• About
    • Login
    View Item 
    •   Institutional Repository Home
    • Electronic Theses and Dissertations
    • Electronic Theses and Dissertations
    • View Item
    •   Institutional Repository Home
    • Electronic Theses and Dissertations
    • Electronic Theses and Dissertations
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of Institutional RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Network Performance Analysis and Management for Cyber-Physical Systems and Their Applications

    Emfinger, William Alexander
    : https://etd.library.vanderbilt.edu/etd-11162015-090359
    http://hdl.handle.net/1803/14549
    : 2015-11-27

    Abstract

    Cyber-Physical Systems (CPS) are becoming increasingly distributed in nature. These distributed systems interact closely with the physical world and require the use of communications channels between the computational nodes of the system as well as to external systems. Since such systems are generally remotely deployed and managed, applications deployed onto the systems must be analyzed and verified before deployment to ensure that the network can provide enough resources to the applications and to ensure that applications will not degrade the system's overall functionality. To facilitate the development of these systems, we created analysis techniques for accurately and precisely predicting run-time application network performance and resource utilization from design-time models of the network and the applications. To validate this work, we developed network traffic production and measurement code and used run-time network emulation to enforce the network characteristics. Using these experimental results, we compared the accuracy and precision of our predictive techniques with state of the art analysis techniques. Furthermore, we implemented our modeling semantics in a communications middleware to measure the data production of each application and compared it against the application's network resource requirements. By comparing the stated resource requirements to the application's actual resource utilization, we could detect deviations and take mitigation actions. Using this measurement and detection, we showed how denial of service (DoS) and distributed DoS (DDoS) attacks could be mitigated.
    Show full item record

    Files in this item

    Icon
    Name:
    Emfinger.pdf
    Size:
    2.173Mb
    Format:
    PDF
    View/Open

    This item appears in the following collection(s):

    • Electronic Theses and Dissertations

    Connect with Vanderbilt Libraries

    Your Vanderbilt

    • Alumni
    • Current Students
    • Faculty & Staff
    • International Students
    • Media
    • Parents & Family
    • Prospective Students
    • Researchers
    • Sports Fans
    • Visitors & Neighbors

    Support the Jean and Alexander Heard Libraries

    Support the Library...Give Now

    Gifts to the Libraries support the learning and research needs of the entire Vanderbilt community. Learn more about giving to the Libraries.

    Become a Friend of the Libraries

    Quick Links

    • Hours
    • About
    • Employment
    • Staff Directory
    • Accessibility Services
    • Contact
    • Vanderbilt Home
    • Privacy Policy