IP security
Keywords:
Architecture, Confidentiality, Firewall, Transport, Tunnel modesAbstract
IP is stands for Internet Protocol. IP security is a set service which secures the documents by the unauthorized entity. IP Sec covers the three areas of functionality that is authentication, confidentiality, and key management. IP Sec encrypts and authenticates all the data traffic at the IP level security. The IP level security or firewall administrator, we got basically the same concerns (as plumber) the size of the pipe the contents of the pipe, making sure the correct traffic is in the correct pipes and keeping the pipes from splitting and leaking all over the places of course like plumbers. When the pipes do leak: we are the ones responsible for cleaning up the mess and we are the ones who come up smelling awful. Firewall is a device that is used to provide protection to a system from network-based security threats. Firewall uses service, behavior, user and direction control techniques.
Downloads
References
Bellovin, S. M. (1996, July). Problem Areas for the IP Security Protocols. In USENIX Security Symposium.
Endler, D., & Collier, M. (2006). Hacking exposed VoIP: voice over IP security secrets & solutions. McGraw-Hill, Inc..
Feit, S. (1998). TCP/IP: Architcture, Protocols, and Implementation with IPv6 and IP Security. Computing McGraw-Hill.
Harris, B., & Hunt, R. (1999). TCP/IP security threats and attack methods. Computer communications, 22(10), 885-897.
Piper, D. (1998). The internet IP security domain of interpretation for ISAKMP (No. RFC 2407).
Simpson, W. (1995). IP in IP tunneling.
Thayer, R., Doraswamy, N., & Glenn, R. (1998). IP security document roadmap (No. RFC 2411).
Published
How to Cite
Issue
Section
Articles published in the International Research Journal of Management, IT and Social sciences (IRJMIS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IRJMIS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IRJMIS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IRJMIS volumes 7 onwards. Please read about the copyright notices for previous volumes under Journal History.