Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Comments on “security problems in the TCP/IP protocol suite”

Published: 01 July 1989 Publication History

Abstract

In the April issue of Computer Communication Review, S. M. Bellovin described attacks on protocols in the TCP/IP suite [1]. He stated that the attacks were "inherent in the protocols, regardless of the correctness of any implementations." His article proposed specific defenses against these attacks and discussed more comprehensive defenses. This note attempts to place in perspective some of the concerns cited by Bellovin and to correct some errors present in his article, especially in his discussion of comprehensive defenses.

References

[1]
1. S.M. Bellovin, "Security Problems in the TCP/IP Protocol Suite," Computer Communication Review 19 (2), March 1989.
[2]
2. CCITT, Recommendation X.411 (ISO 10021-4), Message Handling Systems - Message Transfer System - Abstract Service Definition and Procedures, 1989.
[3]
3. CCITT, Recommendation X.509 (ISO 9594-8), The Directory - Authentication Framework, 1989.
[4]
4. ISO, IS 7498/2, Information Processing Systems - Open Systems Interconnection - Security Architecture, 1988.
[5]
5. Internet Activities Board, "IAB Official Protocol Standards," RFC 1100, April 1989.
[6]
6. E.J. Feinler, O.J. Jacobson, M.K. Stahl, C.A. Ward, eds., DDN Protocol Handbook, Volume Two, DARPA Internet Protocols, DDN Network Information Center, SRI International, December 1985.
[7]
7. Defense Data Network Subscriber Guide to Security Services 1986- 1992, Defense Communication Agency, Attention: Code B600, Washington, D.C. 20305-2000, September 1986.
[8]
8. Voydock, V. & Kent, S., "Security Mechanisms in High-Level Network Protocols," ACM Computer Surveys 15 (2), June 1983.
[9]
9. National Computer Security Center, Trusted Network Interpretation of the Trusted Computer Security Evaluation Criteria, NCSC-TG-005, Version 1, July 1987.

Cited By

View all
  • (2011)Securing Retinal Template Using QuasigroupsJournal of Advances in Information Technology10.4304/jait.2.2.80-862:2Online publication date: 3-May-2011
  • (1998)Efficient security mechanisms for the border gateway routing protocolComputer Communications10.1016/S0140-3664(97)00186-221:3(203-210)Online publication date: 1-Mar-1998
  • (1997)Design and implementation of a software bridge with packet filtering and statistics collection functionsInternational Journal of Network Management10.5555/336844.3368467:5(251-263)Online publication date: 1-Sep-1997
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 19, Issue 3
July 1989
135 pages
ISSN:0146-4833
DOI:10.1145/74674
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1989
Published in SIGCOMM-CCR Volume 19, Issue 3

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)51
  • Downloads (Last 6 weeks)9
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2011)Securing Retinal Template Using QuasigroupsJournal of Advances in Information Technology10.4304/jait.2.2.80-862:2Online publication date: 3-May-2011
  • (1998)Efficient security mechanisms for the border gateway routing protocolComputer Communications10.1016/S0140-3664(97)00186-221:3(203-210)Online publication date: 1-Mar-1998
  • (1997)Design and implementation of a software bridge with packet filtering and statistics collection functionsInternational Journal of Network Management10.5555/336844.3368467:5(251-263)Online publication date: 1-Sep-1997
  • (1996)Securing the border gateway routing protocolProceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference10.1109/GLOCOM.1996.586129(81-85)Online publication date: 1996
  • (1990)A security architecture and mechanism for data confidentiality in TCP/IP protocolsProceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy10.1109/RISP.1990.63855(249-259)Online publication date: 1990
  • (1989)Security architecture for data transfer through TCP/IP protocolsComputers & Security10.1016/0167-4048(89)90009-68:8(709-720)Online publication date: Dec-1989

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media