DSpace
 

Researchspace >
General science, engineering & technology >
General science, engineering & technology >
General science, engineering & technology >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10204/3917

Title: Pattern-based approach for logical traffic isolation forensic modelling
Authors: Dlamini, I
Olivier, M
Sibiya, S
Keywords: Network forensics
Differentiated services
Decorator pattern
Observer pattern
Mediator pattern
Forensic modelling
Issue Date: Aug-2009
Citation: Dlamini, I, Olivier, M and Sibiya, S. 2009. Pattern-based approach for logical traffic isolation forensic modelling. 3rd International Workshop on Secure Systems Methodologies Using Patterns (DEXA 2009), Linz, Austria, 31 August-4 September 2009, pp 5
Abstract: The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logical Traffic Isolation (LTI) based on Differentiated Services (DiffServ) and designs the LTI model using different design patterns. Since design patterns add reliability, flexibility and reusability characteristics to a software system, this paper focuses on three design patterns in modeling the LTI architecture to achieve reusability and flexibility of the LTI model. This model is viewed as a three-tier architecture, which for experimental purposes is composed of the following components: traffic generator, DiffServ network and the sink server. The Mediator pattern is used to coordinate the traffic generator, sink server and, or preservation components, that is DiffServ domain is considered as the mediator. This study uses different design patterns to show how various patterns can be used to design the system.
Description: 3rd International Workshop on Secure Systems Methodologies Using Patterns (DEXA 2009), Linz, Austria, 31 August-4 September 2009
URI: http://hdl.handle.net/10204/3917
ISBN: 9780769537634
Appears in Collections:Safety and security
Command control and information warfare
Information security
General science, engineering & technology

Files in This Item:

File Description SizeFormat
Dlamini2_2009.pdf178.73 kBAdobe PDFView/Open
View Statistics

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback