Modeling TCP/IP Networks Topology for Network Vulnerability Analysis Modeling TCP/IP Networks Topology for Network Vulnerability Analysis
نویسندگان
چکیده
The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose a formal model which could be used to analyze TCP/IP networks against attacks. Moreover we have presented a case study which models one of famous attack categories, i.e. Man in the Middle (MITM). This model lets automatically verify and proof network safety or vulnerability against this attack.
منابع مشابه
Modeling TCP/IP Networks Topology for Network Vulnerability Analysis
The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...
متن کاملTowards Realistic Million-Node Internet Simulations
This paper describes the Scalable Simulation Framework (SSF), a discrete event modeling API designed for the construction and simulation of very large networks. SSF can execute detailed simulations of complex topology networks with a million or more concurrent TCP/IP ows. We describe the overall architecture of SSF, the architecture of the network modeling layers above the basic API structure, ...
متن کاملTCP Network Calculus: The case of large delay-bandwidth product
We present in this paper an analytical model for the calculation of network load and drop probabilities in a TCP/IP network with general topology. First we formulate our model as a nonlinear complementarity problem. Then we transform the model into two equivalent formulations: fixed point formulation and nonlinear programming formulation. These equivalent formulations provide efficient computat...
متن کاملSurvey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures
Wireless Mesh Networks (WMN) is an integral broadband wireless network who provides high bandwidth internet service to users. It is kind of multi-hop networks having many to many connections with the capability of dynamic sanify network topology. WMN’s utility network performance can cause a massive fall. Channel your physical security vulnerabilities, due to the dynamic changes of topology is ...
متن کاملUsing Description Logics for Man in the Middle Attack Analysis
The emerging size and complexity of computer networks and also various services provided by them makes the networks vulnerable to numerous attacks. Although in the last few years a more logical approach to TCP/IP network security problem has been followed, a complete and sound formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model to ana...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007