DocumentCode :
153712
Title :
Dynamically Differentiated Multipath Security in Fixed Bandwidth Networks
Author :
Obert, James ; Pivkina, Inna ; Hong Huang ; Huiping Cao
Author_Institution :
Cyber R&D Solutions, Sandia Nat. Labs., Albuquerque, NM, USA
fYear :
2014
fDate :
6-8 Oct. 2014
Firstpage :
88
Lastpage :
93
Abstract :
Networks can be secured using a secure quality of service approach in which a sender disperses data along multiple secure paths. In this secure multipath approach, a portion of the data from the sender is transmitted over each path on fixed bandwidth networks, and the receiver assembles the data fragments that arrive. The research presented explores the effects of cloud infrastructure attack scenarios, and gauges the threat levels along each path. Optimal sampling and compression via compressed sensing is employed in order to minimize the possibility of dropped packets and missed attacks. The probability of the presence of specific attack signatures along each network path is determined using statistical learning techniques. Path information assurance levels are derived using these probabilities and encryption strengths are dynamically increased along those paths found to be most vulnerable. As compared to statically employed path encryption schemes, the devised methods in this research significantly increase data throughput on fixed bandwidth networks.
Keywords :
cloud computing; compressed sensing; cryptography; learning (artificial intelligence); multipath channels; probability; sampling methods; telecommunication network routing; telecommunication security; cloud infrastructure attack scenarios; compressed sensing; data dispersion; data throughput; dropped packet possibility minimization; dynamically differentiated multipath security; encryption strengths; fixed bandwidth networks; missed attack possibility minimization; optimal compression; optimal sampling; path encryption schemes; path information assurance levels; secure multipath approach; secure quality-of-service approach; statistical learning techniques; Clustering algorithms; Compressed sensing; Encryption; Feature extraction; Routing; Throughput; Anomaly Detection; Information Assurance; Multipath Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference (MILCOM), 2014 IEEE
Conference_Location :
Baltimore, MD
Type :
conf
DOI :
10.1109/MILCOM.2014.22
Filename :
6956742
Link To Document :
بازگشت