{"id":117142,"date":"2018-03-11T10:46:32","date_gmt":"2018-03-11T10:46:32","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/the-use-of-computational-intelligence-for-security-in-named-data-networking\/"},"modified":"2018-03-11T10:46:32","modified_gmt":"2018-03-11T10:46:32","slug":"the-use-of-computational-intelligence-for-security-in-named-data-networking","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/arquitectura-de-ordenadores\/the-use-of-computational-intelligence-for-security-in-named-data-networking\/","title":{"rendered":"The use of computational intelligence for security in named data networking"},"content":{"rendered":"<h2>Tesis doctoral de <strong> Amin Karami <\/strong><\/h2>\n<p>Information-centric networking (icn) ha sido recientemente considerado como un paradigma prometedor parala nueva generaci\u00f3n de internet, pasando del paradigma de la comunicaci\u00f3n de extremo a extremo impulsada por el emisora un paradigma de obtenci\u00f3n de contenidos impulsada por el receptor. En icn, el contenido (m\u00e1s que los nodos, como sucede en redes ipactuales) juega el papel central en las comunicaciones. Este cambio de \u00abhost-centric\u00bb a \u00abcontent-centric\u00bb tiene varias ventajas importantes como la reducci\u00f3n de la carga de red, la baja latencia, escalabilidad, etc. Uno de los principales requisitos de dise\u00f1o para las arquitecturas icn (ya desde el principiode su dise\u00f1o) ha sido una fuerte seguridad. named data networking (ndn) (tambi\u00e9n conocida como content-centric networking (ccn) o data-centric networking (dcn)) es una de estas arquitecturas que son objetode investigaci\u00f3n y que tiene como objetivo convertirse en la forma en que internet funcionar\u00e1 en el futuro. Laseguridad de ndn est\u00e1 a\u00fan en una etapa inicial. Para hacer ndn un sistema totalmente funcional a escala de internet, todav\u00eda hay muchas piezas que faltan por dise\u00f1ar. Enesta tesis, estudiamos los cuatro problemas de seguridad m\u00e1s importantes de ndn, para defendersecontra nuevas formas de ataques (incluyendo los potencialmente desconocidos), asegurar la privacidad, lograr una alta disponibilidad, y bloquear los tr\u00e1ficos de red maliciosos o al menos limitar su eficacia. Estos cuatro problemas son: detecci\u00f3n de anomal\u00edas, ataques dos \/ ddos, control de congesti\u00f3n y ataques de contaminaci\u00f3n cach\u00e9. Para solventar tales problemas necesitamos sistemas de defensa flexibles, adaptables y robustos que puedantomar decisiones inteligentes en tiempo real para permitir a las entidades de red que se comporten de manera r\u00e1pida e inteligente. Es por ello que utilizamos inteligencia computacional (ic), ya que sus caracter\u00edsticas (la adaptaci\u00f3n, la tolerancia a fallos, alta velocidad de c\u00e1lculo y funcionamiento adecuado con informaci\u00f3n con altos niveles de ruido), la hace adecuada para ser aplicada al problema de la seguridad ndn.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>The use of computational intelligence for security in named data networking<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 The use of computational intelligence for security in named data networking <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Amin Karami <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Polit\u00e9cnica de catalunya<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 16\/02\/2015<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Manel Guerrero Zapata<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Mar\u00eda \u00e1ngeles V\u00e1zquez castro <\/li>\n<li>boris Bellalta jim\u00e9nez (vocal)<\/li>\n<li>  (vocal)<\/li>\n<li>  (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Amin Karami Information-centric networking (icn) ha sido recientemente considerado como un paradigma prometedor parala nueva generaci\u00f3n de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[4810,15977,15596],"tags":[230967,126384,226356,50921],"class_list":["post-117142","post","type-post","status-publish","format-standard","hentry","category-arquitectura-de-ordenadores","category-diseno-con-ayuda-de-ordenador","category-politecnica-de-catalunya","tag-amin-karami","tag-boris-bellalta-jimenez","tag-manel-guerrero-zapata","tag-maria-angeles-vazquez-castro"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/117142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=117142"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/117142\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=117142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=117142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=117142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}