![]() Based on these vulnerabilities, taxonomy of possible attacks and their consequences are discussed. The results obtained indicated that all these protocols were vulnerable. Since probe signals are normally employed during the reconnaissance phase of an attack, this paper was mainly limited to this phase of an attack methodology. As such, this paper sought to practically analyze the security of communication protocols, including TCP, UDP, ICMP, ARP, DNS and IP. May be the biggest gap in protocol analysis is that majority of the current methods are majorly theoretical in nature, which is not enough and a practical approach is needed. As such, disregarding the timing concepts such as timestamps and timeouts in protocol modeling result in faulty and incorrect model verification results. This is risky as protocols frequently utilize time for improving the security. Moreover, majority of protocol security analysis abstract away time during the modeling process to minimize the state space in order to avoid state space explosion problem. This can be attributed to program language flaws that cause the gap between theoretical level protocol security analysis and the source code level security analysis of the protocol implementations. Nevertheless, neither of these two models can guarantee the security of protocol implementations. To curb this, model extraction and code generation have been developed for protocol security analysis. In addition, protocols such as SSL and TLS may have leaks in the process of their implementations caused by design imperfection, making protocol implementations insecure. Consequently, although protocols may be proved theoretically to be secure, a number of factors such as the language characteristics of the protocols' source codes or the operating environments of the protocol implementations arise when implementing them at the source code level, rendering the protocol insecure. guaranteeing the security of protocols during their implementations. Unfortunately, security validation methods such as formal method, computational model, and computational soundness are deficient in. To validate the security features provided by these protocols, they need to be analyzed from a security perspective. Security protocols such as secure socket layer (SSL) or transport layer security (TLS) are employed to protect the network information from attacks. Le lecteur y trouvera en outre la trame d'un drame sentimental liant trois héros de la cryptographie (Alice, Bob et Estelle) et une analyse de certains problèmes politique liés à la sécurité d'Internet. Son ensuite traités les formats cryptographiques (PKCS, CMS, format et transfert des certificats X509, S/MIME), les protocoles de gestion des clefs (Infrastructure à Clefs Publiques, KERBEROS, ISAKMP/IKE), les protocoles en ligne (CHAP/Radius, IPSec, SSL/TLS, SET) et la protection dans un certain nombre de systèmes (DCE, Windows NT/2000, Corba) et sur l'Internet (Java, HTTP et les pare-feu). La seconde partie commence par une analyse des vulnérabilités des ressources propre de l'Internet (DNS, routage) et présente l'architecture des protocoles de sécurité. La première partie couvre la sécurité des systèmes d'information, la cryptographie, les protocoles de sécurité et la protection. ![]() La première explique les concepts généraux et la seconde leur mise en uvre dans les systèmes et réseaux actuels. Par contre, après lecture du présent ouvrage, nous espérons quil comprendra mieux lusage et la limite de ces outils. Il existe déjà dexcellents ouvrages sur le sujet. Le lecteur y trouvera peu de " trucs ", dingénierie de la sécurité et pas de mode demploi des produits commerciaux. Il a pour principal objectif de faire comprendre la nature scientifique et technique des problèmes posés, les principes et les limites des solutions qui peuvent être utilisées, leurs impacts sociaux et économiques. Ce livre traite des techniques de la sécurité informatique, au sens de la protection contre les agressions et plus particulièrement des protocoles de sécurité utilisés sur le réseau Internet et ceux utilisant la même technologie (Intranet). ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |