IDENTIFYING UNAUTHORIZED DEVICES ON VLANS USING SOFTWARE-DEFINED NETWORKS
Amos, Vincent T.
Xie, Geoffrey G.
Fulp, John D.
MetadataShow full item record
Current naval networks vary in size and implementation, but have one thing in common: poor network device connectivity oversight. Poor network oversight can lead to unauthorized network access, but there is a potential solution with software-defined networking (SDN). SDN technology provides the management oversight and capability to maintain a complete network picture of all connected devices. SDN is the network technology that separates the control plane from the forwarding plane of the network while providing ability to program the entire network from a central controller. This thesis reviews the current network access control solution deployed for the NPS unclassified network and creates a SDN solution aimed to provide improvements in the following areas: a centralized network topology, low management overhead, and reduction in hardware and operational costs.
Approved for public release. distribution is unlimited
Showing items related by title, author, creator and subject.
Fu Chen-Hua (Monterey, California: Naval Postgraduate School, 1993-03);Efficient performance and high throughput are the major goals of the network performance management. How can we achieve these goal? First, it is necessary to know the network traffic situations. This thesis research ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
Zhan, J.; Maltz, D.; Zhang, H.; Greenberg, A.; Hjalmtysson, G.; Rexford, J.; Xie, Geoffrey (2005-03);The primary purpose of a network is to provide reachability between applications running on end hosts. In this paper, we describe how to compute the reachability a network provides from a snapshot of the configuration state ...