| Foreword | xiii |
| Preface | xvii |
| Acknowledgments | xxi |
Part I | Fundamentals | 1 |
1 | Introduction to Network Security | 3 |
1.1 | Up-Front Security Analysis | 3 |
1.1.1 | Threats and Assets That Require Protection | 4 |
1.1.2 | Usage Policies | 7 |
1.1.3 | Attack Methods | 8 |
1.1.4 | Determining Countermeasures | 8 |
1.1.5 | Trust in Countermeasures | 9 |
1.1.6 | Balancing Acceptable Risk with Cost of Countermeasures | 11 |
1.2 | Protection Countermeasures | 12 |
1.2.1 | Encryption | 12 |
1.2.2 | Authentication | 16 |
1.2.3 | Authorization | 21 |
1.2.4 | Access Control | 21 |
1.2.5 | Auditing | 22 |
1.3 | Trade-Offs and Optimizations | 23 |
| References | 23 |
2 | ATM Networking Fundamentals | 25 |
2.1 | ATM Reference Model | 26 |
2.2 | Cell Switching | 31 |
2.3 | ILMI | 36 |
2.4 | ATM Virtual Circuit Signaling | 37 |
2.5 | Routing ATM Connections | 40 |
2.6 | Multipoint Connections | 43 |
2.7 | Operations and Management | 45 |
2.8 | ATM Traffic Management | 47 |
2.9 | ATM Services | 50 |
2.9.1 | Classical IP over ATM | 51 |
2.9.2 | LANE | 52 |
2.9.3 | Multiprotocol over ATM | 54 |
2.10 | Summary | 56 |
| References | 56 |
Part II | Using ATM Security | 59 |
3 | ATM Security Using Traditional ATM Features | 61 |
3.1 | Implementing ATM Connection Policies | 62 |
3.1.1 | Access Control via Circuit Provisioning | 63 |
3.1.2 | Access Control for Signaled ATM Circuits | 67 |
3.2 | Network Configuration Security | 71 |
3.3 | Summary | 74 |
| References | 75 |
4 | ATM Security Using the ATM Forum Security 1.1 Mechanisms | 77 |
4.1 | Security 1.1 Model | 78 |
4.1.1 | Security Agent | 80 |
4.1.2 | Security Message Transport | 84 |
4.2 | Security 1.1 Services | 89 |
4.2.1 | Security Message Exchange | 90 |
4.2.2 | User Plane Security Services | 95 |
4.2.3 | Control Plane Security Services | 105 |
4.3 | Summary | 107 |
| References | 107 |
Part III | Implementing ATM Security | 109 |
5 | SME Protocol | 111 |
5.1 | SME Fundamentals | 112 |
5.1.1 | Two-Way Message Exchange | 112 |
5.1.2 | Three-Way Message Exchange | 114 |
5.1.3 | Endpoint Requests for Security Services | 116 |
5.2 | SME Details | 117 |
5.2.1 | SSIE | 117 |
5.2.2 | Security Agent Addressing | 122 |
5.2.3 | Security Association Establishment | 128 |
5.3 | SME Message Transport | 133 |
5.3.1 | UNI 4.0 Point-to-Point Signaling | 133 |
5.3.2 | In-Band | 137 |
5.3.3 | Pt-Mpt Connections | 143 |
5.3.4 | Signaling-Based with In-Band Fallback | 144 |
5.3.5 | Endpoint Requests for Proxy Security Services | 144 |
5.4 | Summary | 146 |
| References | 147 |
6 | Initial Authentication | 149 |
6.1 | Authentication Protocols | 151 |
6.2 | Using Secret-Key MACs | 153 |
6.2.1 | Keyed Message Digests | 153 |
6.2.2 | Block Cipher in CBC Mode | 154 |
6.3 | Using Public-Key Signature Algorithms | 154 |
6.4 | Example | 156 |
6.4.1 | Initiator Security Agent (Host) Processing | 157 |
6.4.2 | Responder Security Agent (Firewall) Processing | 158 |
6.4.3 | Initiator Security Agent (Host) Processing | 160 |
6.5 | Summary | 161 |
| References | 161 |
7 | Data Origin Authentication | 163 |
7.1 | Implementation Overview | 164 |
7.2 | Implementation Details | 165 |
7.3 | Keyed MACs | 167 |
7.4 | SME and Data Origin Authentication | 169 |
7.5 | Control Plane Authentication and Integrity | 170 |
7.6 | Summary | 171 |
| References | 172 |
8 | Encryption | 173 |
8.1 | Block Algorithms | 174 |
8.2 | Public-Key Versus Secret-Key Algorithms | 176 |
8.2.1 | RSA | 176 |
8.2.2 | Diffie-Hellman | 177 |
8.2.3 | DES | 177 |
8.2.4 | FEAL | 180 |
8.3 | Modes of Operation | 180 |
8.3.1 | CBC Mode | 181 |
8.3.2 | Counter Mode | 182 |
8.4 | Key Agility | 184 |
8.4.1 | Context Lookup | 185 |
8.4.2 | Encryption State | 185 |
8.5 | Encryptor Architecture | 186 |
8.5.1 | Component Modules | 188 |
8.5.2 | Resynchronization Processing for the Sample Architecture | 192 |
8.6 | State Maintenance Using OAM Cells | 193 |
8.6.1 | SKU | 196 |
8.6.2 | Cryptographic Resynchronization | 197 |
8.7 | Performance Considerations | 198 |
| References | 199 |
9 | Access Control | 201 |
9.1 | General Access Control | 202 |
9.2 | Label-Based Access Control | 204 |
9.2.1 | FIPS 188 | 206 |
9.2.2 | Label Transport in ATM Security | 209 |
9.3 | Summary | 211 |
| References | 211 |
10 | PNNI Routing Security | 213 |
10.1 | Approach | 214 |
10.2 | Security Information Group | 217 |
10.3 | Control Plane Security and Link Establishment | 221 |
10.4 | Summary | 223 |
| References | 224 |
Part IV | Additional Topics in ATM Security | 225 |
11 | Future Standards Development Topics | 227 |
11.1 | Security-Based Routing and Discovery | 227 |
11.2 | Renegotiation of Security Associations | 231 |
11.3 | In-Band SME for Simplex Connections | 234 |
11.4 | Wireless ATM Security | 237 |
11.4.1 | Shared Media Access Security | 239 |
11.4.2 | Security Standards Support for Wireless ATM | 239 |
11.5 | Summary | 242 |
| References | 242 |
12 | Research Topics | 245 |
12.1 | Algorithm- and Robustness-Agile Encryption | 245 |
12.1.1 | Robustness Agility | 246 |
12.1.2 | Algorithm Agility | 246 |
12.2 | Control Plane Confidentiality | 249 |
12.3 | Control Plane Authentication | 252 |
12.4 | ATM Intrusion Detection | 255 |
12.4.1 | Switched Network Intrusion Detection | 257 |
12.4.2 | Anatomy of Intrusion Detection Systems | 258 |
12.4.3 | Example Attack | 261 |
12.4.4 | Advanced Issues | 262 |
| References | 263 |
| Acronyms and Abbreviations | 265 |
| Selected Bibliography | 273 |
| About the Authors | 281 |
| Index | 283 |