Limitations of Passively Mapping Logical Network Topologies

Loading...
Thumbnail Image
File version
Version of Record (VoR)
Author(s)
J. Akande, Ayodeji
Fidge, Colin
Foo, Ernest
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)
Date
2017
Size
File type(s)
Location
License
http://creativecommons.org/licenses/by/4.0/
Abstract

Understanding logical network connectivity is essential in network topology mapping especially in a fast growing network where knowing what is happening on the network is critical for security purposes and where knowing how network resources are being used is highly important. Mapping logical communication topology is important for network auditing, network maintenance and governance, network optimization, and network security. However, the process of capturing network traffic to generate the logical network topology may have a great influence on the operation of the network. In hierarchically structured networks such as control systems, typical active network mapping techniques are not employable as they can affect time-sensitive cyber-physical processes, hence, passive network mapping is required. Though passive network mapping does not modify or disrupt existing traffic, current passive mapping techniques ignore many practical issues when used to generate logical communication topologies. In this paper, we present a methodology which compares topologies from an idealized mapping process with what is actually achievable using passive network mapping and identify some of the factors that can cause inaccuracies in logical maps derived from passively monitored network traffic. We illustrate these factors using a case study involving a hierarchical control network.

Journal Title
International Journal of Computer Network and Information Security
Conference Title
Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
© The Author(s) 2017. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Rights Statement
Item Access Status
Note
Access the data
Related item(s)
Subject
Distributed computing and systems software
Persistent link to this record
Citation
J. Akande, A; Fidge, C; Foo, E, Limitations of Passively Mapping Logical Network Topologies, International Journal of Computer Network and Information Security, 2017, 9 (2), pp. 1-11
Collections