Network built-in security services A comparison of TCP/IP security and ATM security

نویسنده

  • Herbert Leitold
چکیده

Telecommunication increasingly influences the way we live, work, and socialize. Buzzword such as the Internet or broadband networking are omnipresent—so are reports of security breaches. Consequently, security services are indispensable to applications as divers as electronic commerce, linking company networks, telemedicine, and so forth. Whereas application built-in security is widely spread, such as the integration of cryptographic functions into email clients or Web browsers, the diversity of applications carried over public networks strives for concepts that view upon security as an integral part of the network protocol stack. In this paper, we present two standards that enable network built-in security services: On the one hand, Internet protocol (IP) security is discussed. On the other hand, security services in asynchronous transfer mode (ATM) networks is addressed. The key concepts of both approaches are sketched and—although IP and ATM significantly differ—common aspects of IP security and ATM security are described.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Selecting an ATM or IP Security Solution to Secure an IP over ATM Virtual Private Network

In 1999, the ATM Forum international consortium approved the first version of its ATM security specifications, whereas the Internet Engineering Task Force (IETF) published a series of IP security RFC. The aim of those documents is to protect communications over Asynchronous Transfer Mode (ATM) network, respectively the Internet Protocol (IP) network by offering data confidentiality, partners au...

متن کامل

Securing Classical IP Over ATM Networks

This paper discusses some security issues of `Classical IP over ATM' networks. After analyzing new threats to IP networks based on ATM, security mechanisms to protect these networks are introduced. The integration of rewalls into ATM networks requires additional considerations. We conclude that careful con guration of ATM switches and ATM services can provide some level of protection against sp...

متن کامل

Modeling TCP/IP Networks Topology for Network Vulnerability Analysis Modeling TCP/IP Networks Topology for Network Vulnerability Analysis

The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...

متن کامل

Practical Data Hiding in TCP/IP

This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks employing TCP/IP. Two approaches are proposed based on packet header manipulation and packet ordering within the IPSec framework. For the former the Internet protocol IPv4 header is analyzed to identify covert channels by exploiting redundancy and multiple interpretat...

متن کامل

Evaluating Multipath TCP Resilience against Link Failures

Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs poorly due to intermittent node connectivity. This requires the re-establishment of connections as the IP addresses change. Multi-path TCP (MPTCP) has emerged to utilize multiple ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000