DocumentCode :
653786
Title :
Efficient Random Route Mutation considering flow and network constraints
Author :
Qi Duan ; Al-Shaer, Ehab ; Jafarian, Haadi
Author_Institution :
Dept. of Software & Inf. Syst., Univ. of North Carolina at Charlotte, Charlotte, NC, USA
fYear :
2013
fDate :
14-16 Oct. 2013
Firstpage :
260
Lastpage :
268
Abstract :
In the current network protocol infrastructure, forwarding routes are mostly static except in case of failures or performance issues. However, static route selection offers a significant advantage for adversaries to eavesdrop, or launch DoS attacks on certain network flows. Previous works on multipath routing in wireless networks propose using random forwarding to avoid jamming and blackhole attacks [18]. However, this work is far from being practical for wired network because of many topological and QoS constraints. Moreover, the potential of finding a significant number of disjoint paths in wired networks is extremely low, which consequently decreases the value of RRM. In this paper we present a proactive Random Route Mutation (RRM) technique that enables changing randomly the route of the multiple flows in a network simultaneously to defend against reconnaissance, eavesdrop and DoS attacks, while preserving end-to-end QoS properties. Our contributions in this paper are three-fold: (1) modeling RRM as a constraint satisfaction problem using Satisfiability Modulo Theories (SMT) to identify efficient practical route mutations, (2) proposing a new overlay placement technique that can maximize the effectiveness of RRM in visualized networks, and (3) developing analytical and experimental models to measure the effectiveness of RRM under different adversary models and network parameters. We develop a prototype RRM implementation in Software Defined Networks (SDNs). Our analysis, simulation and preliminary implementation show that RRM can protect at least 90% of the packet flow from being attacked against realistic attackers, as compared with static routes. Our evaluation study also shows that RRM can be efficiently deployed on both conventional networks and SDNs without causing any significant disruption for active flows.
Keywords :
computability; computer network security; quality of service; software radio; telecommunication network routing; DoS attack; QoS constraint; RRM technique; constraint satisfaction problem; multipath routing; network constraints; network flow; network protocol infrastructure; random forwarding; random route mutation technique; satisfiability modulo theory; software defined network; static route selection; wired network; wireless network; Computer crime; Measurement; Overlay networks; Routing; Routing protocols; Substrates;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications and Network Security (CNS), 2013 IEEE Conference on
Conference_Location :
National Harbor, MD
Type :
conf
DOI :
10.1109/CNS.2013.6682715
Filename :
6682715
Link To Document :
بازگشت