Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

2005

Computer network protocols

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney Mar 2005

Enabling Intrusion Detection In Ipsec Protected Ipv6 Networks Through Secret-Key Sharing, Patrick J. Sweeney

Theses and Dissertations

As the Internet Protocol version 6 (IPv6) implementation becomes more widespread, the IP Security (IPSec) features embedded into the next-generation protocol will become more accessible than ever. Though the network-layer encryption provided by IPSec is a boon to data security, its use renders standard network intrusion detection systems (NIDS) useless. The problem of performing intrusion detection on encrypted traffic has been addressed by differing means with each technique requiring one or more static secret keys to be shared with the NIDS beforehand. The problem with this approach is static keying is much less secure than dynamic key generation through the …


Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar Mar 2005

Simple Public Key Infrastructure Analysis Protocol Analysis And Design, Alexander G. Vidergar

Theses and Dissertations

Secure electronic communication is based on secrecy, authentication and authorization. One means of assuring a communication has these properties is to use Public Key Cryptography (PKC). The framework consisting of standards, protocols and instructions that make PKC usable in communication applications is called a Public Key Infrastructure (PKI). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis. A Diffie-Hellman strand space model is combined with mixed strand space proof methods for proving the …


Geolocation Of A Node On A Local Area Network, John R. Clarson Mar 2005

Geolocation Of A Node On A Local Area Network, John R. Clarson

Theses and Dissertations

Geolocation is the process of identifying a node using only its Internet Protocol (IP) address. Locating a node on a LAN poses particular challenges due to the small scale of the problem and the increased significance of queuing delay. This study builds upon existing research in the area of geolocation and develops a heuristic tailored to the difficulties inherent in LANs called the LAN Time to Location Heuristic (LTTLH). LTTLH uses several polling nodes to measure latencies to end nodes, known locations within the LAN. The Euclidean distance algorithm is used to compare the results with the latency of a …