9 research outputs found

    The development of a database taxonomy of vulnerabilities to support the study of denial of service attacks

    Get PDF
    As computer networks continue to proliferate, the world\u27s dependence on a secure communication infrastructure is of prime importance. Disruption of service through Denial of Service (DoS) attacks can result in great financial loss for Internet-based companies and major inconveniences for users of Internet services. The purpose of this two-year study was to study and understand network denial of service attacks so that methods may be developed to detect and prevent them.;Initially, the researcher constructed a database of system and network exploits that revealed the underlying vulnerabilities in the software or protocols they attack. The database was populated with exploits posted at popular reporting sites such as Rootshell, Bugtraq, Security Focus. To encourage the use of a common vulnerability taxonomy and to facilitate sharing of data, parts of the classification scheme proposed by Krsul (1998) in his research were included, as well as developing a taxonomy tree based on the current research.;Sifting through the reports and categorizing the attacks has been a challenging experience; and creating categories that are unambiguous, repeatable, and exhaustive has proven to be a difficult task. The results were two to three methods of classification that are useful for developing categories of vulnerabilities. The next phase of the project was to look for any clustering of attacks based on these vulnerability categories, and to determine if effective countermeasures can be deployed against them. Although past history is no guarantee of future exploit activity, it is hoped that the countermeasures proposed based on these 630 exploits will remain valid for future DoS attacks. Toward this goal, the research made use of data mining software packages to plot the various categories of attacks so that the interrelationships could be more easily discovered and studied. A sampling of the database plots, an interpretation of the plotted data, and the countermeasures proposed for the vulnerability categories developed as part of the database creation are presented in this research

    Quality-of-service management in IP networks

    Get PDF
    Quality of Service (QoS) in Internet Protocol (IF) Networks has been the subject of active research over the past two decades. Integrated Services (IntServ) and Differentiated Services (DiffServ) QoS architectures have emerged as proposed standards for resource allocation in IF Networks. These two QoS architectures support the need for multiple traffic queuing systems to allow for resource partitioning for heterogeneous applications making use of the networks. There have been a number of specifications or proposals for the number of traffic queuing classes (Class of Service (CoS)) that will support integrated services in IF Networks, but none has provided verification in the form of analytical or empirical investigation to prove that its specification or proposal will be optimum. Despite the existence of the two standard QoS architectures and the large volume of research work that has been carried out on IF QoS, its deployment still remains elusive in the Internet. This is not unconnected with the complexities associated with some aspects of the standard QoS architectures. [Continues.

    Social Intelligence Design 2007. Proceedings Sixth Workshop on Social Intelligence Design

    Get PDF

    Développement d'un systÚme de surveillance des mécanismes de qualité de service dans le contexte des réseaux de prochaine génération

    Get PDF
    Afin de faciliter la configuration et la surveillance des mĂ©canismes de qualitĂ© de service mis en place dans un rĂ©seau, un outil appropriĂ© doit ĂȘtre mis Ă  la disposition des administrateurs rĂ©seau. Cet outil doit permettre une visualisation des configurations et une visualisation de statistiques relatives Ă  la qualitĂ© de service. Un tel outil permet, par consĂ©quent, de valider l'homogĂ©nĂ©itĂ© des configurations Ă  travers l'ensemble du rĂ©seau de l'administrateur en plus d'identifier les sources de dĂ©gradation de la qualitĂ© de service. En plus de dĂ©finir la place que peut occuper cet outil dans le contexte des rĂ©seaux de prochaine gĂ©nĂ©ration (NGN), ce document prĂ©sente le dĂ©veloppement d'une architecture de base permettant la visualisation des mĂ©canismes de qualitĂ© de service dans un rĂ©seau hĂ©tĂ©rogĂšne. Il dĂ©crit, entre autre, les diverses composantes de l'architecture ainsi que le dĂ©veloppement de chacune d'elles. Ce dĂ©veloppement, rĂ©alisĂ© au Laboratoire de gestion de rĂ©seaux informatiques et de tĂ©lĂ©communications (LAGRIT), a Ă©tĂ© validĂ© par une sĂ©rie d'essais rĂ©alisĂ©s dans les laboratoires de Bell Canada. Ce projet est donc considĂ©rĂ© comme un projet industriel puisqu'il a abouti Ă  un produit pouvant ĂȘtre utilisĂ© par un administrateur de rĂ©seau. Finalement, certaines suggestions ont Ă©tĂ© apportĂ©es afin de permettre, dans un premier temps, d'amĂ©liorer les performances du systĂšme et dans un deuxiĂšme temps, de dĂ©velopper d'autres fonctionnalitĂ©s pouvant ĂȘtre implĂ©mentĂ©es dans un contexte de recherche future

    Bandwidth management and monitoring for IP network traffic : an investigation

    Get PDF
    Bandwidth management is a topic which is often discussed, but on which relatively little work has been done with regard to compiling a comprehensive set of techniques and methods for managing traffic on a network. What work has been done has concentrated on higher end networks, rather than the low bandwidth links which are commonly available in South Africa and other areas outside the United States. With more organisations increasingly making use of the Internet on a daily basis, the demand for bandwidth is outstripping the ability of providers to upgrade their infrastructure. This resource is therefore in need of management. In addition, for Internet access to become economically viable for widespread use by schools, NGOs and other academic institutions, the associated costs need to be controlled. Bandwidth management not only impacts on direct cost control, but encompasses the process of engineering a network and network resources in order to ensure the provision of as optimal a service as possible. Included in this is the provision of user education. Software has been developed for the implementation of traffic quotas, dynamic firewalling and visualisation. The research investigates various methods for monitoring and management of IP traffic with particular applicability to low bandwidth links. Several forms of visualisation for the analysis of historical and near-realtime traffic data are also discussed, including the use of three-dimensional landscapes. A number of bandwidth management practices are proposed, and the advantages of their combination, and complementary use are highlighted. By implementing these suggested policies, a holistic approach can be taken to the issue of bandwidth management on Internet links

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modiïŹed our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the ïŹeld of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    Provision of Quality of Service in IP-based Mobile Access Networks

    Get PDF
    corecore