1.1. Security Trends
In 1994, the Internet Architecture Board (IAB) issued a report
entitled "Security in the Internet Architecture" (RFC 1636). The report stated
the general consensus that the Internet needs more and better security, and it
identified key areas for security mechanisms. Among these were the need to
secure the network infrastructure from unauthorized
monitoring and control of network traffic and the need to secure
end-user-to-end-user traffic using authentication and encryption mechanisms.
These concerns are fully justified. As confirmation, consider
the trends reported by the Computer Emergency Response Team (CERT) Coordination
Center (CERT/CC). Internet-related vulnerabilities reported to CERT over a 10-year
period. These include security weaknesses in the operating systems of attached
computers (e.g., Windows, Linux) as well as vulnerabilities in Internet routers
and other network devices. shows the number of security-related incidents reported to CERT. These include
denial of service attacks; IP spoofing, in which intruders create packets with
false IP addresses and exploit applications that use authentication based on IP;
and various forms of eavesdropping and packet sniffing, in which attackers read
transmitted information, including logon information and database contents.
This increase in attacks coincides with an increased use of the
Internet and with increases in the complexity of protocols, applications, and
the Internet itself. Critical infrastructures increasingly rely on the Internet
for operations. Individual users rely on the security of the Internet, email,
the Web, and Web-based applications to a greater extent than ever. Thus, a wide
range of technologies and tools are needed to counter the growing threat. At a
basic level, cryptographic algorithms for confidentiality and authentication
assume greater importance. As well, designers need to focus on Internet-based
protocols and the vulnerabilities of attached operating systems and
applications. This book surveys all of these technical areas.
No comments:
Post a Comment