Partha Dutta’s research while affiliated with Purdue University West Lafayette and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Security Assessment of IP-based Networks: A Holistic Approach
  • Article

October 1999

·

5 Reads

·

4 Citations

Mahesh V. Tripunitara

·

Partha Dutta

This paper deals with network security assessment. We discuss currently available network security assessment tools and provide a categorization of their limitations. We revisit the methodology that the tools are based on, the flaw-hypothesis testing methodology. We then discuss the application of the methodology to network security assessment and discuss what is necessary to augment current network security assessment tools to make the testing methodology more holistic so confidence can be placed in the results reported by the tools.


A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning.

February 1999

·

23 Reads

·

62 Citations

Discusses the Address Resolution Protocol (ARP) and the problem of ARP cache poisoning. ARP cache poisoning is the malicious act, by a host in a LAN, of introducing a spurious IP address to MAC (Ethernet) address mapping in another host's ARP cache. We discuss design constraints for a solution: the solution needs to be implemented in middleware, without any access or change to any operating system source code, it needs to be backward-compatible with the existing protocol and to be asynchronous. We present our solution and implementation aspects of it in a Streams-based networking subsystem. Our solution comprises two parts: a “bump in the stack” Streams module, and a separate Stream with a driver and user-level application. We also present the algorithm that is executed in the module and application to prevent ARP cache poisoning where possible, and to detect and raise alarms otherwise. We then discuss some limitations with our approach and present some preliminary performance figures for our implementation

Citations (2)


... Proposed by Dessouky, et al. [4] is more expensive. The middleware approach proposed by Tripunitara et al. [8] is not practical, as it requires changes on all the hosts in the network, and furthermore, no implementation is widely available for download. The prevention/blocking solution proposed by Gouda et al. [9] are the most ambitious ones, but either they require complex installations that do not scale well, are limited to static networks, or require changes on all hosts on the network. ...

Reference:

Privacy and Data Usefulness Trade-off for Autonomic IoT Applications: A Framework
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning.
  • Citing Conference Paper
  • February 1999

... Moreover, in order to find security problems caused by combinations of vulnerabilities, three kinds of techniques: model checking (Ritchey and Ammann 2000;Sheyner et al. 2002), logic programming approach (Ou et al. 2005) and exploit-dependency graph search algorithm (Jajodia et al. 2003;Ammann et al. 2002) were introduced to address network vulnerability analysis, i.e., analysis on the interdependency of multiple vulnerabilities and network connectivity. However, the current vulnerability assessment tools have the disadvantages of heavy computational costs, inaccuracy (Kotenko 2003;Tripunitara et al. 2002), and negative effect on the performance of audited systems. Moreover, the existing work could not well address the issue of automatic integration of vulnerability check and visualization of attack paths in enterprise information systems. ...

Security Assessment of IP-based Networks: A Holistic Approach
  • Citing Article
  • October 1999