• DocumentCode
    653786
  • Title

    Efficient Random Route Mutation considering flow and network constraints

  • Author

    Qi Duan ; Al-Shaer, Ehab ; Jafarian, Haadi

  • Author_Institution
    Dept. of Software & Inf. Syst., Univ. of North Carolina at Charlotte, Charlotte, NC, USA
  • fYear
    2013
  • fDate
    14-16 Oct. 2013
  • Firstpage
    260
  • Lastpage
    268
  • Abstract
    In the current network protocol infrastructure, forwarding routes are mostly static except in case of failures or performance issues. However, static route selection offers a significant advantage for adversaries to eavesdrop, or launch DoS attacks on certain network flows. Previous works on multipath routing in wireless networks propose using random forwarding to avoid jamming and blackhole attacks [18]. However, this work is far from being practical for wired network because of many topological and QoS constraints. Moreover, the potential of finding a significant number of disjoint paths in wired networks is extremely low, which consequently decreases the value of RRM. In this paper we present a proactive Random Route Mutation (RRM) technique that enables changing randomly the route of the multiple flows in a network simultaneously to defend against reconnaissance, eavesdrop and DoS attacks, while preserving end-to-end QoS properties. Our contributions in this paper are three-fold: (1) modeling RRM as a constraint satisfaction problem using Satisfiability Modulo Theories (SMT) to identify efficient practical route mutations, (2) proposing a new overlay placement technique that can maximize the effectiveness of RRM in visualized networks, and (3) developing analytical and experimental models to measure the effectiveness of RRM under different adversary models and network parameters. We develop a prototype RRM implementation in Software Defined Networks (SDNs). Our analysis, simulation and preliminary implementation show that RRM can protect at least 90% of the packet flow from being attacked against realistic attackers, as compared with static routes. Our evaluation study also shows that RRM can be efficiently deployed on both conventional networks and SDNs without causing any significant disruption for active flows.
  • Keywords
    computability; computer network security; quality of service; software radio; telecommunication network routing; DoS attack; QoS constraint; RRM technique; constraint satisfaction problem; multipath routing; network constraints; network flow; network protocol infrastructure; random forwarding; random route mutation technique; satisfiability modulo theory; software defined network; static route selection; wired network; wireless network; Computer crime; Measurement; Overlay networks; Routing; Routing protocols; Substrates;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2013 IEEE Conference on
  • Conference_Location
    National Harbor, MD
  • Type

    conf

  • DOI
    10.1109/CNS.2013.6682715
  • Filename
    6682715