MIT Logo

Patterns and Interactions in Network Security

Abstract:

This article provides a structured overview of how network security is shaped by recurring patterns and the interactions among them. It classifies security attacks and explains four main patterns for network defense: cryptographic protocols, packet filtering, dynamic resource allocation, and compound sessions/overlays. The discussion highlights how these mechanisms interact with each other and with broader network operations, offering a unified perspective on the challenges and strategies central to securing networked systems.

Author:
Pamela Zave, Jennifer Rexford
Year:
2020
Domain: ,
Dimension: ,
Region:
Data Type: , ,
MIT Political Science
MIT Political Science
ECIR
GSS