Oliviero, Francesco (2008) On the effective exploitation of distributed information for cooperative network security and routing optimization. [Tesi di dottorato] (Inedito)
Anteprima |
PDF
Oliviero_Ingegneria_Informatica_Automatica.pdf Download (5MB) | Anteprima |
Tipologia del documento: | Tesi di dottorato |
---|---|
Lingua: | English |
Titolo: | On the effective exploitation of distributed information for cooperative network security and routing optimization |
Autori: | Autore Email Oliviero, Francesco [non definito] |
Data: | 2008 |
Tipo di data: | Pubblicazione |
Numero di pagine: | 151 |
Istituzione: | Università degli Studi di Napoli Federico II |
Dipartimento: | Informatica e sistemistica |
Dottorato: | Ingegneria informatica ed automatica |
Ciclo di dottorato: | 20 |
Coordinatore del Corso di dottorato: | nome email Cordella, Luigi Pietro [non definito] |
Tutor: | nome email Romano, Simon Pietro [non definito] |
Data: | 2008 |
Numero di pagine: | 151 |
Parole chiave: | Network security |
Settori scientifico-disciplinari del MIUR: | Area 09 - Ingegneria industriale e dell'informazione > ING-INF/05 - Sistemi di elaborazione delle informazioni |
Depositato il: | 31 Lug 2008 |
Ultima modifica: | 30 Apr 2014 19:28 |
URI: | http://www.fedoa.unina.it/id/eprint/2063 |
DOI: | 10.6092/UNINA/FEDOA/2063 |
Abstract
The wide deployment of more and more sophisticated services and application over Internet imposes to careful project solutions for face the threats that this spreading involved. Unfortunately, the computer networks were de- signed neglecting the problem of security, since they ware thinking as \open systems" where anyone could use them as it liked, and malicious users was not considered. The lack of security requires to study alternative solutions that integrate the existing network technologies. The interest in computer network security is growing in the last year and new ideas have been proposed. In this thesis we present a cooperative approach to network security. By sharing information about evidence of anomalous user's activities it is possible to improve the e®ectiveness of the overall system by a careful prevention and detection of attacks. In this way the cooperation is able to overcome the intrinsic design limits of existing computer networks. By analyzing several collaborative systems, we de ne a general framework for the design and implementation of a reliable cooperative solution. Based on this framework, we implement two systems that share common project's principles: a cooperative DoS detection system and a new secure routing protocol for wireless networks. The results prove the goodness of design and the capability of framework proposed to be extended to several problems of network security.
Downloads
Downloads per month over past year
Actions (login required)
![]() |
Modifica documento |