Modeling TCP/IP Networks Topology for Network Vulnerability Analysis Modeling TCP/IP Networks Topology for Network Vulnerability Analysis

نویسندگان

  • Reza Zakeri
  • Hamid Reza Shahriari
  • Rasool Jalili
  • Reza Sadoddin
چکیده

The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose a formal model which could be used to analyze TCP/IP networks against attacks. Moreover we have presented a case study which models one of famous attack categories, i.e. Man in the Middle (MITM). This model lets automatically verify and proof network safety or vulnerability against this attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling TCP/IP Networks Topology for Network Vulnerability Analysis

The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...

متن کامل

Towards Realistic Million-Node Internet Simulations

This paper describes the Scalable Simulation Framework (SSF), a discrete event modeling API designed for the construction and simulation of very large networks. SSF can execute detailed simulations of complex topology networks with a million or more concurrent TCP/IP ows. We describe the overall architecture of SSF, the architecture of the network modeling layers above the basic API structure, ...

متن کامل

TCP Network Calculus: The case of large delay-bandwidth product

We present in this paper an analytical model for the calculation of network load and drop probabilities in a TCP/IP network with general topology. First we formulate our model as a nonlinear complementarity problem. Then we transform the model into two equivalent formulations: fixed point formulation and nonlinear programming formulation. These equivalent formulations provide efficient computat...

متن کامل

Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures

Wireless Mesh Networks (WMN) is an integral broadband wireless network who provides high bandwidth internet service to users. It is kind of multi-hop networks having many to many connections with the capability of dynamic sanify network topology. WMN’s utility network performance can cause a massive fall. Channel your physical security vulnerabilities, due to the dynamic changes of topology is ...

متن کامل

Using Description Logics for Man in the Middle Attack Analysis

The emerging size and complexity of computer networks and also various services provided by them makes the networks vulnerable to numerous attacks. Although in the last few years a more logical approach to TCP/IP network security problem has been followed, a complete and sound formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model to ana...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007