Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Hop integrity : a defense against denial-of-service attacks (Advances in Information Security)
Huang C., Gouda M., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 112 pp. Type: Book (9780387244266)
Date Reviewed: Sep 26 2006

Spam, phishing, and denial of service attacks are among the various schemes that can diminish the value of the Internet. Many solutions have been proposed to try to maintain the integrity and trustworthiness of the Internet. This monograph proposes several protocols to combat denial of service attacks. “Hop integrity” means that whenever a computer receives a message from one of its neighbors, it can be sure that the message is new (the message is not a repeat from some malicious computer) and authenticated (the original content is not modified in the process). The book is written like a scientific paper. Therefore, unless you are a researcher in this field, you will find the book uninteresting.

The book contains ten chapters. The first four are introductory in nature and explain what a denial of service attack is, propose an abstract protocol notation for later use, and outline the essence of a secure protocol. The next four chapters discuss four protocols for hop integrity. Finally, the last two chapters deal with the implementation issues related to hop integrity and its applications to mobile Internet, multicasting, and routing protocols.

Since this book is about protocols that make communication secure and reliable, the correctness of protocols is very important. Abstract protocol notations and state transition diagrams are used to represent protocols and to prove their correctness. However, since in general the complexity of proving protocol correctness is undecidable, the authors should have first briefly explained the general nature of designing and verifying communication network protocols.

Many good ideas have been proposed to restrict the opportunities for sabotage available on the Internet. Most of these ideas are not implemented, though, because they need the cooperation of all of the routers in the network. As these hop integrity protocols show, if one of the routers in the network does not implement the protocols, the whole scheme fails. To have a permanent impact, this book still has a long way to go.

Reviewer:  R. S. Chang Review #: CR133346 (0709-0849)
Bookmark and Share
  Featured Reviewer  
 
Invasive Software (D.4.6 ... )
 
 
Network Management (C.2.3 ... )
 
 
Routers (C.2.6 ... )
 
 
Network Operations (C.2.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Invasive Software": Date
A novel computer architecture to prevent destruction by viruses: volume management and system tuning
Qingshi G., Yue H., Lei L., Xu C., Honglan L. Journal of Computer Science and Technology 17(3): 241-248, 2002. Type: Article
Jun 25 2003
Defense and detection strategies against Internet worms
Nazario J., Artech House, Inc., Norwood, MA, 2003. Type: Book (9781580535373)
Sep 23 2004
Abstraction-based intrusion detection in distributed environments
Ning P. (ed), Jajodia S., Wang X. ACM Transactions on Information and System Security 4(4): 407-452, 2001. Type: Article
Jun 24 2002
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy