Repository logo
Log In(current)
  1. Home
  2. Colleges & Schools
  3. Graduate School
  4. Masters Theses
  5. The design and implementation of a sensor fused network security system architecture
Details

The design and implementation of a sensor fused network security system architecture

Date Issued
December 1, 2002
Author(s)
Rudisill, Jason S.
Advisor(s)
Phillip W. Smith
Abstract

In this thesis, a sensor fusion inspired system architecture for network security is presented. A protocol for the architecture is presented which is flexible, secure, and uses very little system resources. The message format, actions taken upon receipt and sequence of messages are all defined for the protocol. A sample application was developed to implement six of the messages: Hello, Introduce, Validate, Search, Block IP, and Goodbye. These six messages provide the core behavioral framework for the protocol. Many of the current intrusion detection systems (IDS) are designed to only monitor a single host, or a single network. Many of these IDS have been evaluated in efforts such as the DARPA MIT-Lincoln Lab IDS evaluations of 1998 and 1999. Most of these systems performed with various degrees of success depending on the mode and originality of the attacks. This architecture is designed to be independent of developments in intrusion detection (ID) and firewalling systems by providing an additional layer of defense. This additional layer doesn't detect the attack; it communicates the attack to the neighboring network so that defensive actions can be taken by the network as a whole not just the host. This technique of fusion would allow IDS that have ''marginal" success rates to combine its output with the output of additional local or remote detection systems and create a more successful judgement of the attack. This information could then be acted upon by the whole network of nodes, iri the form of firewalling or other mechanism, and not just the victim host. Testing showed that the application was able to detect attacks that originate on the Internet or on the local network and actively request and block the attacking IP closest to the source. This eliminates the route on which the attacking packets can pass, thus protecting the network. Additional in field-testing is still needed due to the limitations of the test bed. Future possible uses and expansions of the protocol are presented. Some of these possible expansions include: traffic throttling of attackers, requests for deeper forensic ID analysis, and warning of "spoofed" packets.

Degree
Master of Science
Major
Electrical Engineering
File(s)
Thumbnail Image
Name

RudisillJason_2002_OCRed.pdf

Size

2.46 MB

Format

Adobe PDF

Checksum (MD5)

d2134143f5351fcd8a097c04a6561b8f

Learn more about how TRACE supports reserach impact and open access here.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback
  • Contact
  • Libraries at University of Tennessee, Knoxville
Repository logo COAR Notify