SecMon: EndtoEnd Quality and Security Monitoring System - PowerPoint PPT Presentation

About This Presentation
Title:

SecMon: EndtoEnd Quality and Security Monitoring System

Description:

Based on hiding techniques with no transmission bandwidth consumption ... Fig. 3 Monitoring layer blocks and cooperation diagram ... – PowerPoint PPT presentation

Number of Views:51
Avg rating:3.0/5.0
Slides: 2
Provided by: MedicalIll133
Category:

less

Transcript and Presenter's Notes

Title: SecMon: EndtoEnd Quality and Security Monitoring System


1
SecMon End-to-End Quality and Security
Monitoring System
  • SecMon system
  • Designed for Peer-to-Peer Voice over IP service
    with assurance of
  • Security
  • Quality of Service
  • SecMon Architecture
  • Network model
  • P2P overlay network
  • Three-layer node architecture
  • Node model
  • Service Layer SL
  • session establishment
  • reputation-based routing
  • session tear-down
  • Monitoring Layer ML
  • reputation block building nodes
    reputation,QoS and security routing decision
    support, hostile nodes isolation
  • monitoring block - calculation and evaluation
    E2E QoS parameters
  • security block source and data authentication,
    integrity,
  • Transport Layer TL
  • network conditions measurements,
  • real time and hidden data transmission
  • Communication between layers though Service
    Access Point SAP
  • SecMon objectives build a reliable and secure
    system for P2P VoIP
  • Security
  • Based on hiding techniques with no transmission
    bandwidth consumption
  • Digital watermarking and network steganography
  • Source authentication and data integrity
  • Quality of Service
  • Lightweight End-to-End QoS monitoring for
    network efficiency and performance
  • DDoS detection
  • Reliability
  • Reputation system for QoS and security support
  • QoS metrics and trust management for best path
    routing decision support
  • Misbehaviour detection and defence, hostile
    nodes isolation

Fig. 1 P2P overlay network composition for SecMon
Fig. 2 Three-layer nodes model for a flow
transmission
Fig. 3 Monitoring layer blocks and cooperation
diagram
Fig. 4 Example scenario of P2P communication in
SecMon
Contacts Tomasz Ciszkowski, t.ciszkowski_at_tele.pw.e
du.pl Zbigniew Kotulski, z.kotulski_at_tele.pw.edu.pl
Markus Fiedler, markus.fiedler_at_bth.se Charlott
Eliasson, charlott.eliasson_at_bth.se Radu Lupu,
radu.lupu_at_elcom.pub.ro Wojciech Mazurczyk,
w.mazurczyk_at_tele.pw.edu.pl
Fig. 5 Overall reputation management system for
SecMon
Write a Comment
User Comments (0)
About PowerShow.com