@ARTICLE{Kołodziejczyk_Marek_Applying_2012, author={Kołodziejczyk, Marek and Ogiela, Marek R.}, volume={vol. 24}, number={No 1}, journal={Theoretical and Applied Informatics}, pages={95-106}, howpublished={online}, year={2012}, publisher={Committee of Informatics of Polish Academy of Science}, publisher={Institute of Theoretical and Applied Informatics of Polish Academy of Science}, abstract={This article describes security mechanisms used by 3rd-7th layers in OSI/ISO network model. Many of commonly used protocols by these layers were designed with assumption that there are nointruders. Such assumption was true many years ago. The network situation has been changed for last few years and we should realize that some properties of existing protocols may be abused. Moreover, we should exchange some of them or create new versions. There are some methods and guidelines concerning secure programming, but there is also lack of guidelines about creating secure protocols. Authors see the necessity of such guideline and this article is an attempt at analysing existing solutions and selecting some universal and important patterns.}, type={Artykuły / Articles}, title={Applying of security mechanisms to middle and high layers of OSI/ISO network model}, URL={http://journals.pan.pl/Content/93691/mainfile.pdf}, keywords={AES, authentication, authorization, application, community string, dictionary attack, DDoS attack, DNS, DoS attack, hash function, HTTP, ICMP, IPv4, Ipv6, man in the middle attack, MD5, OSI/ISO model, password, port scanning, protocol, SHA-1, sniffing, SNMP, spoofing, SYN flooding, TCP, tunnelling, UDP}, }