Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol

Publication Type:
Conference Proceeding
Lecture Notes in Computer Science vol 6059 - Proceedings of the 4th International Conference on Information Security and Assurance, 2010, pp. 100 - 114
Issue Date:
Full metadata record
Files in This Item:
Filename Description SizeFormat
2009006975OK.pdf264.8 kBAdobe PDF
The development of next generation protocols, such as UDT (UDP-based data transfer), promptly addressess various infrastructure requirements for transmitting data in high speed networks. However, this development creates new vulnerabilities when these protocols are designed to solely rely on existing security solutions of existing protocols such as TCP and UDP. It is clear that not all security protocols (such as TLS) can be used to protect UDT, just as security solutions devised for wired networks cannot be used to protect the wired ones. The development of UDT, similarly in the development of TCP/UDP many years ago, lacked a well-thought security architecture to address the problems that networks are presently experiencing. This paper proposed and analyses practical security mechanisms for UDT.
Please use this identifier to cite or link to this item: