Skip to main content

The Curse of Ease of Access to the Internet

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4812)

Abstract

Since the day the Internet was made public, it has evolved as one of the most convenient, easily available and low cost media that help us to get connected to a vast variety of data and information. Its vast size and the ease of access of resources have made the Internet one of the most popular and widely used media for information exchange. However, this does not mean that it is free from any problems. Ensuring continuity of services and security of data is one of the most critical issues that must be resolved before the real power of the Internet can be harnessed. With more and more attacks emerging on a daily basis, it becomes necessary to analyze their root causes rather than to try and eliminate the attacks individually. Hence, in this paper we identify various factors responsible for the current state of insecurity and discuss the main categories of threats which span over the possible attacks that persist over the Internet. We also discuss the major limitations and challenges that need to be resolved to provide a better and a safe Internet.

Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CIA Triad; Confidentiality, Integrity, Availability (Last assessed: August 23, 2007), http://en.wikipedia.org/wiki/CIA_Triad

  2. How Much Information? (Last assessed: August 23, 2007) (2003), http://www2.sims.berkeley.edu/research/projects/how-much-info-2003/printable_report.pdf

  3. Internet Protocol. RFC 791 (Last assessed: August 24, 2007) (September 1981), http://www.ietf.org/rfc/rfc791.txt

  4. Phishing: How Not to Get Hooked by a Phishing Scam (Last assessed: August 24, 2007), http://www.onguardonline.gov/docs/onguardonline_phishing.pdf

  5. Two-Factor Authentication (Last assessed: August 24, 2007), http://en.wikipedia.org/wiki/Strong_authentication

  6. Welcome to CERT (Last assessed: August 24, 2007), http://www.cert.org/

  7. Zombie Computer (Last assessed: August 24, 2007), http://en.wikipedia.org/wiki/Zombie_computer

  8. FIPS PUB 199. Standards for Security Categorization of Federal Information and Information Systems. Technical report, National Institute of Standards and Technology. Federal Information Processing Standards Publication (Last Accessed: August 23, 2007) (2004), http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf

  9. Clark, D., Sollins, K., Wroclawski, J., Faber, T.: Addressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet. In: ACM SIGCOMM, FDNA Workshop (2003) (Last Accessed: August 29, 2007), http://www.isi.edu/newarch/DOCUMENTS/Principles.FDNA03.pdf

  10. Ferraiolo, D.F., Kuhn, D.R.: Role Based Access Control. In: Proceedings of 15th National Computer Security Conference (1992), http://csrc.nist.gov/rbac/ferraiolo-kuhn-92.pdf

  11. Gligor, V.D.: A Note on Denial-Of-Service in Operating Systems. IEEE Transactions on Software Engineering 10(3), 320–324 (1984)

    Google Scholar 

  12. Gupta, K.K., Nath, B., Ramamohanarao, K.: Conditional Random Fields for Intrusion Detection. In: AINAW 2007. Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 203–208. IEEE Press, Los Alamitos (2007)

    Google Scholar 

  13. Gupta, K.K., Nath, B., Ramamohanarao, K., Kazi, A.: Attacking Confidentiality: An Agent Based Approach. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 285–296. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Hussain, A., Heidemann, J., Papadopoulos, C.: A Framework for Classifying Denial of Service Attacks. In: Proceedings of the ACM SIGCOMM Conference, pp. 99–110. ACM, New York (2003)

    Google Scholar 

  15. Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E., Kleinrock, L., Lynch, D.C., Postel, J., Roberts, L.G., Wolff, S.: A Brief History of the Internet (Last assessed: August 23, 2007), http://www.isoc.org/internet/history/brief.shtml

  16. Longstaff, T.A., Ellis, J.T., Hernan, S.V., Lipson, H.F., Mcmillan, R.D., Pesante, L.H., Simmel, D.: Security of the Internet. Technical Report The Froehlich/Kent Encyclopedia of Telecommunications. CERT Coordination Center vol. 15 (Last Accessed: August 18, 2007) (1997), http://www.cert.org/encyc_article/tocencyc.html

  17. Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review 34(2), 39–53 (2004)

    Article  Google Scholar 

  18. Peng, T., Leckie, C., Ramamohanarao, K.: Adjusted Probabilistic Packet Marking for IP Traceback. In: Proceedings of the Second IFIP Networking Conference (Networking 2002), pp. 697–708 (2002)

    Google Scholar 

  19. Peng, T., Leckie, C., Ramamohanarao, K.: Information Sharing for Distributed Intrusion Detection Systems. Journal of Network and Computer Applications  (2005)

    Google Scholar 

  20. Peng, T., Leckie, C., Ramamohanarao, K.: Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys 39(1), 3 (2007)

    Article  Google Scholar 

  21. Roberts, L.G.: The Evolution of Packet Switching. Proceedings of the IEEE 66(11), 1307–1313 (1978)

    Article  Google Scholar 

  22. Siponen, M.T., Oinas-Kukkonen, H.: A Review of Information Security Issues and Respective Research Contributions. SIGMIS Database 38(1), 60–80 (2007)

    Article  Google Scholar 

  23. Sterling, B.: Short History of the Internet (Last assessed: August 23, 2007), http://w3.aces.uiuc.edu/AIM/scale/nethistory.html

  24. Tanenbaum, A.: Computer Networks. Prentice Hall PTR, Englewood Cliffs (2002)

    Google Scholar 

  25. Thaler, D., Hopps, C.: Multipath Issues in Unicast and Multicast Next-Hop Selection. RFC 2991, Publiched online November 2000 (Last assessed: August 24, 2007), http://www.faqs.org/rfcs/rfc2991.html

  26. Zhou, C.V., Karunasekera, S., Leckie, C.: Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. In: The Tenth IFIP/IEEE International Symposium on Integrated Network Management, pp. 80–89. IEEE Press, Los Alamitos (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Patrick McDaniel Shyam K. Gupta

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ramamohanarao, K., Gupta, K.K., Peng, T., Leckie, C. (2007). The Curse of Ease of Access to the Internet. In: McDaniel, P., Gupta, S.K. (eds) Information Systems Security. ICISS 2007. Lecture Notes in Computer Science, vol 4812. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77086-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77086-2_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77085-5

  • Online ISBN: 978-3-540-77086-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics