• DocumentCode
    3238458
  • Title

    A Technique for Network Topology Deception

  • Author

    Trassare, Samuel T. ; Beverly, Robert ; Alderson, David

  • fYear
    2013
  • fDate
    18-20 Nov. 2013
  • Firstpage
    1795
  • Lastpage
    1800
  • Abstract
    Civilian and military networks are continually probed for vulnerabilities. Cyber criminals, and autonomous botnets under their control, regularly scan networks in search of vulnerable systems to co-opt. Military and more sophisticated adversaries may also scan and map networks as part of reconnaissance and intelligence gathering. This paper focuses on adversaries attempting to map a network´s infrastructure, i.e., the critical routers and links supporting a network. We develop a novel methodology, rooted in principles of military deception, for deceiving a malicious traceroute probe and influencing the structure of the network as inferred by a mapping adversary. Our Linux-based implementation runs as a kernel module at a border router to present a deceptive external topology. We construct a proof-of-concept test network to show that a remote adversary using traceroute to map a defended network can be presented with a false topology of the defender´s choice.
  • Keywords
    Linux; military communication; telecommunication links; telecommunication network routing; telecommunication network topology; telecommunication security; Linux; civilian networks; cyber criminals; military networks; network topology deception; proof-of-concept test network; IP networks; Kernel; Network topology; Ports (Computers); Probes; Topology; Web servers; Topological deception; military deception; network defense; traceroute;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Military Communications Conference, MILCOM 2013 - 2013 IEEE
  • Conference_Location
    San Diego, CA
  • Type

    conf

  • DOI
    10.1109/MILCOM.2013.303
  • Filename
    6735885