Unformatted text preview:

“A Maze of Twisty, Turney Passages” – Security in the Internet Swamp (and other adventures)Introduction and OverviewJan 14, 2019 1“When you are up to your ass in alligators, it is wiseto remember you are there to drain the swamp.”- R.M. Nixon“A Maze of Twisty, Turney Passages” – Security inthe Internet Swamp(and other adventures)David L. MillsUniversity of Delawarehttp://www.eecis.udel.edu/[email protected] 14, 2019 2Introduction and OverviewSecurity architectures, protocols and algorithms: beyond IPSEC, –Cryptographic techniques for ubiquitous distributed services–System-high, multi-level and intersecting group architecture–Zero-knowledge Identity schemes Finding the terrorists, elephants and mice–Traceback: practical and impractical techniques–Traffic analysis; sampling techniquesResisting attacks–Disclosure: inadvertent and otherwise–Middleman: message modification and/or replay–Clogging, flooding, clogging and denial of service–Multicast and wireless issues–Protocol vulnerabilities: stack, SYN-flood and crypto vulnerabilitiesNext generation Internet security: DNS, NTP, BGP,


View Full Document

UD ELEG 867 - Security in the Internet Swamp

Documents in this Course
Firewalls

Firewalls

53 pages

Load more
Download Security in the Internet Swamp
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Security in the Internet Swamp and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Security in the Internet Swamp 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?