Dissertation > Excellent graduate degree dissertation topics show

Research and Implementation of Anomaly Detection Technology of Internet Routing System Based on Secure Multi-Party Computation

Author: YaoZuo
Tutor: ZhuPeiDong
School: National University of Defense Science and Technology
Course: Computer Science and Technology
Keywords: Multi - party secure computation Inter-Domain Routing Security Plus homomorphic public key cryptosystem One-way function No information leakage Conspiracy
CLC: TP393.08
Type: Master's thesis
Year: 2007
Downloads: 54
Quote: 0
Read: Download Dissertation

Abstract


Currently, the Internet inter-domain routing security is of great concern, and in-depth analysis of the current research work on inter-domain routing security. To ensure inter-domain routing system health management plane inter-domain routing monitoring based on the existing network equipment is a very real and truly effective technical approaches, but the to privacy leak problem exists in the monitoring process. Multi-party secure computation (Secure Multi-Party Computation, SMC) precisely in a multi-user network distrust each user through the network to collaborative completion of reliable computing tasks, while protecting the security of their data. Directly apply the research results of the general multi-party secure computation protocol routing anomaly detection this special case is not practical, because it would affect the computational efficiency or security special case. Therefore study the special case of the multi-party secure computation, high efficiency, strong security special multi-party secure computation protocol is given a meaningful work is also currently working on a hot research topic. Privacy issues involved due to the existing monitoring system should first establish a routing system based on multi-party secure computation anomaly detection system model to study a number of key technologies in the model, given the design of the detection system and to achieve, ultimately you need data for analysis of the test results discussed in the improvement of the system to guide the detecting. This is a clue for these elements to carry out in-depth research, obtained the following research: (1) propose a routing system based on multi-party secure computation anomaly detection system model. The model is based on the BGP routing table anomaly detection or anomaly detection above two applications of BGP routing policy, can take advantage of the idea of ??multi-party security to detect abnormal routing homomorphic public key cryptosystem way function combined approach can achieve information leakage, prevent collusion attack purposes. (2) two joint multi-routing table information leakage detection problem, and proposed security the MOAS anomaly detection algorithms and security path forged anomaly detection algorithm. (3) study of two multi-configuration strategy of joint detection problem of information leakage, asked the security community the consistency detection algorithm and the security and stability of consistency detection algorithm. (4) Design and implementation of communication packets based routing for multi-party secure computation system anomaly detection system MISPSec module function, and interface, and code to implement a prototype system. (5) configuration of the actual test environment, anomaly detection system MISPSec running routing system based on multi-party secure computation correctness, security analysis, computation and communication overhead.

Related Dissertations

  1. Research of the Rational Secret Sharing Technology,TN918.1
  2. Protection for critical electronic document grouping anti-collusion digital fingerprinting algorithm,TP309.7
  3. Elementary Analysis of Some Issues about Crime of Joint Corruption,D924.392
  4. Design and Improve the National Inter-domain Routing Monitoring System,TP393.08
  5. To prevent internal leakage of information application technology research,TP393.08
  6. The Research of Enterprise Capital Structure Decision Based on Environmental Liability Distribution,F275
  7. The Research of (t,n) Threshold Proxy Signature Based on Elliptic Curve Cryptosystem,TN918.1
  8. A Study of Liuliu’s TV Plays,J905
  9. The Implementation Study of Government Procurement Law in the University Area,D922.2
  10. Research on E-Cash in E-Commerce,F713.36
  11. Media Culture and Its Criticism under the Influence of Consumerism,G206
  12. Mobile Agent in Grid Environment Security Studies,TP393.08
  13. Research on Content-Based Information Leakage Prevention for Removable Storage Device,TP309.2
  14. Shareholder wealth effects of mergers and acquisitions,F271
  15. Research on Resilient Secret Sharing Scheme and Its Applications,TN918.1
  16. A Research on Tax Collusion and Earnings Management,F812.42
  17. Identification of conspiracy to prevent its application,F224
  18. Research on the Behavior Controlling of G2B Online Auction Process,F724.59
  19. Study on Software Noise Reduction Method of the Intercepted Information in the Computer,TN911.4
  20. The impact of changes in demand for conspiracy Mechanism,F224
  21. Discussion on Conspire Hypocritical Act and Legal Consequence,D923.6

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile