Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Louisiana Tech University

Doctoral Dissertations

Authentication protocols

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Dual Channel-Based Network Traffic Authentication, David Irakiza Oct 2014

Dual Channel-Based Network Traffic Authentication, David Irakiza

Doctoral Dissertations

In a local network or the Internet in general, data that is transmitted between two computers (also known as network traffic or simply, traffic) in that network is usually classified as being of a malicious or of a benign nature by a traffic authentication system employing databases of previously observed malicious or benign traffic signatures, i.e., blacklists or whitelists, respectively. These lists typically consist of either the destinations (i.e., IP addresses or domain names) to which traffic is being sent or the statistical properties of the traffic, e.g., packet size, rate of connection establishment, etc. The drawback with the list-based …