thesisIn today's IP networks, any host can send packets to any other host irrespective of whether the recipient is interested in communicating with the sender or not. The downside of this openness is that every host is vulnerable to an attack by any other host. We ob- serve that this unrestricted network access (network ambient authority) from compromised systems is also a main reason for data exfiltration attacks within corporate networks. We address this issue using the network version of capability based access control. We bring the idea of capabilities and capability-based access control to the domain of networking. CeNet provides policy driven, fine-grained network level access control enforced in the core of the network (and not at th...
The success of the Internet has brought out extraordinary benefits to our society. Current Internet ...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
2018 Fall.Includes bibliographical references.Security is a very serious concern in this era of digi...
The growing number of mobile users and mobile broadband subscriptions around the world calls for sup...
Capabilities-based networks present a fundamental shift in the security design of network architectu...
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) atta...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
The range and number of new applications and services are growing at an unprecedented rate. Computer...
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) atta...
Cyber Physical Systems (CPS) couple digital systems with the physical environment, creating technica...
In public safety many actors work together to achieve a common goal. However, communication among th...
Evaluating if a computer network only permits allowed business operations without transmitting unwan...
Network operators need detailed understanding of their networks in order to ensure functionality and...
This thesis describes challenges encountered during a year-long effort to improve the security of th...
5th Generation (5G) and Internet of Things (IoT) have contributed to the rise in connected devices, ...
The success of the Internet has brought out extraordinary benefits to our society. Current Internet ...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
2018 Fall.Includes bibliographical references.Security is a very serious concern in this era of digi...
The growing number of mobile users and mobile broadband subscriptions around the world calls for sup...
Capabilities-based networks present a fundamental shift in the security design of network architectu...
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) atta...
In this dissertation, we present a network design called Rule-Based Forwarding (RBF) that provides f...
The range and number of new applications and services are growing at an unprecedented rate. Computer...
In this paper, we propose a new approach to preventing and constraining denial-of-service (DoS) atta...
Cyber Physical Systems (CPS) couple digital systems with the physical environment, creating technica...
In public safety many actors work together to achieve a common goal. However, communication among th...
Evaluating if a computer network only permits allowed business operations without transmitting unwan...
Network operators need detailed understanding of their networks in order to ensure functionality and...
This thesis describes challenges encountered during a year-long effort to improve the security of th...
5th Generation (5G) and Internet of Things (IoT) have contributed to the rise in connected devices, ...
The success of the Internet has brought out extraordinary benefits to our society. Current Internet ...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
2018 Fall.Includes bibliographical references.Security is a very serious concern in this era of digi...