Tesi sul tema "Internet – security measures. sears"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Internet – security measures. sears".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
King-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Testo completoNaude, Kevin Alexander. "Assessing program code through static structural similarity". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/578.
Testo completoYu, Kin-ying, e 余見英. "Efficient schemes for anonymous credential with reputation support". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48330012.
Testo completopublished_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Sato, Keiko. "Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.
Testo completoRutherford, Andrew. "Introducing hippocratic log files for personal privacy control". Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/171.
Testo completoMarais, Terrence K. "Electronic payment and security on the Internet". Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52819.
Testo completoENGLISH ABSTRACT: The greatest potential worry that an on-line shopper has is what happens to his/her credit card details from the moment "submit" is pressed on the computer. Is it possible for someone on the Internet to intercept the message and use credit card details maliciously? Also, there is a lot of talk about personal details being encrypted, but how sure is one that this was indeed the case once "submit" has been pressed? Is there a way in which one can be sure that a transaction will occur only once? Many of the security issues are new and many experts are only learning how to deal with these now. This thesis offers suggestions and strategies a user can follow to minimize misuse and abuse of payment details. Electronic payment is the backbone of e-commerce, and the biggest threat towards widespread acceptance and usage of e-commerce is security. Many innovative solutions have been developed by vendors to address security issues. For example, the Secure Electronic Transfer (SET) protocol was developed to ensure that credit card transactions could be conducted safely and securely on the Internet. Secure Socket Layer (SSL) ensures that all communications and transactions are conducted in a tightly secure environment. This is critical for online or mobile banking and other financial activities. Others developments include payment systems that ensure that credit card details are never exposed to a merchant (e.g. SET), while some ensure that credit card numbers never enter the Internet. The five corner stones of security are confidentiality, privacy, authentication, integrity and non-repudiation. Authentication, non-repudiation and integrity can be resolved with digital certificates, digital timestamps and digital signatures. Message confidentiality, on the other hand, is ensured through the use of strong encryption. Encryption systems mutilate data or a message to such an extent that it is totally useless to someone who does not have the appropriate algorithm and key to decode it. The most widely used encryption schemes are the secret key and public key encryption systems. The public key cryptosystem generates two keys, called a public and private key. The public key can be made generally known, but the private key must be kept secret. A unique property of the scheme is that once data is encrypted with one key, only the corresponding other key of the pair can decrypt it. This makes it possible to address issues of authentication, integrity and non-repudiation. Traditional payment instruments such as cash, cheques, debit and credit card transactions are being replaced by their electronic equivalents. The driving forces behind these are transactional security, efficiency and speed. Novel payment solutions and strategies have been devised to meet the challenges of this new economy. For example, smart cards can act as an electronic purse that can hold electronic money. Other information, such as personal details, medical records, driver's licence, etc. can also be stored on the card. Whilst many security experts are in agreement that security is not a barrier anymore for wider usage of the Internet for financial transactions, many consumers are still apprehensive about how secure and safe it really is. This work aims to diminish those fears and show that the Internet is safe for business.
AFRIKAANSE OPSOMMING: Een van die grootste bekommernisse wat 'n kliënt met aankope op die Internet kan ondervind, is die onsekerheid wat presies gebeur nadat betalings aangegaan is en "Submit" is gedruk. Is dit moontlik dat iemand die boodskap kan onderskep en betaling besonderhede vir eie gebruik kan herwin? Daar is ook baie publisiteit oor kodifisering, maar hoe kan die klient verseker wees dat betalings besonderhede wel gekodifiseer is wanneer "Submit" gedruk was? Is daar 'n manier waarmee 'n mens verseker kan wees dat betaling slegs eenkeer gaan geskied? Baie van die sekuriteits lokvalle is nuut en sekuritiets kenners is tans besig om te leer hoe om die probleme te hanteer. Die werkstuk offer wenke en strategieë vir die verbruiker om die misbruik van betaling besondehede op die Internet te minimiseer. Elektronies betalings meganisme is die ruggraat van elektroniese besigheid, en die grootste struikelblok tot die grootskaalse gebruik daarvan is sekuriteit. Daar is baie innoverende oplossings om die probleme hok te slaan. By voorbeeld, die Secure Electronic Transfer (SET) protokol was ontwikkel om te verseker dat betalings met kredietkaart met hoë sekuriteit en veiligheid aangegaan kan word. Secure Socket Layers (SSL), verseker dat alle kommunikasies en transaksies in 'n sekuur en veilige omgewing plaasvind. Dit is veral krities wanneer die verbruiker gebruik maak van die Internet of vanaf selfone om transaksies aan te gaan met 'n bank. Ander ontwikkelinge sluit in betalings metodes wat verseker dat die handelaar nooit die kredietkaart besonderhede sien nie (bv. SET). Ander verseker weer dat die betalings besonderhede nooit oor die Internet hoef gestuur te word nie. Die vyf hoekstene van sekuriteit is konfidensialiteit, privaatheid, outentisiteit, integriteit en non-repudiasie. Outentisiteit, integriteit en non-repudiasie word opgelos deur die gebruik maak van digitale sertifikate, digitale tydstempels en digitale handtekeninge. Konfidensialiteit kan verseker word deur die boodskap te kodifiseer. Kodifikasie behels die verandering van data of boodskappe op so 'n wyse dat dit van geen betekenis is vir 'n persoon wat nie die korrekte algoritme en sleutel het om dit te dekodifiseer nie. Die geheime en publieke kodifiserings stelsels word die meeste gebruik om data te kodifiseer. Die publieke kodifiserings stelsel genereer twee sleutels, naamlik 'n privaat en publieke sleutel. Die publieke sleutel kan alom bekend gemaak word, maar die private sleutel moet slegs bekend wees aan sy gebruiker. 'n Unieke eienskap van die stelsel is dat indien 'n boodskap gekodifiseer is met een sleutel, slegs die ander sleutel van die paar dit sal kan dekodifiseer. Dit maak dit moontlik om outentisiteit, integriteit en non-repudiasie toe te pas. Die tradisionele metodes van betaling soos kontant, tjek en debiet of kredietkaart, gaan mettertyd vervang word deur hul elektroniese eweknie. Die dryfkrag agter die verskynsel is die hoë sekuriteit, doeltreffendheid en spoed waarmee transaksies op die manier gehanteer kan word. Vindingryke betaling metodes is ontdek om die besondere uitdagings van die nuwe ekonomie aan te speek. Byvoorbeeld, knap kaarte kan gebruik word as 'n elektroniese beursie wat elektroniese geld bêre. Ander persoonlike inligting, mediese records, bestuurlisensies, ens. kan ook op die kaart geberg word. Terwyl baie sekuriteits kenners glo dat sekuriteit nie meer 'n stuikelblok is om die Internet vir besigheids transaksies te gebruik nie, bly baie van die verbruikers skepties. Die werkstuk se doel is om daardie onsekerhede uit die weg te ruim, deur te verduidelik hoe sekuriteit toe gepas word, en om te bewys dat die Internet interdaad veilig is as a medium vir besigheids transaksies.
Nagarle, Shivashankarappa A. "Novel framework to support information security audit in virtual environment". Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/aa65bb37-9504-46d3-930e-44ec71f745f3/1.
Testo completoDe, Villiers R. R. (Raoul Reenen). "The role of risk perception in Internet purchasing behaviour and intention". Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52570.
Testo completoENGLISH ABSTRACT: In recent years the importance and number of users of electronic commerce and its medium, the Internet, have grown substantially. Despite this, the Business-to- Consumer sector has shown slow expansion and limited growth, with the majority of consumers slow to adopt the Internet as a medium for purchase. A probable factor affecting the purchasing behaviour of individuals is the perception of risk of a breach in (credit card) security and/or a violation of privacy. The research discussed here indicates that two closely related constructs, namely perceived privacy risk and perceived security risk exerts an influence on the Internet purchasing behaviour of Internet users, and more importantly, the intention to purchase. In addition, the role of social pressures regarding the provision of personal and credit card information is indicated to be of considerable importance.
AFRIKAANSE OPSOMMING: Die afgelope aantal jare het die belangrikheid en gebruik van eletroniese handel en die Internet aansienlik toegeneem. Ongeag hierdie groei het die sektor gemoeid met die handel tussen besighede en verbruikers egter beperkte groei getoon. 'n Waarskynlike rede vir die tendens in Internet aankoop gedrag is die persepsie dat daar 'n risiko is van misbruik van 'n krediet kaart sowel as misbruik en skending van privaatheid. Die studie wat hier bespreek word toon aan dat twee nou verwante kostrukte, naamlik persepsie van sekuriteits- en persepsie van privaatheidsrisiko 'n rol speel in die bepaling van Internet aankoop gedrag, sowel as die intensie om te koop. Verder is die rol van sosiale druk rakende die verskaffing van persoonlike en krediet kaart inligting uitgelig as 'n faktor van uiterste belang.
Dacosta, Italo. "Practical authentication in large-scale internet applications". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44863.
Testo completoClayton, Bradley. "Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost". Thesis, Rhodes University, 2007. http://eprints.ru.ac.za/851/.
Testo completoKalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks". Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Testo completoJanz, Linda, e University of Lethbridge Faculty of Arts and Science. "Privacy and the internet : differences in perspectives". Thesis, Lethbridge, Alta. : University of Lethbridge, Faculty of Arts and Science, 1997, 1997. http://hdl.handle.net/10133/64.
Testo completoxii, 112 leaves ; 28 cm.
Cheung, Lai-sze, e 張麗詩. "Delegation of rights using PKI-based components". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29973053.
Testo completoChan, Yik-Kwan Eric, e 陳奕鈞. "Investigation of a router-based approach to defense against Distributed Denial-of-Service (DDoS) attack". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30173309.
Testo completoZhang, Junjie. "Effective and scalable botnet detection in network traffic". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44837.
Testo completoDu, Juan. "Constructing the internet panoptic-fortification: a legal study on China's internet regulatory mechanism". HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/530.
Testo completoVan, der Schyff Karl Izak. "Cloud information security : a higher education perspective". Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011607.
Testo completoPark, Yongro. "A statistical process control approach for network intrusion detection". Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6835.
Testo completoSou, Sok Fong. "An approach to protecting online personal information in Macau government". Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3869194.
Testo completoSung, Minho. "Scalable and efficient distributed algorithms for defending against malicious Internet activity". Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-07172006-134741/.
Testo completoXu, Jun, Committee Chair ; Ahamad, Mustaque, Committee Member ; Ammar, Mostafa, Committee Member ; Bing, Benny, Committee Member ; Zegura, Ellen, Committee Member.
Demir, Irfan. "Changing Privacy Concerns in the Internet Era". Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3187/.
Testo completoFriedman, Brandon. "A study of South African computer usersʹ password usage habits and attitude towards password security". Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013003.
Testo completoLeppan, Claudette. "Analysis of a South African cyber-security awareness campaign for schools using interdisciplinary communications frameworks". Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18167.
Testo completoNdinga, S'busiso Simon. "An investigation into tools and protocols for commercial audio web-site creation". Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006488.
Testo completoKruger, Richard Carl. "Investigating the possible introduction of managed broadband internet security : a pilot study". Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/791.
Testo completoENGLISH ABSTRACT: Soon after the development of the internet as a network structure connecting computers on a global scale, was the introduction of malicious computer code, which was disseminated through this network. Initially this code was the relegation of pranksters, but evolved quickly to be code causing destruction, intrusion and loss of privacy while on the internet. This code became known as the computer virus and was soon used by fraudsters to infiltrate networks to create deception and fraud for financial gain. It has become of paramount importance for users of the internet to protect themselves and their networks from these attacks, through various ingenious mechanisms of protection. The traditional mainstay for computer virus protection has been the software approach using counter code to protect against any malicious computer code. This protection has had limited success as the very nature of malicious code is constantly changing and evolving, making it sometimes an impossible task for internet users to be protected with the latest anti-virus software for protection. The author of this study introduces a managed anti-virus protection alternative which is delivered by a computer hardware device. This is a new technology and a full description is made of the role of this product as a new product development. The empirical research of this paper focuses around the test for a need for the product described to the point, but excluding commercialization.
AFRIKAANSE OPSOMMING: Kort na die ontwikkeling van die internet as 'n netwerkstruktuur wat rekenaars op 'n globale skaal verbind, was daar die bekendstelling van kwaadwillige rekenaarkodes wat reg deur die netwerk versprei het. Aanvanklik was die kode gemik op die verdrywing van poetsbakkers, maar het spoedig ontwikkel in kodeverdrywing, inmenging en verlies aan privaatheid op die internet. Hierdie kode het bekend geword as die rekenaarvirus, en is spoedig deur bedrieërs gebruik om netwerke te infiltreer om gebruikers te mislei en te bedrieg vir eie finansiële gewin. Dit het vir gebruikers van die internet van uiterste belang geword om hulle en hulle netwerkte teen hierdie aanvalle te beskerm, en wel deur middel van verskeie meganismes. Die bekendste bekermingsmatreël teen die virus is die aanwending van sagteware as teenkode. Hierdie bekermingsmetode het egter tot dusver beperkte sukses behaal, aangesien die aard van kwaadwilligheid voortdurend verander en ontwikkel, sodat dit soms onmoontlik is dat gebruikers deur die nuutste anti-virussagteware beskerm kan word. Die skrywer van hierdie verhandeling stel 'n werkbare, alternatiewe anti-virusbeskermer bekend wat deur rekenaar-hardewareplan daargestel is. Dit het nuwe tegnologie, en 'n volledige beskrywing word gegee van die rol van hierdie produk as 'n nuwe ontwikkeling. Die empiriese navorsing van die verhandeling fokus op die toets vir die noodsaaklikheid van so 'n produk, met die uisluiting van kommersialisering.
Swart, Ignatius Petrus. "Pro-active visualization of cyber security on a National Level : a South African case study". Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017940.
Testo completoJudge, Paul Q. "Security and protection architectures for large-scale content distribution". Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/9217.
Testo completoSingaravelu, Lenin. "End-to-End Security of Information Flow in Web-based Applications". Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16142.
Testo completoHlaing, Nwe Nwe. "Browser security : a requirements-based approach". Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/36887/6/36887_Digitised%20Thesis.pdf.
Testo completoNcubukezi, Tabisa. "Security considerations of e-learning in higher education institutions". Thesis, Cape Peninsula University of Technology, 2012. http://hdl.handle.net/20.500.11838/2301.
Testo completoLearning management systems (LMSs) have become the central aspects of educational processes in modern universities. Arguments are that LMSs improve educational efficiencies including the processes of storage, retrieval and exchange of content without distance, space and time constraints. A trusted platform without undue intrusions however, determines the extent to which these benefits can be realized in higher education (HE) spaces. The underlying assumption in this thesis therefore, is that e-Learning systems would lose its value and integrity when the security aspects are ignored. Despite this logic, an overwhelming evidence security omissions and disruptions continue to threaten e-Learning processes at CPUT, with a risk of the actual usage of LMS in the institution. For this reason, this study sought to investigate the extent as well as causes of existing security threats, security awareness programmes and the in/effectiveness of security measures within CPUT. Within the qualitative interpretive research framework, the purposive sampling method was used to select participants. Semi-structured interviews were then used to collect primary data from administrators, technicians, academics and students in the IT and the Public Relations departments at CPUT. The activity theory (AT) was then used as the lens to understand the security aspect in e-Learning systems in the CPUT. From this theory, an analytical framework was developed. It presents holistic view of the security environment of e- Learning as an activity system composed of actors (stakeholders), educational goals, rules (in the form of policies, guidelines and procedures), activities, mediating factors, transformation, and outcomes. The tension between these components accounts for failures in e-Learning security practices, and ultimately in the e-Learning processes. Whilst security measures exist on the e-Learning platform, findings show a combination of the tools, processes and awareness measures to be inadequate and therefore inhibiting. Poor adherence to security guidelines in particular, is a major shortfall in this institution. To this end, a continuous review of network policy, clear and consolidated communication between stakeholders as well as emphasis on the enforcement of security compliance by users across all departments is therefore recommended. Frequent security awareness and training programmes for all LMS users must also be prioritized in this institution.
Kaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications". PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.
Testo completoDe, Wit Roland Duyvené. "Provisioning VolP wireless networks with security". Thesis, Bloemfontein : Central University of Technology, Free State, 2008. http://hdl.handle.net/11462/47.
Testo completoHannigan, Kerry. "Protection and security in a technologically advanced society : children and young people's perspectives". Thesis, University of Stirling, 2014. http://hdl.handle.net/1893/21562.
Testo completoEgan, Shaun Peter. "A framework for high speed lexical classification of malicious URLs". Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011933.
Testo completoMooi, Roderick David. "A model for security incident response in the South African National Research and Education network". Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1017598.
Testo completoSanyamahwe, Tendai. "Digital forensic model for computer networks". Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Testo completoMegaw, Gregory M. "Phishing within e-commerce: reducing the risk, increasing the trust". Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/376.
Testo completoAllam, Sean. "A model to measure the maturuty of smartphone security at software consultancies". Thesis, University of Fort Hare, 2009. http://hdl.handle.net/10353/281.
Testo completoImine, Youcef. "Cloud computing security". Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Testo completoThese last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
Dyer, Kevin Patrick. "Novel Cryptographic Primitives and Protocols for Censorship Resistance". PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2489.
Testo completoCheung, Yee-him, e 張貽謙. "Secure object spaces for global information retrieval (SOSGIR)". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29869596.
Testo completoOliveira, Rogério Leão Santos de [UNESP]. "L3-arpsec - módulo seguro para controle e proteção do protocolo de resolução de endereços em redes definidas por software". Universidade Estadual Paulista (UNESP), 2015. http://hdl.handle.net/11449/128103.
Testo completoO protocolo de resolução de endereços (ARP) é usado para mapear endereços IP a endereços MAC em redes locais. Este protocolo possui algumas vulnerabilidades de segurança e uma delas é ataque Man-in-the-Middle (MITM), em que o cache ARP permite a um host interceptar pacotes trocados entre dois outros hosts. O conceito de Redes Definidas por Software (SDNs) representam uma abordagem inovadora na área de redes de computadores, uma vez que propõe um novo modelo para o controle de repasse e roteamento dos pacotes de dados que navegam na Internet. Uma das principais características deste novo paradigma é a capacidade de programar funcionalidades nos controladores de rede para gerenciar o tráfego. Este trabalho apresenta o modulo L3-ARPSec, um conjunto de instruções escritas em linguagem de programação Python que propõe uma maneira de controlar a troca de mensagens ARP e também mitigar o ataque MITM em redes locais. O módulo gerencia as requisições e respostas ARP entre todos dispositivos da rede e não permite o envenenamento do cache ARP. Depois de apresentados alguns conceitos do paradigma SDN, a estrutura do protocolo ARP e como o ataque MITM ocorre, o modulo L3-ARPSec é explicado em detalhes e os resultados de diversos testes executados são mostrados
The Address Resolution Protocol (ARP) is used to map IP addresses to MAC addresses in local area networks. This protocol has some security vulnerabilities and one of them is the Man-in-the-Middle (MITM) attack, a way to poisoning the ARP cache that allows a host to intercept packets switched between two other hosts. Software-Defined Networks (SDNs) represent an innovative approach in the area of computer networks, since they propose a new model to control forwarding and routing data packets that navigate the World Wide Web. One of the main features of this new paradigm is the ability to program functionalities in network controllers to manage the traffic. This study presents the module L3-ARPSec, a set of instructions written in the Python programming language that proposes a way to control the switching of ARP messages and also mitigates the MITM attack in local area networks. The module manages the ARP request, reply messages between all network devices and does not permit the ARP cache poisoning. After presenting some concepts of the SDN paradigm, the ARP protocol structure and how MITM attacks occurs, the L3-ARPSec module is explained in detail and the results of several tests performed are displayed
Oliveira, Rogério Leão Santos de. "L3-arpsec - módulo seguro para controle e proteção do protocolo de resolução de endereços em redes definidas por software /". Ilha Solteira, 2015. http://hdl.handle.net/11449/128103.
Testo completoCo-orientador: Christiane Marie Schweitzer
Banca: Antonio Marco Cossi
Banca: Ed'Wilson Tavares Ferreira
Resumo: O protocolo de resolução de endereços (ARP) é usado para mapear endereços IP a endereços MAC em redes locais. Este protocolo possui algumas vulnerabilidades de segurança e uma delas é ataque Man-in-the-Middle (MITM), em que o cache ARP permite a um host interceptar pacotes trocados entre dois outros hosts. O conceito de Redes Definidas por Software (SDNs) representam uma abordagem inovadora na área de redes de computadores, uma vez que propõe um novo modelo para o controle de repasse e roteamento dos pacotes de dados que navegam na Internet. Uma das principais características deste novo paradigma é a capacidade de programar funcionalidades nos controladores de rede para gerenciar o tráfego. Este trabalho apresenta o modulo L3-ARPSec, um conjunto de instruções escritas em linguagem de programação Python que propõe uma maneira de controlar a troca de mensagens ARP e também mitigar o ataque MITM em redes locais. O módulo gerencia as requisições e respostas ARP entre todos dispositivos da rede e não permite o envenenamento do cache ARP. Depois de apresentados alguns conceitos do paradigma SDN, a estrutura do protocolo ARP e como o ataque MITM ocorre, o modulo L3-ARPSec é explicado em detalhes e os resultados de diversos testes executados são mostrados
Abstract: The Address Resolution Protocol (ARP) is used to map IP addresses to MAC addresses in local area networks. This protocol has some security vulnerabilities and one of them is the Man-in-the-Middle (MITM) attack, a way to poisoning the ARP cache that allows a host to intercept packets switched between two other hosts. Software-Defined Networks (SDNs) represent an innovative approach in the area of computer networks, since they propose a new model to control forwarding and routing data packets that navigate the World Wide Web. One of the main features of this new paradigm is the ability to program functionalities in network controllers to manage the traffic. This study presents the module L3-ARPSec, a set of instructions written in the Python programming language that proposes a way to control the switching of ARP messages and also mitigates the MITM attack in local area networks. The module manages the ARP request, reply messages between all network devices and does not permit the ARP cache poisoning. After presenting some concepts of the SDN paradigm, the ARP protocol structure and how MITM attacks occurs, the L3-ARPSec module is explained in detail and the results of several tests performed are displayed
Mestre
Gerber, Tian Johannes. "VoIP : a corporate governance approach to avoid the risk of civil liability". Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1016272.
Testo completoOpie, Jake Weyman. "Securing softswitches from malicious attacks". Thesis, Rhodes University, 2007. http://hdl.handle.net/10962/d1007714.
Testo completoAbdelhafez, Mohamed. "Modeling and Simulations of Worms and Mitigation Techniques". Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19840.
Testo completoTang, Jin. "Mobile IPv4 Secure Access to Home Networks". Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.
Testo completo"Internet security threats and solutions". Thesis, 2015. http://hdl.handle.net/10210/13974.
Testo completo"A new approach to dynamic internet risk analysis". Thesis, 2009. http://hdl.handle.net/10210/2959.
Testo completo"Internet payment system--: mechanism, applications & experimentation". 2000. http://library.cuhk.edu.hk/record=b5890314.
Testo completoThesis (M.Phil.)--Chinese University of Hong Kong, 2000.
Includes bibliographical references (leaves 80-83).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgments --- p.iii
Chapter 1 --- Introduction & Motivation --- p.1
Chapter 1.1 --- Introduction --- p.1
Chapter 1.2 --- Internet Commerce --- p.3
Chapter 1.3 --- Motivation --- p.6
Chapter 1.4 --- Related Work --- p.7
Chapter 1.4.1 --- Cryptographic Techniques --- p.7
Chapter 1.4.2 --- Internet Payment Systems --- p.9
Chapter 1.5 --- Contribution --- p.16
Chapter 1.6 --- Outline of the Thesis --- p.17
Chapter 2 --- A New Payment Model --- p.19
Chapter 2.1 --- Model Description --- p.19
Chapter 2.2 --- Characteristics of Our Model --- p.22
Chapter 2.3 --- Model Architecture --- p.24
Chapter 2.4 --- Comparison --- p.30
Chapter 2.5 --- System Implementation --- p.30
Chapter 2.5.1 --- Acquirer Interface --- p.31
Chapter 2.5.2 --- Issuer Interface --- p.32
Chapter 2.5.3 --- Merchant Interface --- p.32
Chapter 2.5.4 --- Payment Gateway Interface --- p.33
Chapter 2.5.5 --- Payment Cancellation Interface --- p.33
Chapter 3 --- A E-Commerce Application - TravelNet --- p.35
Chapter 3.1 --- System Architecture --- p.35
Chapter 3.2 --- System Features --- p.38
Chapter 3.3 --- System Snapshots --- p.39
Chapter 4 --- Simulation --- p.44
Chapter 4.1 --- Objective --- p.44
Chapter 4.2 --- Simulation Flow --- p.45
Chapter 4.3 --- Assumptions --- p.49
Chapter 4.4 --- Simulation of Payment Systems --- p.50
Chapter 5 --- Discussion of Security Concerns --- p.54
Chapter 5.1 --- Threats to Internet Payment --- p.54
Chapter 5.1.1 --- Eavesdropping --- p.55
Chapter 5.1.2 --- Masquerading --- p.55
Chapter 5.1.3 --- Message Tampering --- p.56
Chapter 5.1.4 --- Replaying --- p.56
Chapter 5.2 --- Aspects of A Secure Internet Payment System --- p.57
Chapter 5.2.1 --- Authentication --- p.57
Chapter 5.2.2 --- Confidentiality --- p.57
Chapter 5.2.3 --- Integrity --- p.58
Chapter 5.2.4 --- Non-Repudiation --- p.58
Chapter 5.3 --- Our System Security --- p.58
Chapter 5.4 --- TravelNet Application Security --- p.61
Chapter 6 --- Discussion of Performance Evaluation --- p.64
Chapter 6.1 --- Performance Concerns --- p.64
Chapter 6.2 --- Experiments Conducted --- p.65
Chapter 6.2.1 --- Description --- p.65
Chapter 6.2.2 --- Analysis on the Results --- p.65
Chapter 6.3 --- Simulation Analysis --- p.69
Chapter 7 --- Conclusion & Future Work --- p.72
Chapter A --- Experiment Specification --- p.74
Chapter A.1 --- Configuration --- p.74
Chapter A.2 --- Experiment Results --- p.74
Chapter B --- Simulation Specification --- p.77
Chapter B.1 --- Parameter Listing --- p.77
Chapter B.2 --- Simulation Results --- p.77
Bibliography --- p.80