An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security

This research thesis formulates a survey of network security and IPChains, the Linux firewall. It provides a detailed description of prominent network security procedures in use today. This paper falls directly in line with the goals of Executive Order 13010, the President's Critical Infrastruc...

Full description

Bibliographic Details
Main Author: Lopez, Bryan S.
Other Authors: Bernstein, Jr., Raymond F.
Language:en_US
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/7725
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-7725
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-77252014-11-27T16:07:10Z An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security Lopez, Bryan S. Bernstein, Jr., Raymond F. This research thesis formulates a survey of network security and IPChains, the Linux firewall. It provides a detailed description of prominent network security procedures in use today. This paper falls directly in line with the goals of Executive Order 13010, the President's Critical Infrastructure Protection Plan, supports the goals of the National Security Agency's SIGINT business Plan and the goals of both the Unified and Maritime Cryptologic Architecture. It will aid in the development of the problem solving efforts of the national cryptologic organization and be used to provide critical intelligence support to the Operational command and the national intelligence community 2012-08-09T18:47:49Z 2012-08-09T18:47:49Z 2000-06-01 Thesis http://hdl.handle.net/10945/7725 o640945889 en_US Monterey, California. Naval Postgraduate School
collection NDLTD
language en_US
sources NDLTD
description This research thesis formulates a survey of network security and IPChains, the Linux firewall. It provides a detailed description of prominent network security procedures in use today. This paper falls directly in line with the goals of Executive Order 13010, the President's Critical Infrastructure Protection Plan, supports the goals of the National Security Agency's SIGINT business Plan and the goals of both the Unified and Maritime Cryptologic Architecture. It will aid in the development of the problem solving efforts of the national cryptologic organization and be used to provide critical intelligence support to the Operational command and the national intelligence community
author2 Bernstein, Jr., Raymond F.
author_facet Bernstein, Jr., Raymond F.
Lopez, Bryan S.
author Lopez, Bryan S.
spellingShingle Lopez, Bryan S.
An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security
author_sort Lopez, Bryan S.
title An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security
title_short An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security
title_full An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security
title_fullStr An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security
title_full_unstemmed An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security
title_sort investigation and assessment of linux ipchains and its vulnerabilities with respect to network security
publisher Monterey, California. Naval Postgraduate School
publishDate 2012
url http://hdl.handle.net/10945/7725
work_keys_str_mv AT lopezbryans aninvestigationandassessmentoflinuxipchainsanditsvulnerabilitieswithrespecttonetworksecurity
AT lopezbryans investigationandassessmentoflinuxipchainsanditsvulnerabilitieswithrespecttonetworksecurity
_version_ 1716721173109145600