SDN-based Path Hopping Communication Against Eavesdropping Attack

被引:1
|
作者
Zhang, Chuanhao [1 ,2 ]
Bu, Youjun [2 ]
Zhao, Zheng [3 ]
机构
[1] Railway Police Coll, Zhengzhou 450002, Henan, Peoples R China
[2] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou 450002, Henan, Peoples R China
[3] Zhengzhou Sci & Technol Inst, Zhengzhou 450002, Peoples R China
关键词
SDN; Eavesdropping; Moving Target Defense (MTD); Path Hopping;
D O I
10.1117/12.2246538
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network(SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] SDN-Based Double Hopping Communication against Sniffer Attack
    Zhao, Zheng
    Gong, Daofu
    Lu, Bin
    Liu, Fenlin
    Zhang, Chuanhao
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [2] An SDN-Based IP Hopping Communication Scheme against Scanning Attack
    Zhao, Zheng
    Liu, Fenlin
    Gong, Daofu
    Chen, Lin
    Xiang, Fei
    Li, Yan
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 559 - 564
  • [3] A proactive defense method against eavesdropping attack in SDN-based storage environment
    Liu, Yuming
    Wang, Yong
    Feng, Hao
    CYBERSECURITY, 2024, 7 (01):
  • [4] An SDN based hopping multicast communication against DoS attack
    Zhao, Zheng
    Liu, Fenlin
    Gong, Daofu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2196 - 2218
  • [5] A SDN-based IP Address Hopping Method Design
    Zheng, Ke
    Zhao, Xin
    Li, Xiao
    Zhou, Yao
    PROCEEDINGS OF THE 2016 5TH INTERNATIONAL CONFERENCE ON MEASUREMENT, INSTRUMENTATION AND AUTOMATION (ICMIA 2016), 2016, 138 : 509 - 512
  • [6] SDN-based hybrid honeypot for attack capture
    Wang, He
    Wu, Bin
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 1602 - 1606
  • [7] Defending Against New-Flow Attack in SDN-Based Internet of Things
    Xu, Tong
    Gao, Deyun
    Dong, Ping
    Zhang, Hongke
    Foh, Chuan Heng
    Chao, Han-Chieh
    IEEE ACCESS, 2017, 5 : 3431 - 3443
  • [8] A Research Review on SDN-Based DDOS Attack Detection
    Zhu, Weidong
    Yi, Xiujuan
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND MANAGEMENT INNOVATION (MSMI 2017), 2017, 31 : 145 - 149
  • [9] An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks
    Zhao, Zheng
    Liu, Fenlin
    Gong, Daofu
    SECURITY AND COMMUNICATION NETWORKS, 2017, : 1 - 12
  • [10] SDN-based ARP Attack Detection for Cloud Centers
    Ma, Huan
    Ding, Hao
    Yang, Yang
    Mi, Zhenqiang
    Zhang, Miao
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1049 - 1054