Abstract
Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource modifications. The protecting ARP which relies on hosts caching reply messages can be the primary method in obstructing the misuse of the network. This paper proposes a network service access control framework, which provides a comprehensive, host-by-host perspective on IP (Internet Protocol) over Ethernet networks security. We will also show how this framework can be applied to network elements including detecting, correcting, and preventing security vulnerabilities.
Chapter PDF
Similar content being viewed by others
Keywords
- Transmission Control Protocol
- Network Security
- Network Survivability
- Unauthorized Access
- Address Resolution Protocol
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bruschi, D., Ornaghi, A., et al.: S-ARP: a Secure Address Resolution Protocol. In: Omondi, A.R., Sedukhin, S.G. (eds.) ACSAC 2003. LNCS, vol. 2823, pp. 66–74. Springer, Heidelberg (2003)
McGee, W.R., Vasireddy, S.R., et al.: A Framework for Ensuring Network Security. Bell Labs Technical Journal 8, 7–27 (2004)
Chakrabarti, A., Manimaran, G.: Internet Infrastructure Security: A Taxonomy. IEEE Network, 13–21 (November/December 2002)
kim, S., Choi, Y., et al.: Study of Security Management System Based on Client Server Model. ICC 2, 1403–1408 (1999)
Templeton, S.J., Levitt, K.E.: Detecting Spoofed Packets. In: DISCEX 2003, vol. 1, pp. 164–175 (2003)
McDonald, B., Znati, T., et al.: Comparative Analysis of Neighbor Greeting Protocols: ARP versus ES-IS. In: SIMULATION 1996, pp. 71–80 (April 1996)
Lin, P., Lin, L.: Security in Enterprise Networking: A Quick Tour. IEEE Communications Magazine, 56–61 (January 1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kim, H., Kim, S., Ahn, S., Chung, J. (2004). A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds) Network and Parallel Computing. NPC 2004. Lecture Notes in Computer Science, vol 3222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30141-7_93
Download citation
DOI: https://doi.org/10.1007/978-3-540-30141-7_93
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23388-6
Online ISBN: 978-3-540-30141-7
eBook Packages: Springer Book Archive