1 / 1

SecMon: End-to-End Quality and Security Monitoring System

SecMon: End-to-End Quality and Security Monitoring System. SecMon system Designed for Peer-to-Peer Voice over IP service with assurance of Security Quality of Service. SecMon Architecture Network model P2P overlay network Three-layer node architecture Node model

doane
Download Presentation

SecMon: End-to-End Quality and Security Monitoring System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SecMon: End-to-End Quality and Security Monitoring System • SecMon system • Designed for Peer-to-Peer Voice over IP service with assurance of • Security • Quality of Service • SecMon Architecture • Network model • P2P overlay network • Three-layer node architecture • Node model • Service Layer – SL • session establishment • reputation-based routing • session tear-down • Monitoring Layer – ML • reputation block – building node’s reputation,QoS and security routing decision support, hostile nodes isolation • monitoring block - calculation and evaluation E2E QoS parameters • security block – source and data authentication, integrity, • Transport Layer – TL • network conditions measurements, • real time and hidden data transmission • Communication between layers though Service Access Point – SAP • Reputation system model • Evidence repository feeding and Service Reputation (SR) building • For source node Sdepending on time nbased on Own Experience (OE), recommendations (V), end nodes’ credibility (IR) • QoS metrics and behaviouraldata consolidation • QoS & secure routing decision support • SecMon objectives – build a reliable and secure system for P2P VoIP • Security • Based on hiding techniques with no transmission bandwidth consumption • Digital watermarking and network steganography • Source authentication and data integrity • Quality of Service • Lightweight End-to-End QoS monitoring for network efficiency and performance • DDoS detection • Reliability • Reputation system for QoS and security support • QoS metrics and trust management for best path routing decision support • Misbehaviour detection and defence, hostile nodes isolation Fig. 1 P2P overlay network composition for SecMon Fig. 2 Three-layer node’s model for a flow transmission Fig. 3 Monitoring layer blocks and cooperation diagram Fig. 4 Example scenario of P2P communication in SecMon Contacts Tomasz Ciszkowski, t.ciszkowski@tele.pw.edu.pl Zbigniew Kotulski, z.kotulski@tele.pw.edu.pl Markus Fiedler, markus.fiedler@bth.se Charlott Eliasson, charlott.eliasson@bth.se Radu Lupu, radu.lupu@elcom.pub.ro Wojciech Mazurczyk, w.mazurczyk@tele.pw.edu.pl Fig. 5 Overall reputation management system for SecMon

More Related