Securing IP networks

被引:0
|
作者
Xirasagar S. [1 ]
Mojtahed M. [1 ]
机构
[1] LSI Corporation, United States
关键词
D O I
10.1016/S1353-4858(10)70016-7
中图分类号
学科分类号
摘要
In part one of this two-part series on securing IP networks, the issues and technologies involved with securing these networks were addressed. We discussed how the evolution of packet-switched networks has driven the need for scalable security solutions. In this second and final installment, we'll address the necessary specifications for the silicon, software and hardware platforms that can enable applications with packet processing at up to 3Gbps and IPsec processing at up to 1.5Gbps for all applications. © 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:13 / 17
页数:4
相关论文
共 50 条
  • [21] Securing ad hoc networks
    Zhou, LD
    Zygmunt, JH
    IEEE NETWORK, 1999, 13 (06): : 24 - 30
  • [22] Securing Personal Area Networks
    Garefalakis, T
    Mitchell, CJ
    13TH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOL 1-5, PROCEEDINGS: SAILING THE WAVES OF THE WIRELESS OCEANS, 2002, : 1257 - 1259
  • [23] Securing wireless mesh networks
    Glass, Steve
    Portmann, Marius
    Muthukkumarasamy, Vallipuram
    IEEE INTERNET COMPUTING, 2008, 12 (04) : 30 - 36
  • [24] Securing cognitive radio networks
    Leon, O.
    Hernandez-Serrano, J.
    Soriano, M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2010, 23 (05) : 633 - 652
  • [25] Securing hybrid wired/mobile IP networks from TCP-flooding based Denial-of-Service attacks
    Taleb, T
    Nishiyama, H
    Kato, N
    Nemoto, Y
    GLOBECOM '05: IEEE Global Telecommunications Conference, Vols 1-6: DISCOVERY PAST AND FUTURE, 2005, : 2907 - 2911
  • [26] Strengthening and Securing the TCP/IP Stack against SYN Attacks
    Mohamed, A. Baes
    Kandil, A.
    PROCEEDINGS OF THE ITI 2009 31ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2009, : 627 - 632
  • [27] Securing Session Initiation Protocol in Voice over IP Domain
    Alsmairat, Iyad
    Shankaran, Rajan
    Orgun, Mehmet
    Dutkiewicz, Eryk
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 78 - 83
  • [28] Securing Reusable Hardware IP cores using Palmprint Biometric
    Chaurasia, Rahul
    Sengupta, Anirban
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SMART ELECTRONIC SYSTEMS (ISES 2021), 2021, : 410 - 413
  • [29] Securing communications over ATM networks
    Laurent, M
    Paul, O
    Rolin, P
    INFORMATION SECURITY IN RESEARCH AND BUSINESS, 1997, : 425 - 439
  • [30] Securing vehicular ad hoc networks
    Liu, Xiaonan
    Fang, Zhiyi
    Shi, Lijun
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 441 - 446