首页> 外文学位 >Security architecture and protocols for overlay network services.
【24h】

Security architecture and protocols for overlay network services.

机译:覆盖网络服务的安全体系结构和协议。

获取原文
获取原文并翻译 | 示例

摘要

Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a proactive approach that cleanly retrofits security solutions into existing system architectures. The first step in this approach is to identify security threats, vulnerabilities and potential attacks on a system or an application. The second step is to develop security tools in the form of customizable and configurable plug-ins that address these security issues and minimally modify existing system code, while preserving its performance and scalability metrics.;This thesis uses overlay network applications to shepherd through and address challenges involved in supporting security in large scale distributed systems. In particular, the focus is on two popular applications: publish/subscribe networks and VoIP networks. Our work on VoIP networks has for the first time identified and formalized caller identification attacks on VoIP networks. We have identified two attacks: a triangulation based timing attack on the VoIP network's route set up protocol and a flow analysis attack on the VoIP network's voice session protocol. These attacks allow an external observer (adversary) to uniquely (nearly) identify the true caller (and receiver) with high probability. Our work on the publish/subscribe networks has resulted in the development of an unified framework for handling event confidentiality, integrity, access control and DoS attacks, while incurring small overhead on the system. We have proposed a key isomorphism paradigm to preserve the confidentiality of events on publish/subscribe networks while permitting scalable content-based matching and routing. Our work on overlay network security has resulted in a novel information hiding technique on overlay networks. Our solution represents the first attempt to transparently hide the location of data items on an overlay network.
机译:传统观点认为,为了构建安全的系统,安全性必须是系统设计中不可或缺的组成部分。但是,出于成本考虑,大多数系统设计人员都将精力集中在系统的性能,可伸缩性和可用性上。这种系统很少或根本不强调安全性,因此容易受到广泛的攻击,这些攻击有可能损害敏感数据的机密性,完整性和可用性。以安全性作为主要设计目标之一,重新设计和实施大规模系统通常很麻烦。本文主张采用一种主动的方法,将安全解决方案完全改造为现有的系统体系结构。此方法的第一步是识别系统或应用程序上的安全威胁,漏洞和潜在攻击。第二步是以可定制和可配置的插件形式开发安全工具,以解决这些安全问题并最小化修改现有系统代码,同时保留其性能和可伸缩性指标。本论文使用覆盖网络应用程序来扩展和寻址在大规模分布式系统中支持安全性所涉及的挑战。特别是,重点是两个流行的应用程序:发布/订阅网络和VoIP网络。我们在VoIP网络上的工作首次确定并正式化了VoIP网络上的呼叫者识别攻击。我们已经确定了两种攻击:针对VoIP网络的路由建立协议的基于三角测量的定时攻击和针对VoIP网络的语音会话协议的流分析攻击。这些攻击使外部观察者(对手)可以(几乎)唯一性地(高)识别出真正的呼叫者(和接收者)。我们在发布/订阅网络上的工作已导致开发了用于处理事件机密性,完整性,访问控制和DoS攻击的统一框架,同时在系统上产生了少量开销。我们提出了一个关键的同构范式,以在允许可伸缩的基于内容的匹配和路由的同时,保护发布/订阅网络上事件的机密性。我们在覆盖网络安全性方面的工作导致了覆盖网络上一种新颖的信息隐藏技术。我们的解决方案代表了首次尝试透明地隐藏覆盖网络上数据项的位置。

著录项

  • 作者

    Srivatsa, Mudhakar.;

  • 作者单位

    Georgia Institute of Technology.;

  • 授予单位 Georgia Institute of Technology.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 236 p.
  • 总页数 236
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号