Providing appropriate protection techniques is significant to combat cyber-threats and preserve the integrity, confidentiality and availability of computer networks. The increasing volume of malicious cyber-attacks demands a collaborative effort between security professionals and researchers to design and develop effective cyber-defense systems. Cyber-attacks continue to rise worldwide in a manner that costs companies millions of dollars each year and leads to loss or misuse of information assets. Therefore, companies are under pressure to avoid the occurrence of these attacks or decrease the damage they cause to computer networks. In this chapter we will cover the aspects of network security, the types of network attacks and the techniques for measuring network security.
- Barford, P., Duffield, N., Ron, A., Sommers, J. (2009). Network performance anomaly detection and localization. Proc. 2009 IEEE INFOCOM.Google Scholar
- Bertsekas, D., & Gallagher, R. (1991). Data networks (2nd ed.). Englewood Cliffs: Prentice Hall.Google Scholar
- Bishop, M. (2003). Computer security: Art and science. Boston: Addison Wesley.Google Scholar
- CERT. Advisory 2001–09: Statistical Weaknesses in TCP/IP Initial Sequence Numbers. http://www.cert.org/advisories/CA-2001-09.html
- CERT. Advisory CA-96.21: TCP SYN Flooding and IP Spoofing Attacks. http://www.cert.org/advisories/CA-1998-01.html
- Chiu, D., & Jain, R. (1989). Analysis of the increase and decrease algorithms for congestion avoidance in computer networks. Computer Networks and ISDN Systems, 17(1), 1–14. http://www.cs.wustl.edu/~jain/papers/cong_av.htm.
- Cisco Systems Inc.. How NAT Works. http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094831.shtml
- White paper.. Understanding IP addressing: Everything you ever wanted to know. http://www.3com.com/other/pdfs/infra/corpinfo/en_US/501302.pdf