texas a&m university page 1 10/10/2014 5:19:49 pm real-time traffic modeling and its application...
TRANSCRIPT
![Page 1: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/1.jpg)
Texas A&M UniversityPage 1 04/11/23 01:16 AM
Real-Time Traffic Modeling and its Application in Network
Camouflaging
Wei Zhao, Riccardo Bettati, Nitin VaidyaDepartment of Computer Science
Texas A&M UniversityCollege Station, TX 77843-3112
[email protected] 845-5098
![Page 2: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/2.jpg)
Texas A&M UniversityPage 2 04/11/23 01:16 AM
Outline
1. Project Overview
2. Real-Time Traffic Modeling
3. Design and Implementation of NetCamo
4. Camouflaging Other Network Entities
5. Summary
![Page 3: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/3.jpg)
Texas A&M UniversityPage 3 04/11/23 01:16 AM
1. Project Overview
• Objectives
• Characteristics
• Major Results
![Page 4: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/4.jpg)
Texas A&M UniversityPage 4 04/11/23 01:16 AM
Project Objectives
• Development of countermeasures for generalized
traffic analysis
• Development of countermeasures for denial of services
![Page 5: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/5.jpg)
Texas A&M UniversityPage 5 04/11/23 01:16 AM
Characteristics of our Work
• Based on real-time traffic modeling
• Countermeasures for generalized traffic analysis:Camouflaging the network activities whileguaranteeing end-to-end delays
• Countermeasures for denial of services:Detecting DoS attacks in real-time
• Our solutions intended for wired and wireless networks
• Our solutions are upward and downward compatible
![Page 6: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/6.jpg)
Texas A&M UniversityPage 6 04/11/23 01:16 AM
Major Results
• Developed a prototype of NetCamo/M
A middle-ware solution for dealing with traffic analysis
+ No change to current network architecture+ Efficient
• Developed a prototype of NetCamo/N
Using independent “mini routers” for camouflaging
+ No disturbance to application hosts+ To be used by Navy HiPer-D 2000
![Page 7: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/7.jpg)
Texas A&M UniversityPage 7 04/11/23 01:16 AM
Faculty Members Wei Zhao, Riccardo Bettati, and Nitin Vaidya
Previous Results• Our bandwidth allocation method has been officially
adopted by DoD SAFENET• Two releases of NetEx tool kit:
NetEx/Basic and NetEx/Adaptation• Two best paper awards• Two U.S. patents• Support from DoD and industry: Nortel, Networks, Cisco, Myricom, Packet Engine,
and XYLAN.
The Team
![Page 8: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/8.jpg)
Texas A&M UniversityPage 8 04/11/23 01:16 AM
The Collaborators
Government
Navy Surface Warfare Center
HiPer-D Project (Dave Marlow and Mike Masters)
Navy SPAWAR
Distributed real-time combat systems (Russell Johnston)
West Point
Camouflaging technology (Daniel Ragsdale)
![Page 9: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/9.jpg)
Texas A&M UniversityPage 9 04/11/23 01:16 AM
Industry
Alcatel (Packet Engines and XYLAN)
High speed routers (Kim Stearns and Dennis Majeski)
Intrusion.Com
Real-time intrusion and camouflaging devices (Joe Head)
3INet
Real-time intrusion and camouflaging devices (Mike Wang)
The Collaborators
![Page 10: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/10.jpg)
Texas A&M UniversityPage 10 04/11/23 01:16 AM
TAMU Internal
Texas Transportation Institute
ALERT Project (Cedric J. Sims)
Texas Center for Applied Technology
University XXI Project (James Wall)
The Collaborators
![Page 11: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/11.jpg)
Texas A&M UniversityPage 11 04/11/23 01:16 AM
2. Real-Time Traffic Modeling
Motivations
To gain information on payload traffic in orderto predict the behavior of the applications and systems
* Predict the worst-case delay
* Provide profile information of payload
- on-line verification
- on-line masking
![Page 12: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/12.jpg)
Texas A&M UniversityPage 12 04/11/23 01:16 AM
Traffic Modeling
I
I)t(t, intervalin arrived bits of #max(I)
t
1. Peak rate methodpessimistic; over-estimating delay
2. Average rate methodoptimistic; under-estimating delay
3. Timing history methodimpractical, too much information
4. Our method: the maximum rate function:
(I) can also be randomized to deal with statistical rate bounds
![Page 13: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/13.jpg)
Texas A&M UniversityPage 13 04/11/23 01:16 AM
Traffic Modeling
Features of (I):
* It covers a wide range of applications
* It is mathematically analyzable
* It is enforceable
* It is holographic
![Page 14: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/14.jpg)
Texas A&M UniversityPage 14 04/11/23 01:16 AM
(I) is Mathematically Analyzable
(I) (I) = ?
F*(I) = Output between t and t + I
< Input between t - d and t+I
= F(I+d) = (I+d) * (I+d)
(I) = F*(I)/I = (I+d) * (I+d)/I
![Page 15: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/15.jpg)
Texas A&M UniversityPage 15 04/11/23 01:16 AM
(I) is Enforceable
(I) = ( + I)/ILeaky Bucket
Any traffic
I
Size of tokenbucket
Line rate
F*(I)
![Page 16: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/16.jpg)
Texas A&M UniversityPage 16 04/11/23 01:16 AM
(I) is Holographic
(I) can be approximated by any number of points.
Assume that (I1) = then (I) is approximated by
+ min(I1, I - I
Formula can be used recursively if more points areknown.
![Page 17: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/17.jpg)
Texas A&M UniversityPage 17 04/11/23 01:16 AM
Traffic Modeling
H1 H 2
M
Sender Receiver
ATM Switch
Protocol Analyzer
VC
M: ATM Module H: Host VC: Virtual Channel
An experiment: A workstation (H1) sends 16Mbit data per second.
![Page 18: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/18.jpg)
Texas A&M UniversityPage 18 04/11/23 01:16 AM
Traffic Modeling
. .
Time interval I (microseconds)
0
20
40
60
80
100
120
140
160
1 10 100 1,000 10,000 100,000 1,000,000
observed
app[6]
(I)
(I)
v
alu
es in
meg
abit
s p
er s
econ
d
Peak Rate
Average Rate
Derived by our method
Observed
![Page 19: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/19.jpg)
Texas A&M UniversityPage 19 04/11/23 01:16 AM
Applications ofReal-Time Traffic Modeling
* NetEx: Providing Delay-Guaranteed Communications
A Quorum project
Integrated with Honeywell RTARM system
* Countermeasure for Traffic Analysis
* Countermeasure for Denial Services
![Page 20: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/20.jpg)
Texas A&M UniversityPage 20 04/11/23 01:16 AM
Preventing Traffic Analysis by RTTM
Traffic Analysis:
Obtain the mission status by observing network traffic
Our objectives:
» Camouflaging the traffic density
» Camouflaging the connectivity
![Page 21: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/21.jpg)
Texas A&M UniversityPage 21 04/11/23 01:16 AM
Countermeasure for Traffic Analysis
Approaches
» Network flooding
» Traffic rerouting
![Page 22: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/22.jpg)
Texas A&M UniversityPage 22 04/11/23 01:16 AM
Network Flooding
Flooding the network at right place and right time to make it appear to be constant rate network
Challenge: How much?
For link j,
i Fi,j( I ) + Sj( I ) = I
?
?
?
![Page 23: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/23.jpg)
Texas A&M UniversityPage 23 04/11/23 01:16 AM
Traffic Rerouting
Indirect delivery of packets
Challenge: Can we still guarantee real-time delay bound?
For for connection j,
i di,,j, < Dj
![Page 24: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/24.jpg)
Texas A&M UniversityPage 24 04/11/23 01:16 AM
Objectives
• Camouflage network activities
• Provide QoS-guaranteed communication services
• Be upward and downward compatible with existing
operating systems, applications, and network technologies
• Be scalable and evolvable
3. Design and Implementation of NetCamo
![Page 25: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/25.jpg)
Texas A&M UniversityPage 25 04/11/23 01:16 AM
• Traffic camouflaging: rerouting and traffic padding based on real-time traffic modeling theory.
• Real-time communication: providing delay guaranteed services to applications while having traffic camouflaged
• NetCamo/M: A middle-ware solution» No change to current network architecture» Efficient
• NetCamo/N: Using independent “routers” for camouflaging» No disturbance to application hosts» To be used by Navy HiPer-D 2000
NetCamo Approaches
![Page 26: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/26.jpg)
Texas A&M UniversityPage 26 04/11/23 01:16 AM
NetCamo/M
PayloadHost
PayloadHost
PayloadHost
PayloadHost
Network
Middle-Ware Middle-WareMiddle-WareMiddle-Ware
![Page 27: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/27.jpg)
Texas A&M UniversityPage 27 04/11/23 01:16 AM
NetCamo/M WorkflowC
lien
tA
pp
lica
tion
s NetCamo Network
Controller
Cli
ent
Ap
pli
cati
ons
NetCamo Host
ControllerNetwork
NetCamo Host
Controller
1
5
444
4
2
3
![Page 28: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/28.jpg)
Texas A&M UniversityPage 28 04/11/23 01:16 AM
NetCamo/M ArchitectureNetCamo Network Controller
Host Agent Host Agent
Router AgentRouter Agent
NetCamo Traffic Manager
Router Router
API
Host Manager
Cli
ent
Ap
pli
cati
ons
Traffic
Controller
H323
NetCamo Host Controller
API
Host Manager
Traffic
Controller
H323
NetCamo Host Controller
Host Host
Network
Cli
ent
Ap
pli
cati
ons
![Page 29: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/29.jpg)
Texas A&M UniversityPage 29 04/11/23 01:16 AM
![Page 30: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/30.jpg)
Texas A&M UniversityPage 30 04/11/23 01:16 AM
![Page 31: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/31.jpg)
Texas A&M UniversityPage 31 04/11/23 01:16 AM
NetCamo/M Host Implementation
![Page 32: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/32.jpg)
Texas A&M UniversityPage 32 04/11/23 01:16 AM
NetCamo/M Host Traffic Controller
![Page 33: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/33.jpg)
Texas A&M UniversityPage 33 04/11/23 01:16 AM
NetCamo/M Testbed
![Page 34: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/34.jpg)
Texas A&M UniversityPage 34 04/11/23 01:16 AM
NetCamo/M Testbed
![Page 35: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/35.jpg)
Texas A&M UniversityPage 35 04/11/23 01:16 AM
NetCamo/M Results
Station 1 Station 2: CBR 250 pps (200 Direct + 50 Re-route via Station 4)
Station 1 Station 4: VBR 40pps (Direct)
Station 4 Station 1: VBR 20pps (Direct)
Station 4 Station 2: VBR 20pps (Direct)
![Page 36: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/36.jpg)
Texas A&M UniversityPage 36 04/11/23 01:16 AM
NetCamo/N
PayloadHost
PayloadHost
PayloadHost
PayloadHost
Network
Mini Router Mini Router Mini Router Mini Router
![Page 37: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/37.jpg)
Texas A&M UniversityPage 37 04/11/23 01:16 AM
NetCamo Mini Router
![Page 38: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/38.jpg)
Texas A&M UniversityPage 38 04/11/23 01:16 AM
Use of NetCamo/N in HiPer-D 2000
Navy SD Base NSWC
Mini Router
Mini Router
![Page 39: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/39.jpg)
Texas A&M UniversityPage 39 04/11/23 01:16 AM
NetCamo/N Testbed
![Page 40: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/40.jpg)
Texas A&M UniversityPage 40 04/11/23 01:16 AM
NetCamo/N Results
Cover Mode
Payload
Dummy
![Page 41: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/41.jpg)
Texas A&M UniversityPage 41 04/11/23 01:16 AM
4. Camouflaging Other Entities
• Camouflaging the topology
So that distributed denial of service attacks
can be prevented or avoided
• Camouflaging servers
No one can attack them anymore
• Camouflaging wireless networks
Be power aware.
![Page 42: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/42.jpg)
Texas A&M UniversityPage 42 04/11/23 01:16 AM
Motivation
Reducing the damage of organized and distributed DoS attacks
Topology Camouflaging
![Page 43: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/43.jpg)
Texas A&M UniversityPage 43 04/11/23 01:16 AM
Topology Camouflaging Approaches
Preventive Camouflaging
• Purposely let a group of routers misunderstandthe topology
Reactive Camouflaging
• Dynamically change routing strategy
![Page 44: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/44.jpg)
Texas A&M UniversityPage 44 04/11/23 01:16 AM
Topology Camouflaging: Challenges
• Consistency: An altered topology should still make sense
• Efficiency: Minimizing the network management effort tolet an altered topology be perceived for a giveneffectiveness measure
• Effectiveness: Minimizing the potential damage of DoN attacksfor a given attack power
![Page 45: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/45.jpg)
Texas A&M UniversityPage 45 04/11/23 01:16 AM
Topology Camouflaging: Realization Methods
Preventive Camouflaging (PC)
• Change Internet Control Message Protocol atsome routers
Reactive Camouflaging (RC)
• Adaptively and autonomously adjust routingtables at some routers
![Page 46: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/46.jpg)
Texas A&M UniversityPage 46 04/11/23 01:16 AM
5. Summary
• Cyber space camouflaging (CSC) is an important strategy to
realize tolerant networks
• Traditional encryption is a special case of CSC:
i.e., camouflaging the content of payload
• While some concepts can be borrowed from physical
camouflaging techniques, much more challenges
are ahead.
![Page 47: Texas A&M University Page 1 10/10/2014 5:19:49 PM Real-Time Traffic Modeling and its Application in Network Camouflaging W ei Zhao, Riccardo Bettati, Nitin](https://reader035.vdocument.in/reader035/viewer/2022070307/551b51c3550346ae7a8b5311/html5/thumbnails/47.jpg)
Texas A&M UniversityPage 47 04/11/23 01:16 AM
Camouflaging, Concealment, and Decoyin Cyber Space
Means Packet Conn. Traffic Server Topology Op Mode
Hide
Blend Encryption Flooding
Disguising Anycasting Neutral mode
Disrupting Re-routing RC
Decoy PC Multiple cover modes