A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT
Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, h...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 371 |
---|---|
container_issue | |
container_start_page | 367 |
container_title | |
container_volume | |
creator | Bernardo, D.V. Hoang, D.B. |
description | Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT. |
doi_str_mv | 10.1109/ICFN.2010.80 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5431819</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5431819</ieee_id><sourcerecordid>5431819</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-8b6f0aea95de040474461bfb9e4b9614ed28334f00ec90c30b64f83817ac39c83</originalsourceid><addsrcrecordid>eNpFjF1rwjAYRjOGsOm8291u8gfq3nw0TXYn3fwAcQP1WtL4VrN1bUkj038_YcKuDufA8xDyyGDEGJjneT5ZjjhcVMMN6TPJpUyVysTtv6i0R_ocwBjGM87uyLDrPgGAZUpxoe9JNaZ5Uzts49FWdNy2obHuQO3e-rqLdImnSKdYY7DRNzVdoTsGH890fQhoY_dyLfWeWjrz-wNdtYi7yy7-NOGLfoQmNq6paEI3r-sH0itt1eHwygHZTN7W-SxZvE_n-XiReJalMdGFKsGiNekOQYLMpFSsKAuDsjCKSdxxLYQsAdAZcAIKJUstNMusE8ZpMSBPf78eEbdt8N82nLepFEwzI34BzcNZYg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bernardo, D.V. ; Hoang, D.B.</creator><creatorcontrib>Bernardo, D.V. ; Hoang, D.B.</creatorcontrib><description>Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT.</description><identifier>ISBN: 1424456665</identifier><identifier>ISBN: 9781424456666</identifier><identifier>ISBN: 9780769539409</identifier><identifier>ISBN: 0769539408</identifier><identifier>EISBN: 1424456673</identifier><identifier>EISBN: 9781424456673</identifier><identifier>DOI: 10.1109/ICFN.2010.80</identifier><identifier>LCCN: 2009912721</identifier><language>eng</language><publisher>IEEE</publisher><subject>Australia ; Bandwidth ; Communication system security ; Cryptographic protocols ; Data security ; High-speed networks ; Internet ; IP networks ; Mobile computing ; Next generation networking</subject><ispartof>2010 Second International Conference on Future Networks, 2010, p.367-371</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5431819$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5431819$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bernardo, D.V.</creatorcontrib><creatorcontrib>Hoang, D.B.</creatorcontrib><title>A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT</title><title>2010 Second International Conference on Future Networks</title><addtitle>ICFN</addtitle><description>Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT.</description><subject>Australia</subject><subject>Bandwidth</subject><subject>Communication system security</subject><subject>Cryptographic protocols</subject><subject>Data security</subject><subject>High-speed networks</subject><subject>Internet</subject><subject>IP networks</subject><subject>Mobile computing</subject><subject>Next generation networking</subject><isbn>1424456665</isbn><isbn>9781424456666</isbn><isbn>9780769539409</isbn><isbn>0769539408</isbn><isbn>1424456673</isbn><isbn>9781424456673</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFjF1rwjAYRjOGsOm8291u8gfq3nw0TXYn3fwAcQP1WtL4VrN1bUkj038_YcKuDufA8xDyyGDEGJjneT5ZjjhcVMMN6TPJpUyVysTtv6i0R_ocwBjGM87uyLDrPgGAZUpxoe9JNaZ5Uzts49FWdNy2obHuQO3e-rqLdImnSKdYY7DRNzVdoTsGH890fQhoY_dyLfWeWjrz-wNdtYi7yy7-NOGLfoQmNq6paEI3r-sH0itt1eHwygHZTN7W-SxZvE_n-XiReJalMdGFKsGiNekOQYLMpFSsKAuDsjCKSdxxLYQsAdAZcAIKJUstNMusE8ZpMSBPf78eEbdt8N82nLepFEwzI34BzcNZYg</recordid><startdate>201001</startdate><enddate>201001</enddate><creator>Bernardo, D.V.</creator><creator>Hoang, D.B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201001</creationdate><title>A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT</title><author>Bernardo, D.V. ; Hoang, D.B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-8b6f0aea95de040474461bfb9e4b9614ed28334f00ec90c30b64f83817ac39c83</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Australia</topic><topic>Bandwidth</topic><topic>Communication system security</topic><topic>Cryptographic protocols</topic><topic>Data security</topic><topic>High-speed networks</topic><topic>Internet</topic><topic>IP networks</topic><topic>Mobile computing</topic><topic>Next generation networking</topic><toplevel>online_resources</toplevel><creatorcontrib>Bernardo, D.V.</creatorcontrib><creatorcontrib>Hoang, D.B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bernardo, D.V.</au><au>Hoang, D.B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT</atitle><btitle>2010 Second International Conference on Future Networks</btitle><stitle>ICFN</stitle><date>2010-01</date><risdate>2010</risdate><spage>367</spage><epage>371</epage><pages>367-371</pages><isbn>1424456665</isbn><isbn>9781424456666</isbn><isbn>9780769539409</isbn><isbn>0769539408</isbn><eisbn>1424456673</eisbn><eisbn>9781424456673</eisbn><abstract>Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT.</abstract><pub>IEEE</pub><doi>10.1109/ICFN.2010.80</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1424456665 |
ispartof | 2010 Second International Conference on Future Networks, 2010, p.367-371 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5431819 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Australia Bandwidth Communication system security Cryptographic protocols Data security High-speed networks Internet IP networks Mobile computing Next generation networking |
title | A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T05%3A51%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Conceptual%20Approach%20against%20Next%20Generation%20Security%20Threats:%20Securing%20a%20High%20Speed%20Network%20Protocol%20-%20UDT&rft.btitle=2010%20Second%20International%20Conference%20on%20Future%20Networks&rft.au=Bernardo,%20D.V.&rft.date=2010-01&rft.spage=367&rft.epage=371&rft.pages=367-371&rft.isbn=1424456665&rft.isbn_list=9781424456666&rft.isbn_list=9780769539409&rft.isbn_list=0769539408&rft_id=info:doi/10.1109/ICFN.2010.80&rft_dat=%3Cieee_6IE%3E5431819%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424456673&rft.eisbn_list=9781424456673&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5431819&rfr_iscdi=true |