Ayodeji J. Akande

Work place: School of Electrical Engineering and Computer Science, Queensland University of Technology, GPO Box 2434, Brisbane, QLD 4001 Queensland, Australia

E-mail: ayodejijames.akande@qut.edu.au

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Hardware Security, Information Security, Network Architecture, Network Security

Biography

Ayodeji J. Akande is currently a PhD student in the school of Electrical Engineering and Computer Science of the Faculty of Science and Engineering. He obtained M.IT. (Network Management) from Queensland University of Technology in 2012. His research interests include network security, network management and security in industrial control systems.

Author Articles
Limitations of Passively Mapping Logical Network Topologies

By Ayodeji J. Akande Colin Fidge Ernest Foo

DOI: https://doi.org/10.5815/ijcnis.2017.02.01, Pub. Date: 8 Feb. 2017

Understanding logical network connectivity is essential in network topology mapping especially in a fast growing network where knowing what is happening on the network is critical for security purposes and where knowing how network resources are being used is highly important. Mapping logical communication topology is important for network auditing, network maintenance and governance, network optimization, and network security. However, the process of capturing network traffic to generate the logical network topology may have a great influence on the operation of the network. In hierarchically structured networks such as control systems, typical active network mapping techniques are not employable as they can affect time-sensitive cyber-physical processes, hence, passive network mapping is required. Though passive network mapping does not modify or disrupt existing traffic, current passive mapping techniques ignore many practical issues when used to generate logical communication topologies. In this paper, we present a methodology which compares topologies from an idealized mapping process with what is actually achievable using passive network mapping and identify some of the factors that can cause inaccuracies in logical maps derived from passively monitored network traffic. We illustrate these factors using a case study involving a hierarchical control network.

[...] Read more.
Other Articles