To refer to this page use:
http://arks.princeton.edu/ark:/88435/pr14p2h
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zave, Pamela | - |
dc.contributor.author | Rexford, Jennifer | - |
dc.date.accessioned | 2021-10-08T19:51:20Z | - |
dc.date.available | 2021-10-08T19:51:20Z | - |
dc.date.issued | 2021 | en_US |
dc.identifier.citation | Zave, Pamela, and Jennifer Rexford. "Patterns and Interactions in Network Security." ACM Computing Surveys (CSUR) 53, no. 6 (2021): pp. 1-37. doi:10.1145/3417988 | en_US |
dc.identifier.issn | 0360-0300 | - |
dc.identifier.uri | https://arxiv.org/pdf/1912.13371.pdf | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/pr14p2h | - |
dc.description.abstract | Networks play a central role in cyber-security: networks deliver security attacks, suffer from them, defend against them, and sometimes even cause them. This article is a concise tutorial on the large subject of networks and security, written for all those interested in networking, whether their specialty is security or not. To achieve this goal, we derive our focus and organization from two perspectives. The first perspective is that, although mechanisms for network security are extremely diverse, they are all instances of a few patterns. Consequently, after a pragmatic classification of security attacks, the main sections of the tutorial cover the four patterns for providing network security, of which the familiar three are cryptographic protocols, packet filtering, and dynamic resource allocation. Although cryptographic protocols hide the data contents of packets, they cannot hide packet headers. When users need to hide packet headers from adversaries, which may include the network from which they are receiving service, they must resort to the pattern of compound sessions and overlays. The second perspective comes from the observation that security mechanisms interact in important ways, with each other and with other aspects of networking, so each pattern includes a discussion of its interactions. | en_US |
dc.format.extent | 1 - 37 | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartof | ACM Computing Surveys | en_US |
dc.rights | Author's manuscript | en_US |
dc.title | Patterns and Interactions in Network Security | en_US |
dc.type | Journal Article | en_US |
dc.identifier.doi | 10.1145/3417988 | - |
pu.type.symplectic | http://www.symplectic.co.uk/publications/atom-terms/1.0/journal-article | en_US |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
PatternsNetworkSecurity.pdf | 2.77 MB | Adobe PDF | View/Download |
Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.