6 research outputs found
A Real Time Distributed Network Monitoring Platform (RTDNM)
Perkembangan geografi dan peningkatan saiz dalam rangkaian-rangkaian komputer menjadikan keperluan pemantauan terhadapnya menjadi semakin penting.
As computer networks increase in size and expand geographically, the necessity to monitor them becomes increasingly important
A Digital Forensic Readiness Approach for e-Supply Chain Systems
The internet has had a major impact on how information is shared within supply chains, and in
commerce in general. This has resulted in the establishment of information systems such as esupply
chains (eSCs) amongst others which integrate the internet and other information and
communications technology (ICT) with traditional business processes for the swift
transmission of information between trading partners. Many organisations have reaped the
benefits that come from adopting the eSC model, but have also faced the challenges with which
it comes. One such major challenge is information security. With the current state of
cybercrime, system developers are challenged with the task of developing cutting-edge digital
forensic readiness (DFR) systems that can keep up with current technological advancements,
such as eSCs. Hence, the research highlights the lack of a well-formulated eSC-DFR approach
that can assist system developers in the development of e-supply chain digital forensic
readiness systems. The main objective of such a system is that it must be able to provide law
enforcement/digital forensic investigators that operate on eSC platforms with forensically
sound and readily available potential digital evidence that can expedite and support digital
forensics incident-response processes. This approach, if implemented can also prepare trading
partners for security incidents that might take place, if not prevent them from occurring.
Therefore, the work presented in this research is aimed at providing a procedural approach that
is based on digital forensic principles for eSC system architects and eSC network service
providers to follow in the design of eSC-DFR tools. The author proposes an eSC-DFR process
model and eSC-DFR system architectural design that was implemented as part of this research
illustrating the concepts of evidence collection, evidence pre-analysis, evidence preservation,
system usability alongside other digital forensic principles and techniques. It is the view of the
authors that the conclusions drawn from this research can spearhead the development of
cutting-edge eSC-DFR systems that are intelligent, effective, user friendly and compliant with
international standards.Dissertation (MEng)--University of Pretoria, 2019.Computer ScienceMScUnrestricte
Recommended from our members
Program Synthesis for Software-Defined Networking
Software-defined networking (SDN) is revolutionizing the networking industry, but even the most advanced SDN programming platforms lack mechanisms for changing the global configuration (the set of all forwarding rules on the switches) correctly and automatically. This seemingly-simple notion of global configuration change (known as a network update) can be quite challenging for SDN programmers to implement by hand, because networks are distributed systems with hundreds or thousands of interacting nodes---even if the initial and final configurations are correct, naïvely updating individual nodes can lead to bugs in the intermediate configurations. Additionally, SDN programs must simultaneously describe both static forwarding behavior, and dynamic updates in response to events. These event-driven updates are critical to get right, but even more difficult to implement correctly due to interleavings of data packets and control messages. Existing SDN platforms offer only weak guarantees in this regard, also opening the door for incorrect behavior. As an added wrinkle, event-driven network programs are often physically distributed, running on several nodes of the network, and this distributed setting makes programming and debugging even more difficult. Bugs arising from any of these issues can cause serious incorrect transient behaviors, including loops, black holes, and access-control violations.This thesis presents a synthesis-based approach for solving these issues. First, I show how to automatically synthesize network updates that are guaranteed to preserve specified properties. I formalize the network updates problem and develop a synthesis algorithm based on counterexample-guided search and incremental model checking. Second, I add the ability to reason about transitions between configurations in response to events, by introducing event-driven consistent updates that are guaranteed to preserve well-defined behaviors in this context. I propose network event structures (NESs) to model constraints on updates, such as which events can be enabled simultaneously and causal dependencies between events. I define an extension of the NetKAT language with mutable state, give semantics to stateful programs using NESs, and discuss provably-correct strategies for implementing NESs in SDNs. Third, I propose a synchronization synthesis approach that allows correct "parallel composition" of several event-driven programs (processes)---the programmer can specify each sequential process, and add a declarative specification of paths that packets are allowed to take. The synthesizer then inserts synchronization among the distributed controller processes such that the declarative specification will be satisfied by all packets traversing the network. The key technical contribution here is a counterexample-guided synthesis algorithm that furnishes network processes with the synchronization required to prevent any races causing specification violations. An important component of this is an extension of network event structures to a more general programming model called event nets based on Petri nets. Finally, I describe an approach for implementing event nets in an efficient distributed way on modern SDN hardware. For each of the core components, I describe a prototype implementation, and present results from experiments on realistic topologies and properties, demonstrating that the tools handle real network programs, and scale to networks of 1000+ nodes
Gigabit PickPacket: A Network Monitoring Tool for Gigabit Networks
The extensive use of computers and networks for exchange of information has also had ramifications on the growth and spread of crime through their use. Law enforcement agencies need to keep up with the emerging trends in these areas for crime detection and prevention. Among the several needs of such agencies are the need to monitor, detect and analyze undesirable network traffic. However, the monitoring, detecting, and analysis of this traffic may be against the goal of maintaining privacy of individuals whose network communications are being monitored. Also, the bandwidth at network backbones and Internet Service Providers is increasing rapidly due to the increase in network usage. This increase in bandwidth imposes an additional requirement on Network Monitoring Tools to monitor traffic at very high speeds without losing any relevant information. PickPacket _ a network monitoring tool that can handle the conflicting issues of network monitoring and privacy through its judicious use, is discussed in References [1, 8, 9, 12]. This thesis discusses the design and development of a network monitoring tool called Gigabit PickPacket, an enhanced version of PickPacket for monitoring network at Gigabit speed. This tool eoeectively uses the support of multiprocessor and/or multiple machines for monitoring traffic at very high speeds
The Network Monitoring Tool -- PickPacket: Filtering FTP and HTTP Packets
The extensive use of computers and networks for exchange of information has also had ramifications on the growth and spread of crime through their use. Law enforcement agencies need to keep up with the emerging trends in these areas for crime detection and prevention. Among the several needs of such agencies is the need to monitor, detect and analyze undesirable network traffic. However, the monitoring, detecting, and analysis of this traffic may be against the goal of maintaining privacy of individuals whose network communications are being monitored. PickPacket -- a networ