“A Maze of Twisty, Turney Passages” – Security in the Internet Swamp (and other adventures)Introduction and OverviewJan 14, 2019 1“When you are up to your ass in alligators, it is wiseto remember you are there to drain the swamp.”- R.M. Nixon“A Maze of Twisty, Turney Passages” – Security inthe Internet Swamp(and other adventures)David L. MillsUniversity of Delawarehttp://www.eecis.udel.edu/[email protected] 14, 2019 2Introduction and OverviewSecurity architectures, protocols and algorithms: beyond IPSEC, –Cryptographic techniques for ubiquitous distributed services–System-high, multi-level and intersecting group architecture–Zero-knowledge Identity schemes Finding the terrorists, elephants and mice–Traceback: practical and impractical techniques–Traffic analysis; sampling techniquesResisting attacks–Disclosure: inadvertent and otherwise–Middleman: message modification and/or replay–Clogging, flooding, clogging and denial of service–Multicast and wireless issues–Protocol vulnerabilities: stack, SYN-flood and crypto vulnerabilitiesNext generation Internet security: DNS, NTP, BGP,
View Full Document