Layer 2 Security Inter - Layering in Networks

نویسندگان

  • Hayriye C. Altunbasak
  • John A. Copeland
چکیده

To my wonderful parents and my beloved family. ACKNOWLEDGEMENTS Completing this Ph.D. has been an exciting long journey, and it would not have been possible without the help and encouragement of many people. First and foremost, I would like to thank my advisor Professor Henry L. Owen for his continuous support and guidance throughout my studies. Professor Owen has been an awesome mentor-he truly enjoys advising. I admire his passion in teaching and conducting research. I really appreciate that he has given me a lot of freedom in my research. It has been my privilege and honor to be associated with Professor Owen and I will be forever grateful for his constant encouragement and wisdom. thesis topic and several ideas contained in this thesis are the outcomes of our interactions with Siemens on the TATI project. I am very grateful to the Siemens AG team for supporting and funding this research as well. I will always appreciate the friendship of my past and present officemates and time enjoyable here. My most important acknowledgment is to my family members, my son, Fatih, and my husband, Yucel, who have filled my life with happiness. I can not begin to express the gratitude I have for my parents, Rabiha and Muharrem. I will eternally iv owe them a great debt of gratitude for their endless love and support. Finally, special thanks go to my husband for his encouragement and understanding in this journey.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of Multilayer Scada Protocols: a Modbus Tcp Case Study

The layering of protocols in critical infrastructure networks – exemplified by Modbus TCP in the oil and gas sector and SS7oIP in the telecommunications sector – raises important security issues. The individual protocol stacks, e.g., Modbus and SS7, have certain vulnerabilities, and transporting these protocols using carrier protocols, e.g., TCP/IP, brings into play the vulnerabilities of the c...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Formal Methods in Cross Layer Modeling and Optimization of Wireless Networks: State of the Art and Future Directions

The layering principle has been long identified as a way to increase the interoperability and to improve the design of telecommunication protocols, where each layer offers services to adjacent upper layers and requires functionalities from adjacent lower ones. In the past, layering has enabled fast development of interoperable systems, but at the same time limited the performance of the overall...

متن کامل

Dynamic Layering and Bandwidth Allocation for Multi-Session Video Broadcasting with General Utility Functions

For video broadcasting applications in a wireless environment, layered transmission is an effective approach to support heterogeneous receivers with varying bandwidth requirements. There are several important issues that need to be addressed for such layered video broadcasting systems. At the session level, it is not clear how to allocate bandwidth resources among competing video sessions. For ...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

DynaBone: Dynamic Defense Using Multi-layer Internet Overlays

Typically, individual DDOS solutions trade service level for security, resulting in overall decreased service performance. Further, each single DDOS solution presents a target for subsequent attacks; the more successful or pervasive the solution or system, the more potential targets it presents, and the higher the payoff to the attacker. Clearly: DynaBone provides a dynamic defense against dist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006