Methods of Detecting Intrusions in Security Protocols
Since the explosion of computer systems and computer networks within the past decade, e-commerce, online banking, and other "internet" oriented applications have risen exponentially. According to Forrester Research Group, online shopping in the US grew 580% from 1998 to 2000 accounting for...
Other Authors: | |
---|---|
Format: | Others |
Language: | English English |
Published: |
Florida State University
|
Subjects: | |
Online Access: | http://purl.flvc.org/fsu/fd/FSU_migr_etd-0315 |
Summary: | Since the explosion of computer systems and computer networks within the past decade, e-commerce, online banking, and other "internet" oriented applications have risen exponentially. According to Forrester Research Group, online shopping in the US grew 580% from 1998 to 2000 accounting for more than $45 billion in sales [10]. Online Banking Report states there are over 100 million people participating in online banking worldwide, an increase of 80% since 1984. This number is expected to rise to 300 million households by 2012 [3]. These applications rely on secure communications for information passing such as credit card numbers and bank account information. The secure communication is realized through the use of cryptography and security protocols for key exchange, authentication etcetera. These protocols can be attacked, possibly resulting in vital information being compromised. This paper discusses classic methodologies concerning intrusion detection and how they are being applied to security protocols. Three methods are presented for detecting and/or preventing intrusions in security protocols. The first method is a simple method aimed at detecting intrusions from attackers with rudimentary skills. The second method, a modified version of the original model, provides a more formidable defense to the sophisticated attacker. Lastly, this paper discusses the third method, IPSec, and how it provides the best security for detecting intrusions in security protocols. Each method is tested with known attacks and the results are discussed. === A Thesis submitted to the Department of Computer Science in partial fulfillment of
the requirements for the degree of Master of Science. === Degree Awarded: Fall Semester, 2004. === Date of Defense: July 20, 2004. === Intrusion detection, security protocols, IPSec, AH, ESP, tunnel mode, transport mode, IKE === Includes bibliographical references. === Mike Burmester, Professor Directing Thesis; Alec Yasinsac, Committee Member; Lois Hawkes, Committee Member. |
---|