The Detecting Intrusions at Layer ONe (DILON) project investigates the use of the digital and analog characteristics of digital devices for security purposes. To this end, we present a method capable of identifying Ethernet cards based upon minute variations in their network signaling resulting from hardware and manufacturing inconsistencies, using an optimal detector, the matched filter. Our results indicate that a matched filter can easily discriminate between Ethernet cards of different models, and with sufficient preprocessing of data, cards of the same model, to an acceptable degree of accuracy. Several non-traditional applications of the filter are presented in order to improve its ability to discriminate between signals from seemingl...
Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move c...
The fast extension of inexpensive computer networks has increased the problem of unauthorized access...
Abstract—In this paper, we introduce GTID, a technique that passively fingerprints wireless devices ...
The Detecting Intrusions at Layer ONe (DILON) project investigates the use of the digital and analog...
In modern computer networks, administrators have limited control over physical security of the netwo...
Host-to-network authentication is a weak link in the chain of modern network security systems. There...
Among various types of attacks on an Ethernet network, “sniffing attack ” is probably one of the mos...
Improved network security is addressed using device dependent physical-layer (PHY) based fingerprint...
It is common practice to limit solutions for most problems in computer and network security to the p...
The tolerances in manufacturing Ethernet devices cause detectable differences in the signals sent by...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...
The issue of detecting malicious switches on the network is still a concern even as networks continu...
The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle st...
This research contributed to the AFIT\u27s Radio Frequency Intelligence (RFINT) program by developin...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...
Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move c...
The fast extension of inexpensive computer networks has increased the problem of unauthorized access...
Abstract—In this paper, we introduce GTID, a technique that passively fingerprints wireless devices ...
The Detecting Intrusions at Layer ONe (DILON) project investigates the use of the digital and analog...
In modern computer networks, administrators have limited control over physical security of the netwo...
Host-to-network authentication is a weak link in the chain of modern network security systems. There...
Among various types of attacks on an Ethernet network, “sniffing attack ” is probably one of the mos...
Improved network security is addressed using device dependent physical-layer (PHY) based fingerprint...
It is common practice to limit solutions for most problems in computer and network security to the p...
The tolerances in manufacturing Ethernet devices cause detectable differences in the signals sent by...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...
The issue of detecting malicious switches on the network is still a concern even as networks continu...
The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle st...
This research contributed to the AFIT\u27s Radio Frequency Intelligence (RFINT) program by developin...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection s...
Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move c...
The fast extension of inexpensive computer networks has increased the problem of unauthorized access...
Abstract—In this paper, we introduce GTID, a technique that passively fingerprints wireless devices ...