9 research outputs found
The development of a database taxonomy of vulnerabilities to support the study of denial of service attacks
As computer networks continue to proliferate, the world\u27s dependence on a secure communication infrastructure is of prime importance. Disruption of service through Denial of Service (DoS) attacks can result in great financial loss for Internet-based companies and major inconveniences for users of Internet services. The purpose of this two-year study was to study and understand network denial of service attacks so that methods may be developed to detect and prevent them.;Initially, the researcher constructed a database of system and network exploits that revealed the underlying vulnerabilities in the software or protocols they attack. The database was populated with exploits posted at popular reporting sites such as Rootshell, Bugtraq, Security Focus. To encourage the use of a common vulnerability taxonomy and to facilitate sharing of data, parts of the classification scheme proposed by Krsul (1998) in his research were included, as well as developing a taxonomy tree based on the current research.;Sifting through the reports and categorizing the attacks has been a challenging experience; and creating categories that are unambiguous, repeatable, and exhaustive has proven to be a difficult task. The results were two to three methods of classification that are useful for developing categories of vulnerabilities. The next phase of the project was to look for any clustering of attacks based on these vulnerability categories, and to determine if effective countermeasures can be deployed against them. Although past history is no guarantee of future exploit activity, it is hoped that the countermeasures proposed based on these 630 exploits will remain valid for future DoS attacks. Toward this goal, the research made use of data mining software packages to plot the various categories of attacks so that the interrelationships could be more easily discovered and studied. A sampling of the database plots, an interpretation of the plotted data, and the countermeasures proposed for the vulnerability categories developed as part of the database creation are presented in this research
Recommended from our members
Integration of unidirectional technologies into wireless back-haul architecture
This thesis was submitted for the degree of Docter of Philosophy and awarded by Brunel University.Back-haul infrastructures of today's wireless operators must support the triple-play services demanded by the market or regulatory bodies. To cope with increasing capacity demand, the EU FP7 project CARMEN has developed a cost-effective heterogeneous
multi-radio wireless back-haul architecture, which may also leverage the native multicast
capabilities of broadcast technologies such as DVB-T to off-load high-bandwidth broadcast
content delivery. However, the integration of such unidirectional technologies into a packet-switched architecture requires careful considerations. The contribution of this thesis is the investigation, design and evaluation of protocols and mechanisms facilitating the integration of such unidirectional technologies into the wireless
back-haul architecture so that they can be configured and utilized by the spectrum and
capacity optimization modules. This integration mainly concerns the control plane and, in particular, the aspects related to resource and capability descriptions, neighborhood, link and Multi Protocol Label Switching (MPLS) Label-Switched Path (LSP) monitoring, unicast and multicast LSP signalling as well as topology forming and maintenance. During the course of this study we have analyzed the problem space, proposed solutions to the resulting research questions and evaluated our approach. Our results show that the now Unidirectional Technology (UDT)-aware architecture can readily consider
Unidirectional Technologies (UDTs) to distribute, for example, broadcast content
Quality-of-service management in IP networks
Quality of Service (QoS) in Internet Protocol (IF) Networks has been the subject of
active research over the past two decades. Integrated Services (IntServ) and
Differentiated Services (DiffServ) QoS architectures have emerged as proposed
standards for resource allocation in IF Networks. These two QoS architectures
support the need for multiple traffic queuing systems to allow for resource
partitioning for heterogeneous applications making use of the networks. There have
been a number of specifications or proposals for the number of traffic queuing
classes (Class of Service (CoS)) that will support integrated services in IF Networks,
but none has provided verification in the form of analytical or empirical investigation
to prove that its specification or proposal will be optimum.
Despite the existence of the two standard QoS architectures and the large volume of
research work that has been carried out on IF QoS, its deployment still remains
elusive in the Internet. This is not unconnected with the complexities associated with
some aspects of the standard QoS architectures. [Continues.
Développement d'un systÚme de surveillance des mécanismes de qualité de service dans le contexte des réseaux de prochaine génération
Afin de faciliter la configuration et la surveillance des mĂ©canismes de qualitĂ© de service mis en place dans un rĂ©seau, un outil appropriĂ© doit ĂȘtre mis Ă la disposition des administrateurs rĂ©seau. Cet outil doit permettre une visualisation des configurations et une visualisation de statistiques relatives Ă la qualitĂ© de service. Un tel outil permet, par consĂ©quent, de valider l'homogĂ©nĂ©itĂ© des configurations Ă travers l'ensemble du rĂ©seau de l'administrateur en plus d'identifier les sources de dĂ©gradation de la qualitĂ© de service.
En plus de définir la place que peut occuper cet outil dans le contexte des réseaux de prochaine génération (NGN), ce document présente le développement d'une architecture de base permettant la visualisation des mécanismes de qualité de service dans un réseau hétérogÚne. Il décrit, entre autre, les diverses composantes de l'architecture ainsi que le développement de chacune d'elles.
Ce dĂ©veloppement, rĂ©alisĂ© au Laboratoire de gestion de rĂ©seaux informatiques et de tĂ©lĂ©communications (LAGRIT), a Ă©tĂ© validĂ© par une sĂ©rie d'essais rĂ©alisĂ©s dans les laboratoires de Bell Canada. Ce projet est donc considĂ©rĂ© comme un projet industriel puisqu'il a abouti Ă un produit pouvant ĂȘtre utilisĂ© par un administrateur de rĂ©seau.
Finalement, certaines suggestions ont Ă©tĂ© apportĂ©es afin de permettre, dans un premier temps, d'amĂ©liorer les performances du systĂšme et dans un deuxiĂšme temps, de dĂ©velopper d'autres fonctionnalitĂ©s pouvant ĂȘtre implĂ©mentĂ©es dans un contexte de recherche future
Bandwidth management and monitoring for IP network traffic : an investigation
Bandwidth management is a topic which is often discussed, but on which relatively little work has been done with regard to compiling a comprehensive set of techniques and methods for managing traffic on a network. What work has been done has concentrated on higher end networks, rather than the low bandwidth links which are commonly available in South Africa and other areas outside the United States. With more organisations increasingly making use of the Internet on a daily basis, the demand for bandwidth is outstripping the ability of providers to upgrade their infrastructure. This resource is therefore in need of management. In addition, for Internet access to become economically viable for widespread use by schools, NGOs and other academic institutions, the associated costs need to be controlled. Bandwidth management not only impacts on direct cost control, but encompasses the process of engineering a network and network resources in order to ensure the provision of as optimal a service as possible. Included in this is the provision of user education. Software has been developed for the implementation of traffic quotas, dynamic firewalling and visualisation. The research investigates various methods for monitoring and management of IP traffic with particular applicability to low bandwidth links. Several forms of visualisation for the analysis of historical and near-realtime traffic data are also discussed, including the use of three-dimensional landscapes. A number of bandwidth management practices are proposed, and the advantages of their combination, and complementary use are highlighted. By implementing these suggested policies, a holistic approach can be taken to the issue of bandwidth management on Internet links
Radio Communications
In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modiïŹed our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the ïŹeld of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks