Cart (Loading....) | Create Account
Close category search window
 

Internet infrastructure security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Manimaran, G. ; Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA

Summary form only given. The Internet has grown enormously over the last decade and has become ubiquitous. Most past research has focused on improving the performance and scalability of the Internet. The issue of securing the Internet has become a central issue due to a series of attacks that shut down some of the world's most high profile Web sites. Moreover, the growing concerns for cyber terrorism have made governments and researchers realize the importance of Internet security. Securing the Internet, as in any other field of computers, is based on the principle of confidentiality and integrity. This principle exists in every field, but the presence of packet sniffers, malicious routers, covert channels, eavesdroppers, denial-of-service (DoS) in the Internet makes this problem quite challenging. There has been a surge of Internet security research in the field of information assurance, which primarily focused on protecting the data using techniques such as authentication and encryption. However, information assurance assumes that the devices responsible for encrypting, forwarding and sending are trustworthy. Researchers are now questioning these assumptions, as instances have occurred where the network infrastructure (e.g., routers, servers) is compromised to the advantage of the malicious adversaries. Therefore, Internet infrastructure security is the need of the hour.

Published in:

High Performance Interconnects, 2004. Proceedings. 12th Annual IEEE Symposium on

Date of Conference:

25-27 Aug. 2004

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.