Show simple item record

dc.contributor.advisorThomas, Johnson
dc.contributor.authorGodse, Aditi
dc.date.accessioned2014-04-15T18:31:06Z
dc.date.available2014-04-15T18:31:06Z
dc.date.issued2007-05-01
dc.identifier.urihttps://hdl.handle.net/11244/8154
dc.description.abstractIn this thesis we investigate the vulnerabilities present in protocols and the damage that can arise if these vulnerabilities are exploited by a malicious node. In particular, we model protocols using Petri nets. Petri nets allow us to simulate the protocols and reason about them. Attacks are also modeled using Petri nets. We develop a tool to correlate the protocol Petri net and the attack Petri net to identify the worst vulnerability in the protocol and a payoff function is applied to measure the potential damage. Once the weak link in the protocol is identified, we propose approaches to reduce or eliminate the identified vulnerability. The modified protocol is also modeled as a Petri net.
dc.formatapplication/pdf
dc.languageen_US
dc.publisherOklahoma State University
dc.rightsCopyright is held by the author who has granted the Oklahoma State University Library the non-exclusive right to share this material in its institutional repository. Contact Digital Library Services at lib-dls@okstate.edu or 405-744-9161 for the permission policy on the use, reproduction or distribution of this material.
dc.titlePetri Net Based Model for Protocol Damage Detection and Protection
dc.typetext
dc.contributor.committeeMemberPark, N.
dc.contributor.committeeMemberChandler, John P.
osu.filenameGodse_okstate_0664M_2188.pdf
osu.collegeArts and Sciences
osu.accesstypeOpen Access
dc.description.departmentComputer Science Department
dc.type.genreThesis


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record