DocumentCode
3238458
Title
A Technique for Network Topology Deception
Author
Trassare, Samuel T. ; Beverly, Robert ; Alderson, David
fYear
2013
fDate
18-20 Nov. 2013
Firstpage
1795
Lastpage
1800
Abstract
Civilian and military networks are continually probed for vulnerabilities. Cyber criminals, and autonomous botnets under their control, regularly scan networks in search of vulnerable systems to co-opt. Military and more sophisticated adversaries may also scan and map networks as part of reconnaissance and intelligence gathering. This paper focuses on adversaries attempting to map a network´s infrastructure, i.e., the critical routers and links supporting a network. We develop a novel methodology, rooted in principles of military deception, for deceiving a malicious traceroute probe and influencing the structure of the network as inferred by a mapping adversary. Our Linux-based implementation runs as a kernel module at a border router to present a deceptive external topology. We construct a proof-of-concept test network to show that a remote adversary using traceroute to map a defended network can be presented with a false topology of the defender´s choice.
Keywords
Linux; military communication; telecommunication links; telecommunication network routing; telecommunication network topology; telecommunication security; Linux; civilian networks; cyber criminals; military networks; network topology deception; proof-of-concept test network; IP networks; Kernel; Network topology; Ports (Computers); Probes; Topology; Web servers; Topological deception; military deception; network defense; traceroute;
fLanguage
English
Publisher
ieee
Conference_Titel
Military Communications Conference, MILCOM 2013 - 2013 IEEE
Conference_Location
San Diego, CA
Type
conf
DOI
10.1109/MILCOM.2013.303
Filename
6735885
Link To Document