Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security by Angus Wong and Alan Yeung addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised.
Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. Daily operations around the world highly depend on the availability and reliability of the Internet, which makes the security of this infrastructure a top priority issue in the field.
Network Infrastructure Security is a book that bridges the gap between the study of the traffic flow of networks and the study of the actual network configuration. This book makes effective use of examples and figures to illustrate network infrastructure attacks from a theoretical point of view. The book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions.
About the authors
Angus Kin-Yeung Wong obtained his BSc and PhD degrees from City University of Hong Kong and is currently an associate professor at Macao Polytechnic Institute. Alan Kai-Hau Yeung obtained his BSc and PhD degrees from the Chinese University of Hong Kong and is currently an associate professor at City University of Hong Kong. Wong and Yeung have been collaborating in network-related research for over 10 years.
Springer US; April 2009
- ISBN 9781441901668
- Read online, or download in secure PDF format
- Title: Network Infrastructure Security
- Author: Angus Wong; Alan Yeung
In The Press
From the reviews:
"Network infrastructure security focuses on how to detect and prevent routers and other network devices from being compromised. … this book deals with an emerging issue that is both topical and increasingly critical for network managers across the Internet. … The book makes effective use of figures and examples to illustrate both attacks and countermeasures. It is an excellent source of key information, and I strongly recommend it to those who have the basic knowledge to benefit from its pages." (Charles K. Davis, ACM Computing Reviews, August, 2009)
“This monograph analyzes security threats and their possible countermeasures within the Internet’s layers below the application level, i.e., with its switches, routers, and related transport infrastructure. … This book … used as a textbook in a security course for upper-division undergraduates and graduate students. It will also interest network engineers and research practitioners. Each chapter features many helpful illustrations to facilitate an understanding of the concepts presented and ends with a reference list. Summing Up: Recommended. Upper-division undergraduates through professionals.” (E. M. Aupperle, Choice, Vol. 47 (8), April, 2010)