A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT

Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, h...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bernardo, D.V., Hoang, D.B.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 371
container_issue
container_start_page 367
container_title
container_volume
creator Bernardo, D.V.
Hoang, D.B.
description Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT.
doi_str_mv 10.1109/ICFN.2010.80
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5431819</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5431819</ieee_id><sourcerecordid>5431819</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-8b6f0aea95de040474461bfb9e4b9614ed28334f00ec90c30b64f83817ac39c83</originalsourceid><addsrcrecordid>eNpFjF1rwjAYRjOGsOm8291u8gfq3nw0TXYn3fwAcQP1WtL4VrN1bUkj038_YcKuDufA8xDyyGDEGJjneT5ZjjhcVMMN6TPJpUyVysTtv6i0R_ocwBjGM87uyLDrPgGAZUpxoe9JNaZ5Uzts49FWdNy2obHuQO3e-rqLdImnSKdYY7DRNzVdoTsGH890fQhoY_dyLfWeWjrz-wNdtYi7yy7-NOGLfoQmNq6paEI3r-sH0itt1eHwygHZTN7W-SxZvE_n-XiReJalMdGFKsGiNekOQYLMpFSsKAuDsjCKSdxxLYQsAdAZcAIKJUstNMusE8ZpMSBPf78eEbdt8N82nLepFEwzI34BzcNZYg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bernardo, D.V. ; Hoang, D.B.</creator><creatorcontrib>Bernardo, D.V. ; Hoang, D.B.</creatorcontrib><description>Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT.</description><identifier>ISBN: 1424456665</identifier><identifier>ISBN: 9781424456666</identifier><identifier>ISBN: 9780769539409</identifier><identifier>ISBN: 0769539408</identifier><identifier>EISBN: 1424456673</identifier><identifier>EISBN: 9781424456673</identifier><identifier>DOI: 10.1109/ICFN.2010.80</identifier><identifier>LCCN: 2009912721</identifier><language>eng</language><publisher>IEEE</publisher><subject>Australia ; Bandwidth ; Communication system security ; Cryptographic protocols ; Data security ; High-speed networks ; Internet ; IP networks ; Mobile computing ; Next generation networking</subject><ispartof>2010 Second International Conference on Future Networks, 2010, p.367-371</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5431819$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5431819$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bernardo, D.V.</creatorcontrib><creatorcontrib>Hoang, D.B.</creatorcontrib><title>A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT</title><title>2010 Second International Conference on Future Networks</title><addtitle>ICFN</addtitle><description>Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT.</description><subject>Australia</subject><subject>Bandwidth</subject><subject>Communication system security</subject><subject>Cryptographic protocols</subject><subject>Data security</subject><subject>High-speed networks</subject><subject>Internet</subject><subject>IP networks</subject><subject>Mobile computing</subject><subject>Next generation networking</subject><isbn>1424456665</isbn><isbn>9781424456666</isbn><isbn>9780769539409</isbn><isbn>0769539408</isbn><isbn>1424456673</isbn><isbn>9781424456673</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFjF1rwjAYRjOGsOm8291u8gfq3nw0TXYn3fwAcQP1WtL4VrN1bUkj038_YcKuDufA8xDyyGDEGJjneT5ZjjhcVMMN6TPJpUyVysTtv6i0R_ocwBjGM87uyLDrPgGAZUpxoe9JNaZ5Uzts49FWdNy2obHuQO3e-rqLdImnSKdYY7DRNzVdoTsGH890fQhoY_dyLfWeWjrz-wNdtYi7yy7-NOGLfoQmNq6paEI3r-sH0itt1eHwygHZTN7W-SxZvE_n-XiReJalMdGFKsGiNekOQYLMpFSsKAuDsjCKSdxxLYQsAdAZcAIKJUstNMusE8ZpMSBPf78eEbdt8N82nLepFEwzI34BzcNZYg</recordid><startdate>201001</startdate><enddate>201001</enddate><creator>Bernardo, D.V.</creator><creator>Hoang, D.B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201001</creationdate><title>A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT</title><author>Bernardo, D.V. ; Hoang, D.B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-8b6f0aea95de040474461bfb9e4b9614ed28334f00ec90c30b64f83817ac39c83</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Australia</topic><topic>Bandwidth</topic><topic>Communication system security</topic><topic>Cryptographic protocols</topic><topic>Data security</topic><topic>High-speed networks</topic><topic>Internet</topic><topic>IP networks</topic><topic>Mobile computing</topic><topic>Next generation networking</topic><toplevel>online_resources</toplevel><creatorcontrib>Bernardo, D.V.</creatorcontrib><creatorcontrib>Hoang, D.B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bernardo, D.V.</au><au>Hoang, D.B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT</atitle><btitle>2010 Second International Conference on Future Networks</btitle><stitle>ICFN</stitle><date>2010-01</date><risdate>2010</risdate><spage>367</spage><epage>371</epage><pages>367-371</pages><isbn>1424456665</isbn><isbn>9781424456666</isbn><isbn>9780769539409</isbn><isbn>0769539408</isbn><eisbn>1424456673</eisbn><eisbn>9781424456673</eisbn><abstract>Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT.</abstract><pub>IEEE</pub><doi>10.1109/ICFN.2010.80</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424456665
ispartof 2010 Second International Conference on Future Networks, 2010, p.367-371
issn
language eng
recordid cdi_ieee_primary_5431819
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Australia
Bandwidth
Communication system security
Cryptographic protocols
Data security
High-speed networks
Internet
IP networks
Mobile computing
Next generation networking
title A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol - UDT
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T05%3A51%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Conceptual%20Approach%20against%20Next%20Generation%20Security%20Threats:%20Securing%20a%20High%20Speed%20Network%20Protocol%20-%20UDT&rft.btitle=2010%20Second%20International%20Conference%20on%20Future%20Networks&rft.au=Bernardo,%20D.V.&rft.date=2010-01&rft.spage=367&rft.epage=371&rft.pages=367-371&rft.isbn=1424456665&rft.isbn_list=9781424456666&rft.isbn_list=9780769539409&rft.isbn_list=0769539408&rft_id=info:doi/10.1109/ICFN.2010.80&rft_dat=%3Cieee_6IE%3E5431819%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424456673&rft.eisbn_list=9781424456673&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5431819&rfr_iscdi=true