haku: @instructor Beijar, Nicklas / yhteensä: 30
viite: 1 / 30
« edellinen | seuraava »
Tekijä: | Kabir, Hammad |
Työn nimi: | Security Mechanisms for a Cooperative Firewall |
Julkaisutyyppi: | Diplomityö |
Julkaisuvuosi: | 2014 |
Sivut: | xi + 115 s.+ liitt. 3 Kieli: eng |
Koulu/Laitos/Osasto: | Sähkötekniikan korkeakoulu |
Oppiaine: | Networking Technology (S3029) |
Valvoja: | Kantola, Raimo |
Ohjaaja: | Beijar, Nicklas |
Elektroninen julkaisu: | http://urn.fi/URN:NBN:fi:aalto-201404181705 |
OEVS: | Sähköinen arkistokappale on luettavissa Aalto Thesis Databasen kautta.
Ohje Digitaalisten opinnäytteiden lukeminen Aalto-yliopiston Harald Herlin -oppimiskeskuksen suljetussa verkossaOppimiskeskuksen suljetussa verkossa voi lukea sellaisia digitaalisia ja digitoituja opinnäytteitä, joille ei ole saatu julkaisulupaa avoimessa verkossa. Oppimiskeskuksen yhteystiedot ja aukioloajat: https://learningcentre.aalto.fi/fi/harald-herlin-oppimiskeskus/ Opinnäytteitä voi lukea Oppimiskeskuksen asiakaskoneilla, joita löytyy kaikista kerroksista.
Kirjautuminen asiakaskoneille
Opinnäytteen avaaminen
Opinnäytteen lukeminen
Opinnäytteen tulostus
|
Sijainti: | P1 Ark Aalto 1012 | Arkisto |
Avainsanat: | IP CES security traversal DoS NAT reachability |
Tiivistelmä (eng): | The growing number of mobile users and mobile broadband subscriptions around the world calls for support of mobility in the Internet and also demands more addresses from the already depleting IP address space. The deployment of Network Address Translation (NAT) at network edges to extend the lifetime of IPv4 address space introduced the reachability problem in the Internet. While various NAT traversal proposals have attempted to solve the reachability problem, no perfect solution for mobile devices has been proposed. A solution is proposed at COMNET department of Aalto University, which is called Customer Edge Switching and it has resulted in a prototype called Customer Edge Switches (CES). While it addresses many of the current Internet issues i.e. reachability problem, IPv4 address space depletion, so far security has generally been considered out of scope. This thesis aims at identifying the security vulnerabilities present within the CES architecture. The architecture is secured against various network attacks by presenting a set of security models. The evaluation and performance analysis of these security models proves that the CES architecture is secured against various network attacks only by introducing minimal delay in connection establishment. The delay introduced does not affect the normal communication pattern and the sending host does not notice a difference compared to the current situation. For legacy interworking a CES can have the Private Realm Gateway (PRGW) function. The security mechanisms for PRGW also generate promising results in terms of security. The thesis further contributes towards security by discussing a set of deployment models for PRGW and CES-to-CES communication. |
ED: | 2014-04-20 |
INSSI tietueen numero: 48906
+ lisää koriin
« edellinen | seuraava »
INSSI