Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Vulnerability of Network Traffic Using Joint Security and Routing Analysis
#1

Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis
When the security and routing protocols are analyzed independently several vulnerabilities of the secure network traffic remains undetected. A joint analysis of security and routing protocols in wireless networks reveals these vulnerabilities of secure network traffic. a class of continuous metrics is developed for evaluating the vulnerability of the network traffic as a function of the routing protocols and security protocols used in the network. The set theory and the circuit theory is used to develop two complementary interpretations of security in the network. a network analyst or an adversary can then easily determine the weaknesses in the secure network. a nonlinear integer programming minimization problem is used to model the node capture attacks using the vulnerability metric. The Greedy Node capture Approximation using Vulnerability Evaluation (GNAVE) algorithm is proposed.

Get the report here:
http://wnss.sv.cmu.edu/papers/tdsc-09.pdf
Reply

#2
Abstract:
Joint analysis of security and routing protocols in wireless networks reveals vulnerabilities of secure network traffic that remain undetected when security and routing protocols are analyzed independently. We formulate a class of continuous metrics to evaluate the vulnerability of network traffic as a function of security and routing protocols used in wireless networks. We demonstrate vulnerability evaluation using the proposed.metrics and node capture attacks using the GNAVE algorithm.
Reply

#3
Hi..
iam doing a project on the topic "Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis"..Could anyone pls help me out with this????????i want the source code and report..kindly send me d details to [email protected]
Reply

#4
hi
i need the project report of the evaluting vulneability network traffic using joint security and routing analysis


plz forward the report to my mail id

[email protected]
Reply

#5
hey
please read
http://wnss.sv.cmu.edu/papers/tdsc-09.pdf
http://portal.acmcitation.cfm?id=1550410.1550667&coll=GUIDE&dl=GUIDE
http://doi.ieecomputersociety10.1109/TDSC.2008.60
Reply



Forum Jump:


Users browsing this thread:
2 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.