Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Dynamic Traffic Driven Architectures and Algorithms for Securing Networks

Acharya, Subrata (2009) Dynamic Traffic Driven Architectures and Algorithms for Securing Networks. Doctoral Dissertation, University of Pittsburgh. (Unpublished)

[img]
Preview
PDF
Primary Text

Download (1MB) | Preview

Abstract

The continuous growth in the Internet's size, the amount of data traffic, and the complexity of processing this traffic gives rise to new challenges in building high performance network devices. Such an exponential growth coupledwith the increasing sophistication of attacks, is placing stringent demands on the performance of networked systems (Firewalls). These challengesrequire new designs, architecture and algorithms for the optimization of such systems.The current or classical security of present day Internet is "static" and "oblivious" to traffic dynamics in the network. Hence, there are tremendous efforts towards the design and development of several techniques and strategies to deal with the above shortcomings. Unfortunately, the current solutions have been successful in addressing only some aspects ofsecurity. However, as a whole security remains a major issue. This is primarily due to the lack of adaptation and dynamics in the design of such intrusion detection and mitigation systems.This thesis focuses on the design of architectures and algorithms for theoptimization of such networked systems, to aid not only adaptive and real-time "packet filtering' but also fast "content basedrouting (differentiated services)' in today's data-driven networks.The approach proposed involves a unique combination of algorithmic andarchitectural techniques that aims to outperform all current solutions in termsof adaptiveness, speed of operation (under attack or heavily loaded conditions) andoverall operational cost-effectiveness of such systems. The tools proposed in thisthesis also aim to offer the flexibility to include new approaches, and providethe ability to migrate or deploy additional entities for attack detection and defense.


Share

Citation/Export:
Social Networking:
Share |

Details

Item Type: University of Pittsburgh ETD
Status: Unpublished
Creators/Authors:
CreatorsEmailPitt UsernameORCID
Acharya, Subratasacharya@cs.pitt.edu, mily.acharya@yahoo.com
ETD Committee:
TitleMemberEmail AddressPitt UsernameORCID
Committee ChairZnati, Taiebznati@cs.pitt.eduZNATI
Committee MemberLabrinidis, Alexandroslabrinid@cs.pitt.eduLABRINID
Committee MemberAl-Shaer, Ehabehab@cs.depaul.edu
Committee MemberMelhem, Ramimelhem@cs.pitt.eduMELHEM
Date: 22 January 2009
Date Type: Completion
Defense Date: 8 August 2008
Approval Date: 22 January 2009
Submission Date: 9 July 2008
Access Restriction: 5 year -- Restrict access to University of Pittsburgh for a period of 5 years.
Institution: University of Pittsburgh
Schools and Programs: Dietrich School of Arts and Sciences > Computer Science
Degree: PhD - Doctor of Philosophy
Thesis Type: Doctoral Dissertation
Refereed: Yes
Uncontrolled Keywords: Collaborative; Computer Networks; Firewall; Hierarchical; Network Security; Optimization; Sentinel; Distributed Denial-of-Service Attack
Other ID: http://etd.library.pitt.edu/ETD/available/etd-07092008-135737/, etd-07092008-135737
Date Deposited: 10 Nov 2011 19:50
Last Modified: 15 Nov 2016 13:45
URI: http://d-scholarship.pitt.edu/id/eprint/8319

Metrics

Monthly Views for the past 3 years

Plum Analytics


Actions (login required)

View Item View Item