SOFTWARE DEFINED CUSTOMIZATION OF NETWORK PROTOCOLS WITH LAYER 4.5
Author
Lukaszewski, Daniel F.
Date
2022-09Advisor
Xie, Geoffrey G.
Kroll, Joshua A.
Kolsch, Mathias N.
Stanica, Pantelimon
Rohrer, Justin P.
Wiegand, Karl, USN (Reserves)
Metadata
Show full item recordAbstract
The rise of software defined networks, programmable data planes, and host level kernel programmability gives rise to highly specialized enterprise networks. One form of network specialization is protocol customization, which traditionally extends existing protocols with additional features, primarily for security and performance reasons. However, the current methodologies to deploy protocol customizations lack the agility to support rapidly changing customization needs. This dissertation designs and evaluates the first software-defined customization architecture capable of distributing and continuously managing protocol customizations within enterprise or datacenter networks. Our unifying architecture is capable of performing per-process customizations, embedding per-network security controls, and aiding the traversal of customized application flows through otherwise problematic middlebox devices. Through the design and evaluation of the customization architecture, we further our understanding of, and provide robust support for, application transparent protocol customizations. We conclude with the first ever demonstration of active application flow "hot-swapping" of protocol customizations, a capability not currently supported in operational networks.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Cryptology Management in a Quantum Computing Era
Rosenberg, Nathanial Owen (Monterey, California. Naval Postgraduate School, 2012-06);Todays most efficient and widely used cryptographic standards such as RSA rely on the difficulty of factoring large numbers to resist cryptanalysis. Asymmetric cryptography is used in a plethora of sensitive operations ... -
DYNAMIC DATA EXFILTRATION OVER COMMON PROTOCOLS VIA SOCKET LAYER PROTOCOL CUSTOMIZATION
Bergen, Eric R. (Monterey, CA; Naval Postgraduate School, 2022-06);Obfuscated data exfiltration perpetrated by malicious actors presents a significant threat to organizations looking to protect sensitive data. Socket layer protocol customization presents the potential to enhance obfuscated ... -
INTEGRATION OF INTEROPERABLE ANDROID-BASED COMMAND AND CONTROL SYSTEMS TO CREATE MORE REALISTIC TACTICAL TRAINING
Weissenberger, Bernd (Monterey, CA; Naval Postgraduate School, 2021-06);This thesis focuses on the interoperability of Android mobile devices during live military training to model the dynamic nature of adversarial forces and enhance realism. The research explores the efficient and effective ...