also to the Internet capacity for more sophisticated types of transactions. Security professionals must understand the issues and risks associated with these transactions if they want to provide viable and scalable security solutions for Internet commerce. Presence on the Internet makes it possible to conduct international, multiple-party, and multiple-site transactions, regardless of time or language differences. This level of connectivity has, however, created a serious security dilemma for commercial enterprises. How can a company maintain transactional compatibility with thousands of different systems and still ensure the confidentiality of those transactions? Security measures once deemed suitable for text-based messaging and file transfers seem wholly inadequate for sophisticated multimedia and E-commerce transfers. Given the complexity of these transactions, even standardized security protocols like IPsec are proving inadequate. This article covers three areas that are of particular concern: electronic messag ing , Wor ld Wide Web (WWW) transactions, and monetary exchanges. All are subject to potential risk of significant financial losses P A Y O F F I D E A
منابع مشابه
Detecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملImpact of Application Layer over Wireless Sensor Networks
Applications over Wireless Sensor Networks (WSNs) are various and different. Many routing protocols have been proposed for WSNs since a many years. Medium Access Control (MAC) protocols can differ from a network to another. The transmission range can also be variable from a sensor to another depending on their battery capacities. All these various protocols have an influence on the WSNs. It is ...
متن کاملTunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting
Application-layer tunnels nowadays represent a significant security threat for any network protected by firewalls and Application Layer Gateways. The encapsulation of protocols subject to security policies such as peer-to-peer, e-mail, chat and others into protocols that are deemed as safe or necessary, such as HTTP, SSH or even DNS, can bypass any network-boundary security policy, even those b...
متن کاملFormal analysis of card-based payment systems in mobile devices
To provide card holder authentication while they are conducting an electronic transaction using mobile devices, VISA and MasterCard independently proposed two electronic payment protocols: Visa 3D Secure and MasterCard Secure Code. The protocols use pre-registered passwords to provide card holder authentication and Secure Socket Layer/ Transport Layer Security (SSL/TLS) for data confidentiality...
متن کاملTransport Layer and Security Protocols for Ad Hoc Wireless Networks
The objectives of a transport layer protocol include the setting up of an end-to-end connection, end-to-end delivery of data packets, flow control, and congestion control. There exist simple, unreliable, and connection-less transport layer protocols such as UDP, and reliable, byte-stream-based, and connection-oriented transport layer protocols such as TCP for wired networks. These traditional w...
متن کاملTransport Layer and Security Protocols for Ad Hoc Wireless Networks
The objectives of a transport layer protocol include the setting up of an end-to-end connection, end-to-end delivery of data packets, flow control, and congestion control. There exist simple, unreliable, and connection-less transport layer protocols such as UDP, and reliable, byte-stream-based, and connection-oriented transport layer protocols such as TCP for wired networks. These traditional w...
متن کامل