Date Added: Jun 2009
This paper describes the best practices for securing the network infrastructure itself. This includes setting a security baseline for protecting the control and management planes as well as setting a strong foundation on which more advanced methods and techniques can subsequently be built on. Later in this paper, each design module is presented with the additional security design elements required to enhance visibility and control and to secure the data plane. It also says about the following are some of the expected threats to the network infrastructure like Denial-of-Service (DoS), intrusions, botnets, unauthorized access, session hijacking, etc.