Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/3102
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Tuğlular, Tuğkan | en |
dc.contributor.author | Çalışkan, Ezgi | - |
dc.date.accessioned | 2014-07-22T13:50:52Z | - |
dc.date.available | 2014-07-22T13:50:52Z | - |
dc.date.issued | 2011 | en |
dc.identifier.uri | http://hdl.handle.net/11147/3102 | - |
dc.description | Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2011 | en |
dc.description | Includes bibliographical references (leaves: 53-54) | en |
dc.description | Text in English; Abstract: Turkish and English | en |
dc.description | x, 61 leaves | en |
dc.description.abstract | The change in technology of network components has enabled more complex and dynamic computer networks to occur. At present, most network components can easily be attached to or removed from computer networks. This situation causes the static prevention techniques to be inadequate. In static prevention, any situation which is different than expected ones occurs, the default rule is taken granted for it. Detecting unpredictable situations and finding out solutions for them takes time. There are some network systems, which control network parameters dynamically, such as intrusion detection systems integrated firewalls. However, even if these systems control traffic parameters, they can only alert when the parameter values are not in the given range. They may not be successful to determine well-designed attacks or even if the system determines the attack, it takes time to interfere. Instead of static approaches, a dynamic network security system, which is compatible with dynamic network topology and can update the security issues according to changes in network, is needed. To achieve this dynamic nature, the network must be monitored. Then controlling and managing new components could be easier and more secure. New security rules must be created for the newly attached network components or security rules must be removed for removed network components. In this thesis, an approach to monitor a campus area network and dynamically update firewall rules according to monitoring results is proposed. The implemented approach is validated through a case study. | en |
dc.language.iso | en | en_US |
dc.publisher | Izmir Institute of Technology | en |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject.lcsh | Computer networks--Security measures--Software | en |
dc.subject.lcsh | Firewalls (Computer security) | en |
dc.title | Campus network topology discovery and distributed firewall policy generation | en_US |
dc.type | Master Thesis | en_US |
dc.institutionauthor | Çalışkan, Ezgi | - |
dc.department | Thesis (Master)--İzmir Institute of Technology, Computer Engineering | en_US |
dc.relation.publicationcategory | Tez | en_US |
item.fulltext | With Fulltext | - |
item.grantfulltext | open | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Master Thesis | - |
Appears in Collections: | Master Degree / Yüksek Lisans Tezleri |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
T000915.pdf | MasterThesis | 2.71 MB | Adobe PDF | View/Open |
CORE Recommender
Page view(s)
776
checked on Nov 18, 2024
Download(s)
550
checked on Nov 18, 2024
Google ScholarTM
Check
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.