Utilize este identificador para referenciar este registo: http://hdl.handle.net/10451/13881
Título: Cooperative Intrusion Detection For The Next Generation Carrier Ethernet
Autor: Jieke, Pan
Orientador: Correia, Miguel Pupo
Palavras-chave: Cooperative Intrusion Detection
Specification-based Intrusion Detection
Carrier Ethernet
Spanning Tree Protocol
Network Topology
Data de Defesa: Mar-2008
Editora: Department of Informatics, University of Lisbon
Relatório da Série N.º: di-fcul-tr-08-10
Resumo: Current OSI model layer 2 network elements (NEs, e.g., bridges, switches) are complex hardware and software boxes, often running an operating system, service and administration software, that can be vulnerable to attacks, including to remote code execution inside them. The purpose of this thesis is to present an architecture to protect the Carrier Ethernet network infrastructure from attacks performed by malicious NEs against the link management protocol, Spanning Tree Protocol, and its variations. This thesis proposes that NEs are equipped with an intrusion detection component. Each detector uses a specification-based intrusion detection mechanism in order to inspect the behaviour of other NEs through the analysis of the received messages. The correct behaviour of the NEs is crafted from the standard specification of the STP protocol. If there is a deviation between current and expected behaviour, then the NE is considered to be malicious. The specification is extended with temporal pattern annotations, in order to detect certain deviations from the protocol. The results of the local detection are then transmitted to the other NEs, in order to cooperatively establish a correlation between all the NEs, so that malicious NEs can be logically removed from the network (disconnecting the ports connected to them)
URI: http://hdl.handle.net/10451/13881
Aparece nas colecções:FC-DI - Master Thesis (dissertation)

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
08-10.pdf730,5 kBAdobe PDFVer/Abrir    Acesso Restrito. Solicitar cópia ao autor!

FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpace
Formato BibTex MendeleyEndnote Degois 

Todos os registos no repositório estão protegidos por leis de copyright, com todos os direitos reservados.