Full Download Design and analysis of security protocol for communication First Edition Dinesh Goyal PDF DOCX
Full Download Design and analysis of security protocol for communication First Edition Dinesh Goyal PDF DOCX
com
https://ebookmass.com/product/design-and-analysis-of-
security-protocol-for-communication-first-edition-dinesh-
goyal/
OR CLICK HERE
DOWLOAD NOW
https://ebookmass.com/product/damodaran-on-valuation-security-
analysis-for-investment-and-corporate/
ebookmass.com
https://ebookmass.com/product/skills-in-mathematics-algebra-for-iit-
jee-main-and-advanced-arihant-dr-s-k-goyal-s-k-goyal/
ebookmass.com
https://ebookmass.com/product/analysis-and-design-of-prestressed-
concrete-di-hu/
ebookmass.com
https://ebookmass.com/product/what-is-religion-debating-the-academic-
study-of-religion-aaron-w-hughes-editor/
ebookmass.com
Disney Cautionary Tales Ridley Pearson
https://ebookmass.com/product/disney-cautionary-tales-ridley-pearson/
ebookmass.com
https://ebookmass.com/product/autonomy-of-a-state-in-a-federation-a-
special-case-study-of-jammu-and-kashmir-waseem-ahmad-sofi/
ebookmass.com
https://ebookmass.com/product/the-preppers-survival-bible-8-books-
in-1-turner/
ebookmass.com
https://ebookmass.com/product/nonlinear-ocean-dynamics-synthetic-
aperture-radar-1st-edition-maged-marghany/
ebookmass.com
https://ebookmass.com/product/there-is-nothing-for-you-here-fiona-
hill/
ebookmass.com
Tangled Up in You Samantha Chase
https://ebookmass.com/product/tangled-up-in-you-samantha-chase-3/
ebookmass.com
Design and Analysis of Security
Protocol for Communication
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Publishers at Scrivener
Martin Scrivener (martin@scrivenerpublishing.com)
Phillip Carmical (pcarmical@scrivenerpublishing.com)
Design and Analysis of Security
Protocol for Communication
Edited by
Dinesh Goyal, S. Balamurugan,
Sheng-Lung Peng and O.P. Verma
This edition first published 2020 by John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA
© 2020 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or other-
wise, except as permitted by law. Advice on how to obtain permission to reuse material from this title
is available at http://www.wiley.com/go/permissions.
For details of our global editorial offices, customer services, and more information about Wiley prod-
ucts visit us at www.wiley.com.
ISBN 978-1-119-55564-3
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines
10 9 8 7 6 5 4 3 2 1
Contents
Preface xiii
1 History and Generations of Security Protocols 1
Bright Keswani, Poonam Keswani and Rakhi Purohit
1.1 Introduction 2
1.2 Network Security 2
1.3 Historical Background of Network Security
and Network Timeline 4
1.4 Internet Architecture and Security Aspects 5
1.4.1 IPv4 and IPv6 Architecture 6
1.4.1.1 Structure of IPv4 6
1.4.1.2 IPv6 Architecture 7
1.4.2 Attack Through IPv4 8
1.4.2.1 Internet Attacks Common Methods 8
1.4.2.2 Internet Security Technology 10
1.4.3 IPv6 IP Security Issues 11
1.5 Different Aspects of Security of the Network 12
1.6 Evolution of Security Protocols for Network 13
1.6.1 Understanding the Key Components
of Network Security 13
1.6.2 A Deep Defense Strategy 14
1.6.3 How Does the Next Generation Network
Security System Work Best 15
1.7 Network Security Protocols 17
1.7.1 Application Layer 17
1.7.1.1 Good Privacy (PGP) 17
1.7.1.2 Email/Multipurpose Security (S/MIME) 18
1.7.1.3 HTTP Secure (S-HTTP) 18
1.7.1.4 Hypertext Transfer Protocol (HTTPS)
in Secure Sockets Layer 19
1.7.1.5 Secure E-Commerce (SET) 19
1.7.1.6 Kerberos 19
v
vi Contents
2.4 Conclusion 66
References 67
Practice Set 67
Review Questions and Exercises 70
3 Philosophy of Security by Cryptostakes Schemes 79
Hemant Kumar Saini
3.1 Philosophy of Public Key Cryptosystems
(p-k Cryptography) 79
3.2 RSA Algorithm 81
3.3 Security Analysis of RSA 84
3.4 Exponentiation in Modular Arithmetic 85
3.5 Distribution of Public Keys 87
3.6 Distribution of Secret Keys Using Public Key Cryptosystems 89
3.7 Discrete Logarithms 91
3.8 Diffie–Hellman Key Exchange 91
3.9 Review Exercise 93
References 94
4 Zero-Share Key Management for Secure Communication
Across a Channel 95
P. R. Mahalingam and K. A. Fasila
4.1 Introduction 95
4.2 Background 96
4.3 Zero-Share Key Management System 98
4.4 Simulation 100
4.5 Complexity and Analysis 103
4.6 Conclusion and Future Trends 106
References 107
5 Soft Computing-Based Intrusion Detection System
With Reduced False Positive Rate 109
Dharmendra G. Bhatti and Paresh V. Virparia
5.1 Introduction 109
5.1.1 Soft Computing for Intrusion Detection 111
5.1.2 False Positive 112
5.1.3 Reasons of False Positive 113
5.2 Existing Technology and Its Review 115
5.3 Research Design 118
5.3.1 Conceptual Framework 118
5.3.2 Preprocessing Module 121
5.3.3 Alert Monitoring Module 123
viii Contents
xiii
xiv Preface
Communication has become a lifeline for the current era, and secure
communication is blood in the veins of that lifeline. Currently very few
books are available on the security protocols of different communication
models like wireless communication, cloud-based communication, multi-
media communication, MANET (infrastructureless) communication, etc.
By providing this book to an audience working in the domains of network
security, we have attempted to cover the history of the evolution of com-
munication protocols and also provide some new techniques for security
xvi Preface
Dinesh Goyal
S. Balamurugan
Sheng-Lung Peng
O.P. Verma
December 2019
1
History and Generations of
Security Protocols
Bright Keswani1†, Poonam Keswani2* and Rakhi Purohit3‡
1
Department of Computer Applications, Suresh Gyan Vihar University,
Jaipur, India
2
Akashdeep PG College, Jaipur, India
3
Global Institute of Technology, Jaipur, India
Abstract
For personal computers, organizations and military users, network security has
become more important. Due to the recent arrival of the internet in network, and
security now a key issue, the safety record maybe availability as well all people
understand very good requirements security technologies in communications.
Knowing the attack method can generate enough security. Many companies
testing protection auto using some techniques of the network internet through
download programs firewalls and some mechanisms encryption in itself company
origin it has a special internal network known as “Intranet” to maintain in contact
internet access from outside also safe from any threatening state. All the security
of the network is huge as well in stage specific development for evaluation. It is a
theme that consists of date summary for the security that shows in internet assets
security, as well development internet current techniques security. To understand
the ongoing investigation, understand previous for the internet, and level his from
weak points from attacks, and also methods attack different via network internet
known, as well security technologies what they are very mission a lot they are need
as well to be reviewed and analysis.
Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O.P. Verma (eds.) Design and Analysis of
Security Protocol for Communication, (1–28) © 2020 Scrivener Publishing LLC
1
2 Design and Analysis of Security Protocol for Communication
1.1 Introduction
Due to advent of the Internet and ever changing network technologies, the
world is increasingly interconnected day by day. There are many personal,
commercial, military, and government information in the creation of
infrastructure networks around the world. Network security has become
very important because intellectual property can be easily accessible via
the efficient use of Internet and related tools. Although there are various
types of networks but two fundamentally different networks, i.e., data net-
works and synchronous networks consisting of switches. The Internet is
seen as a data network. From its current data network, information can
be obtained through special procedures by router-based computers such
as planting in the router “Trojan Horse”. Data is not stored by switches
of a synchronous network; therefore it is not compromised by attackers.
That is why security is emphasized in data networks such as the Internet,
as well as in various aspects of the Internet connection proposed by other
networks.
For clear understanding, this chapter is divided into the following
Sections. Further, each section is discussed in brief.
1. Network Security
2. The History and Security of the Network
3. Common Methods of Attack
4. Network Security Technology
5. Evolution of Network Security Protocols
6. Network Security Protocol
can also result in significant financial losses. For large organizations and the
average user, priority should be given to investing in appropriate security.
In 1975, the first malware was invented by two researchers who started
the Xerox Company. It is called a “Worm” and looks for a lazy computer
processor as an attempt to improve it. The creators of the simple diagnos-
tic tool inadvertently created the first malware and created terms that are
commonly used in multiple malware applications.
Many important events have contributed to the birth and development
of computer security and networks. The program began in the 1930s, when
Polish programmers invented a machine in 1918 to convert simple encrypted
text messages. In 1930, the shocking mathematician Alan Turing broke the
Enigma code ensuring that contact was crucial during the Second World War.
In 1960, he created the term “hacker” for many students at the
Massachusetts Institute of Technology (MIT) and launched the Arpanet
Department of Defense, which is popular as a channel for electronic
exchange of data and information [3]. This paves the way for today’s carrier
network called the Internet. In 1970, the Telnet protocol was developed.
This led to the widespread use of data networks, initially limited to govern-
ment contractors and academic researchers [3].
In the 1980s, online piracy and cybercrime began to emerge. After 9 days
of carnival, the authorities conducted an accidental search and penetrated
into a highly confidential system. The 1986 Act of Fraud and Abuse was
created, and computer crime Ian Murphy stole information from military
computers. After graduation, Robert Morris was judged to launch more
than 6,000 weak computers connected to the Internet. The Emergency
Response Team (CERT) alerts computer users to cyber security issues
based on concerns that Morris may repeat.
In the 1990s, the Internet became public and security issues increased
dramatically. Today, about 950 million people worldwide use the Internet
[3]. On 1 day, there were about 225 major security incidents [3]. These
security breaches can also result in significant financial losses. For large
organizations and the average user, priority should be given to investing in
appropriate security.
1. Address space
2. Routing
3. Configuration
4. Security
5. Quality of service
The IPv4 structure contains a 32-bit wide address [6]. This limits the
maximum number of computers that can connect to the Internet. A 32-bit
address can provide up to 2 billion computers connected to the Internet.
No other issues are expected when the protocol is created. It facilitates
malicious code distribution in IPv4 address space [5].
Routing is a problem with this protocol because the size of the routing
table is constantly increasing. The maximum theoretical size input for the
Global Positioning Table is 2 million [6]. Some methods have been used to
History and Generations of Security Protocols 7
reduce the number of entries in the routing table. This is useful in a short
amount of time, but major changes are required to resolve this issue.
A TCP/IP IPv4-based network is required to provide users with some
data to configure the network. Some of the required information is the IP
gateway, subnet mask and DNS server [4]. The simplicity of network config-
uration is not clear in the IPv4 protocol. The user can request the appropriate
network configuration from the central server [6]. This is very useful.
For many of today’s attacks, insecurity leads to the IPv4 protocol [9].
There is a mechanism to ensure IPv4, but not necessarily. IPsec is a specific
protocol protection mechanism. Load the packet with encryption protec-
tion space. It provides confidentiality and ipsec integrity and authentica-
tion. This protection does not take into account pirate experts who can
crack the encryption method and obtain the key.
When creating the Internet, QoS is based on the QoS of information
sent over the network. The delivery of the original message is primarily
dependent on the text. With the expansion of the Internet and the develop-
ment of technology, other forms of communication have begun to spread
on the Internet. For standard text, the quality of service for transmitting
video and music is different. This protocol does not include QoS features.
Dynamics vary depending on the type of data being sent [6].
mechanisms along the way [6]. IPv6 addresses the issue of quality of service.
IP allows special handling of certain packets with higher quality of service.
You must confirm this after verifying IPv6. Its security features are not nec-
essarily more secure than IPv4. Better security, not overall improvement.
Attacks can also interfere with the intended function of the system, such
as viruses, worms, and Trojan horses. Another form of attack is the con-
sumption of system resources, which may be the result of a denial of service
attack. There are other forms of network intrusion, such as ground attacks,
bomb attacks, and tear gas attacks. These attacks are not known in the name
of two attacks, but they are used in some way even if they are not mentioned.
1.4.2.1.2 Virus
A virus is a self-replicating program that uses file transfer and transmission
[8]. Once the file is opened, the virus will be activated within the system.
1.4.2.1.3 Worm
Worms are considered viruses because they are repeated, but worms do
not need files that allow them to spread [8]. There are two main types of
worms and network identification worms and worms. A large number of
email viruses use email as a means of infecting other computers. Network-
sensitive worms are a major problem on the Internet. The target worm
identifies the target network and once the worm reaches the target host, it
is infected by a Trojan horse or other worm.
1.4.2.1.5 Phishing
Phishing is an attempt to obtain confidential information from individuals,
groups, or organizations. Deceive fraudulent users in detection. Personal
information such as credit card numbers, online banking vouchers and
other confidential information.
10 Design and Analysis of Security Protocol for Communication
1.4.2.2.2 Firewall
A firewall is a mechanism for controlling model boundaries or protecting
perimeters. The goal of the firewall is to avoid traffic from outside, but it
can also be used to avoid traffic from inside. The firewall is the first line of
defense against hackers. It is a system designed to prevent unauthorized
access or access from a private network. The firewall can be implemented
in hardware or software, or a combination of the two.
Due to the built-in IPsec function, there is a problem with the spindle
operation [7]. The extension header avoids some of the common sources of
attack caused by head operations. The problem is that the steering guide must
be processed through all the stacks, which can result in a long series of steer-
ing heads. A large number of attachments may be confused by a knot, which
is a form of attack if deliberate. Tradition remains a threat to IPv6 security.
When the entire network portion is resolved while searching for a pos-
sible destination with an open service, an attack type called port check [5]
occurs. The IPv6 protocol address space is large, but the protocol is not
threatened by such attacks.
Navigation is a new feature integrated with IPv6. This feature requires
special security measures. Network administrators should be aware of
these security requirements when using IPv6 Mobility.
12 Design and Analysis of Security Protocol for Communication
1. Encryption system
2. Firewall
3. Intrusion detection system
4. Malignant and scanning procedures
5. Secure Sockets Layer (SSL) SSL
The network security zone continues on the same path. Use the same
method and add biometric data. Biometric technology provides better
History and Generations of Security Protocols 13
1. Filter packaging
2. Check the meeting
3. Application control
There are some network security systems, NGFW, NAC, and SWG,
which have been developed for many years to accommodate the latest
security threats. Other tools, such as sandbox protection and CASB, have
some new concepts in the Public Safety Act.
firewalls and IPS. All traffic and email on the Internet will then be sent to
the relevant security portal for further review to identify possible attach-
ments contained in email attachments and malware.
With proper tuning and maintenance, deep defense engineering strat-
egies using these components provide strong security. However, hackers
began to discover that the network could find cracks between each system
it entered. There are three main reasons for this. First of all, some security
systems are difficult to fully implement. Usually, only some of the security
features available in production are implemented.
Second, the security system cannot be maintained and updated cor-
rectly. For example, you must periodically update your firewall software
to fix newly discovered vulnerabilities. Security portals and databases are
often reviewed and sometimes require manual intervention updates.
Finally, while these systems overlap and provide multiple layers of pro-
tection, they work independently and are not shared and can be used to dis-
cover information between systems that have difficulty detecting threats.
When the Internet was first developed, the basic technology running on the
Internet was more secure than the trust era. However, the Internet has grown
tremendously, with millions of people, many of whom are unreliable. Internet
crime, corruption, espionage, extortion, etc., are getting bigger and bigger.
Therefore, Internet users must pay attention to managing their data
security needs. Various unwelcome people roam the streets of the Internet
without protection, so they must have strong defenses, valuable data, and
services. Over the years, as the value of data and services on the Internet has
grown, so does the current threat and the network industry has developed
History and Generations of Security Protocols 17
files that have just been received from the Internet are secure and will not
change.
message: the message title and text. This address contains a description of
how the message text (browser and server) is processed in the transaction,
client, and browser. HTTP negotiation will be used to transfer the actual
format of the desired information.
It uses other S-HTTP headers to encrypt digital mail, certificates, and
HTTP authentication, and provides instructions about how to decrypt the
text of the message.
1.7.1.6 Kerberos
The Kerberos network authentication protocol is designed to allow users,
clients, and servers to authenticate each other. Verification process is
accomplished by encrypting the keys because some keys are mutually
authenticated over an insecure network connection. After verifying
identity with the client and Kerberos server, the connection between
both the parties can be secure. From this issue, you can communicate
20 Design and Analysis of Security Protocol for Communication
These goals achieved by the IPSec protocol with dividing it into two pro-
tocols: the header AH authentication protocol i.e. the security of the proto-
col and the protection of the surrounding ESP, which provides the integrity
of the source and data authentication protocol AH, but does not provide
confidentiality. Provide ESP authentication, data integrity, and confidenti-
ality. Any data unit in the source must be protected with AH or ESP. There
are two ways to run IPSec, i.e., Transport and Tunneling. Transport mode
provides host-to-host protection for top-level protocols between IPv4 and
IPv6 hosts. Tunnel mode provides complete IP data mapping protection in
AH and ESP between IPSec gateways because new IP headers have been
added to both IPv4 and YIPv6. Between the two ports, the datagram is
secure and has an IP address. The original is also very safe.
Data units may not be safe abroad. This protection is created when an
IPSec gateway is created. First to encapsulate the data planner (includ-
ing your IP address) into a new set of compelling data that is titled a new
History and Generations of Security Protocols 23
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookmass.com