dc.contributor.advisor | Thomas, Johnson | |
dc.contributor.author | Godse, Aditi | |
dc.date.accessioned | 2014-04-15T18:31:06Z | |
dc.date.available | 2014-04-15T18:31:06Z | |
dc.date.issued | 2007-05-01 | |
dc.identifier.uri | https://hdl.handle.net/11244/8154 | |
dc.description.abstract | In this thesis we investigate the vulnerabilities present in protocols and the damage that can arise if these vulnerabilities are exploited by a malicious node. In particular, we model protocols using Petri nets. Petri nets allow us to simulate the protocols and reason about them. Attacks are also modeled using Petri nets. We develop a tool to correlate the protocol Petri net and the attack Petri net to identify the worst vulnerability in the protocol and a payoff function is applied to measure the potential damage. Once the weak link in the protocol is identified, we propose approaches to reduce or eliminate the identified vulnerability. The modified protocol is also modeled as a Petri net. | |
dc.format | application/pdf | |
dc.language | en_US | |
dc.publisher | Oklahoma State University | |
dc.rights | Copyright is held by the author who has granted the Oklahoma State University Library the non-exclusive right to share this material in its institutional repository. Contact Digital Library Services at lib-dls@okstate.edu or 405-744-9161 for the permission policy on the use, reproduction or distribution of this material. | |
dc.title | Petri Net Based Model for Protocol Damage Detection and Protection | |
dc.type | text | |
dc.contributor.committeeMember | Park, N. | |
dc.contributor.committeeMember | Chandler, John P. | |
osu.filename | Godse_okstate_0664M_2188.pdf | |
osu.college | Arts and Sciences | |
osu.accesstype | Open Access | |
dc.description.department | Computer Science Department | |
dc.type.genre | Thesis | |