This chapter serves as a summary of the previous chapters and discusses a new approach on building secure network infrastructure — separated networks for data and signal. It is our research work. We believe the approach could solve the fundamental problems of network infrastructure security, and solve most problems listed in the previous chapters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Reference
The writing of this chapter is partly supported by Hong Kong Government General Research Fund numbered CityU-123608 and City University of Hong Kong Strategic Research Grants numbered 7001941 and 7001764.
K. H. Yeung and T. C. Leung “Building Secure Network Infrastructure for LANs”, IPSI Transactions on Advance Research, vol. 2, no. 2, July 2006, pp.32-37.
K. H. Yeung, F. Yan and T. C. Leung, “Improving Network Infrastructure Security by Partitioning Networks Running Spanning Tree Protocol”, Proc. Int’l Conf. Internet Surveillance and Protection, France, Aug. 2006.
Shon Harris, Allen Haper, Chris Eagle, Jonathan Ness and Michael Lester, “Gray Hat Hacking: The Ethical Hacker’s Hanbook,” McGraw-Hill Osborne Media, 2004.
Andrew Whitaker and Daniel Newman, “Penetration Testing and Network Defense,” Cisco Press, 2006.
Wesley J. Noonan, “Hardening Network Infrastructure,” McGraw-Hill Osborne Media, 2004.
F. Yan and K. H. Yeung, “The Development of Novel Switching Devices by Using Embedded Microprocessing System Running Linux,” Proc. International Parallel and Distributed Processing Symposium 2008, Workshop on Security in Systems and Networks, Miami, Florida, April 2008.
Klaus Whrle, Frank Pahlke Hartmut Ritter, Daniel Muller, and Marc Bechler, “The linux networking architecture,” Prentice Hall, 2005.
Christian Benvenuti, “Understanding Linux Network Internals,” O’Reilly, 2005.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Wong, A., Yeung, A. (2009). Protecting Network Infrastructure – A New Approach. In: Network Infrastructure Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-0166-8_6
Download citation
DOI: https://doi.org/10.1007/978-1-4419-0166-8_6
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-0165-1
Online ISBN: 978-1-4419-0166-8
eBook Packages: Computer ScienceComputer Science (R0)