Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2019

Discipline
Institution
Keyword
Publication

Articles 1 - 16 of 16

Full-Text Articles in OS and Networks

Detection And Countermeasure Of Saturation Attacks In Software-Defined Networks, Samer Yousef Khamaiseh Dec 2019

Detection And Countermeasure Of Saturation Attacks In Software-Defined Networks, Samer Yousef Khamaiseh

Boise State University Theses and Dissertations

The decoupling of control and data planes in software-defined networking (SDN) facilitates orchestrating the network traffic. However, SDN suffers from critical security issues, such as DoS saturation attacks on the data plane. These attacks can exhaust the SDN component resources, including the computational resources of the control plane, create a high packet loss rate and a long delay in delivering the OpenFlow messages due to the bandwidth consumption of the OpenFlow connection channel, and exhausting the buffer memory of the data plane.

Currently, most of the existing machine learning detection methods rely on a predefined time-window to start analyzing the …


Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee Oct 2019

Software-Defined Infrastructure For Iot-Based Energy Systems, Stephen Lee

Doctoral Dissertations

Internet of Things (IoT) devices are becoming an essential part of our everyday lives. These physical devices are connected to the internet and can measure or control the environment around us. Further, IoT devices are increasingly being used to monitor buildings, farms, health, and transportation. As these connected devices become more pervasive, these devices will generate vast amounts of data that can be used to gain insights and build intelligence into the system. At the same time, large-scale deployment of these devices will raise new challenges in efficiently managing and controlling them. In this thesis, I argue that the IoT …


Energy-Aware Algorithms For Greening Internet-Scale Distributed Systems Using Renewables, Vani Gupta Oct 2019

Energy-Aware Algorithms For Greening Internet-Scale Distributed Systems Using Renewables, Vani Gupta

Doctoral Dissertations

Internet-scale Distributed Systems (IDSs) are large distributed systems that are comprised of hundreds of thousands of servers located in hundreds of data centers around the world. A canonical example of an IDS is a content delivery network (CDN) that delivers content to users from a large global deployment of servers around the world. IDSs consume large amounts of energy and their energy requirements are projected to increase significantly in the future. With carbon emissions from data centers increasing every year, use of renewables to power data centers is critical for the sustainability of data centers and for the environment. In …


Franklin Township Municipal Broadband And Wireless Network, William Galtieri Sep 2019

Franklin Township Municipal Broadband And Wireless Network, William Galtieri

Mathematics and Computer Science Capstones

Franklin Township is a municipality in Somerset County, New Jersey covering an area of approximately 46.15 square miles and a population of 62,300 as of the 2010 Census. The town relies on a cellular provider to provide data connections for computers in municipal vehicles such as police cars, public works vehicles, fire inspection trucks, building inspectors and other departments. Additionally, the municipality pays for connections for security cameras at remote facilities and for smart garbage can monitoring throughout the town. These services are costly for the municipality and create a dependency on service providers for access to information needed by …


An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska Sep 2019

An Evolutionary Perspective On Foraging Strategies And Group Dynamics In Bio-Social Inspired Cognitive Radio Networks, Anna Wisniewska

Dissertations, Theses, and Capstone Projects

Saturation of wireless channels is inevitable as the number of wireless devices grows exponentially in an environment of limited radio spectrum capacity. Cognitive radio technology has been proposed to relieve overcrowded spectrum resources by allowing licensed channels to be opportunistically accessed by unlicensed users (cognitive radio devices) during periods of time when the license holder (primary user) is absent from its channel. Uncoordinated competition over limited resources among cognitive radio devices poses complex co-existence challenges. We propose novel bio-social inspired behavioral models and map out plausible evolutionary trajectories of co-use strategies in the cognitive radio ecosystem. By drawing parallels between …


Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui Aug 2019

Formally Designing And Implementing Cyber Security Mechanisms In Industrial Control Networks., Mehdi Sabraoui

Electronic Theses and Dissertations

This dissertation describes progress in the state-of-the-art for developing and deploying formally verified cyber security devices in industrial control networks. It begins by detailing the unique struggles that are faced in industrial control networks and why concepts and technologies developed for securing traditional networks might not be appropriate. It uses these unique struggles and examples of contemporary cyber-attacks targeting control systems to argue that progress in securing control systems is best met with formal verification of systems, their specifications, and their security properties. This dissertation then presents a development process and identifies two technologies, TLA+ and seL4, that can be …


Network Alignment In Heterogeneous Social Networks, Priyanka Kasbekar May 2019

Network Alignment In Heterogeneous Social Networks, Priyanka Kasbekar

Master's Projects

Online Social Networks (OSN) have numerous applications and an ever growing user base. This has led to users being a part of multiple social networks at the same time. Identifying a similar user from one social network on another social network will give in- formation about a user’s behavior on different platforms. It further helps in community detection and link prediction tasks. The process of identifying or aligning users in multiple networks is called Network Alignment. More the information we have about the nodes / users better the results of Network Alignment. Unlike other related work in this field that …


Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal May 2019

Predictive Analysis For Cloud Infrastructure Metrics, Paridhi Agrawal

Master's Projects

In a cloud computing environment, enterprises have the flexibility to request resources according to their application demands. This elastic feature of cloud computing makes it an attractive option for enterprises to host their applications on the cloud. Cloud providers usually exploit this elasticity by auto-scaling the application resources for quality assurance. However, there is a setup-time delay that may take minutes between the demand for a new resource and it being prepared for utilization. This causes the static resource provisioning techniques, which request allocation of a new resource only when the application breaches a specific threshold, to be slow and …


Dynamic Shifting Of Virtual Network Topologies For Network Attack Prevention, Lenoy Avidan May 2019

Dynamic Shifting Of Virtual Network Topologies For Network Attack Prevention, Lenoy Avidan

Master's Theses

Computer networks were not designed with security in mind, making research into the subject of network security vital. Virtual Networks are similar to computer networks, except the components of a Virtual Network are in software rather than hardware. With the constant threat of attacks on networks, security is always a big concern, and Virtual Networks are no different. Virtual Networks have many potential attack vectors similar to physical networks, making research into Virtual Network security of great importance. Virtual Networks, since they are composed of virtualized network components, have the ability to dynamically change topologies. In this paper, we explore …


Model Development And Assessment Of The Gate Network In A High-Performance Sic Power Module, William Austin Curbow May 2019

Model Development And Assessment Of The Gate Network In A High-Performance Sic Power Module, William Austin Curbow

Graduate Theses and Dissertations

The main objective of this effort is to determine points of weakness in the gate network of a high-performance SiC power module and to offer remedies to these issues to increase the overall performance, robustness, and reliability of the technology. In order to accomplish this goal, a highly accurate model of the gate network is developed through three methods of parameter extraction: calculation, simulation, and measurement. A SPICE model of the gate network is developed to analyze four electrical issues in a high-speed, SiC-based power module including the necessary internal gate resistance for damping under-voltage and over-voltage transients, the disparity …


A Mobile Cyber-Physical System Framework For Aiding People With Visual Impairment, Martin Goldberg May 2019

A Mobile Cyber-Physical System Framework For Aiding People With Visual Impairment, Martin Goldberg

Dissertations, Theses, and Capstone Projects

It is a challenging problem for researchers and engineers in the assistive technology (AT) community to provide suitable solutions for visually impaired people (VIPs) through AT to meet orientation, navigation and mobility (ONM) needs. Given the spectrum of assistive technologies currently available for the purposes of aiding VIPs with ONM, our literature review and survey have shown that there is a reluctance to adopt these technological solutions in the VIP community.

Motivated by these findings, we think it critical to re-examine and rethink the approaches that have been taken. It is our belief that we need to take a different …


Malgazer: An Automated Malware Classifier With Running Window Entropy And Machine Learning, Keith Jones Mar 2019

Malgazer: An Automated Malware Classifier With Running Window Entropy And Machine Learning, Keith Jones

Masters Theses & Doctoral Dissertations

This dissertation explores functional malware classification using running window entropy and machine learning classifiers. This topic was under researched in the prior literature, but the implications are important for malware defense. This dissertation will present six new design science artifacts. The first artifact was a generalized machine learning based malware classifier model. This model was used to categorize and explain the gaps in the prior literature. This artifact was also used to compare the prior literature to the classifiers created in this dissertation, herein referred to as “Malgazer” classifiers.

Running window entropy data was required, but the algorithm was too …


Optimal Gateway Placement In Low-Cost Smart Cities, Oluwashina Madamori Jan 2019

Optimal Gateway Placement In Low-Cost Smart Cities, Oluwashina Madamori

Theses and Dissertations--Computer Science

Rapid urbanization burdens city infrastructure and creates the need for local governments to maximize the usage of resources to serve its citizens. Smart city projects aim to alleviate the urbanization problem by deploying a vast amount of Internet-of-things (IoT) devices to monitor and manage environmental conditions and infrastructure. However, smart city projects can be extremely expensive to deploy and manage partly due to the cost of providing Internet connectivity via 5G or WiFi to IoT devices. This thesis proposes the use of delay tolerant networks (DTNs) as a backbone for smart city communication; enabling developing communities to become smart cities …


What People Complain About Drone Apps? A Large-Scale Empirical Study Of Google Play Store Reviews, Kanimozhi Kalaichelvan Jan 2019

What People Complain About Drone Apps? A Large-Scale Empirical Study Of Google Play Store Reviews, Kanimozhi Kalaichelvan

Theses, Dissertations and Capstones

Within the past few years, there has been a tremendous increase in the number of UAVs (Unmanned Aerial Vehicle) or drones manufacture and purchase. It is expected to proliferate further, penetrating into every stream of life, thus making its usage inevitable. The UAV’s major components are its physical hardware and programming software, which controls its navigation or performs various tasks based on the field of concern. The drone manufacturers launch the controlling app for the drones in mobile app stores. A few drone manufacturers also release development kits to aid drone enthusiasts in developing customized or more creative apps. Thus, …


Covertnet: Circumventing Web Surveillance Using Covert Channels, Will C. Burghard Jan 2019

Covertnet: Circumventing Web Surveillance Using Covert Channels, Will C. Burghard

Senior Projects Fall 2019

Senior Project submitted to The Division of Science, Mathematics and Computing of Bard College.


A Method Of Evaluation Of High-Performance Computing Batch Schedulers, Jeremy Stephen Futral Jan 2019

A Method Of Evaluation Of High-Performance Computing Batch Schedulers, Jeremy Stephen Futral

UNF Graduate Theses and Dissertations

According to Sterling et al., a batch scheduler, also called workload management, is an application or set of services that provide a method to monitor and manage the flow of work through the system [Sterling01]. The purpose of this research was to develop a method to assess the execution speed of workloads that are submitted to a batch scheduler. While previous research exists, this research is different in that more complex jobs were devised that fully exercised the scheduler with established benchmarks. This research is important because the reduction of latency even if it is miniscule can lead to massive …