A conceptual approach against next generation security threats: Securing a high speed network protocol - UDT
- Publication Type:
- Conference Proceeding
- Citation:
- 2nd International Conference on Future Networks, ICFN 2010, 2010, pp. 367 - 371
- Issue Date:
- 2010-05-18
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
2009006073OK.pdf | 1.57 MB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
Various technologies have emerged since the Internet protocols were first introduced. Many of these technologies were compellingly complex to implement that it was thought that the existing Internet would have to be redesigned in order to accommodate them. While these proved to be false, security, however, remains to be a major challenge that current and future network designs should accommodate to achieve survivable and secure networks. This paper reaffirms that future network security can be effectively addressed on the lower-level by introducing an identity packet for network protocols. In this paper, we will focus on the newly developed network protocols, such as UDT, a considered next generation protocol. This original work is aimed at providing another way of securing high speed network protocols such as UDT. © 2010 IEEE.
Please use this identifier to cite or link to this item: