Towards Secure Decoy Routing by Using SDN

نویسندگان

  • Chaitanya Kumar
  • Vinayak S. Naik
چکیده

Software Defined Networking (SDN) is an emerging architecture, which allows networks to be centralized and programmable, aiding researchers in implementing complex network algorithms and policies. While SDN is widely used in LANs, it has also been deployed in WAN environments [2]. Like Tor, Decoy Routing [3] aids users to circumvent censorship on the Internet. While Tor uses onion routing, Decoy Routing uses some designated routers within the censored network, to divert traffic between the blocked destination and the client. Decoy Routing is faster than Tor as the former does away with multiple cryptographic operations. As the traditional routers are not programmable, Decoy Routers are either servers with router software, or routers with proxy servers connected to them. In either case, such routers slow down traffic, nor is it scalable to manage them. We use SDN-based routers for Decoy Routing. In our work, we propose an SDN-based Decoy Routing protocol, without losing any of its Decoy Routing capabilities [1]. Our protocol is equally secure as the original Decoy Routing protocol. Adversaries have used traffic analysis for attacking Tor and Decoy Routing. These routers have used traffic engineering to defend against these attacks. Thus, programmability of routers eliminates the need for servers or proxies, and the controller-based architecture gives us a consistent and centralized view of the Decoy Routing topology in the WAN. Although centralized, the SDN architecture and its implementation are robust. This central view of the network makes traffic engineering scalable [2]. BODY Against existing censorship circumvention protocols, we propose SDN-based Decoy Routing that is faster and resilient to traffic analysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

OpenFlow switch by OpenFlow protocol via a secure channel. OpenFlow Controller is programmable, Service Provider can

Abstract—Recently, attention is particularly focused on the research of Software defined network (SDN) for reducing network management complexity. The one of a key technology of SDN is OpenFlow. OpenFlow provide a centralized controller for network and the scalability of controller is main issue. In this paper, we propose a high-speed routing engine for improve the scalability of OpenFlow contr...

متن کامل

Enabling SDN in Old School Networks with Software-Controlled Routing Protocols

Software-Defined Networking (SDN) promises to significantly improve network manageability by enabling direct, and centralized control over the network forwarding state via a well-defined Application Programming Interface (API). Fulfilling this promise though is a challenge for network operators as it often requires heavy modifications to their current network architecture, including: i) equipme...

متن کامل

Secure asymmetry and deployability for decoy routing systems

Censorship circumvention is often characterized as a cat-and-mouse game between a nation-state censor and the developers of censorship resistance systems. Decoy routing systems offer a solution to censorship resistance that has the potential to tilt this race in the favour of the censorship resistor by using real connections to unblocked, overt sites to deliver censored content to users. This i...

متن کامل

The road not taken: Secure asymmetry and deployabilityfor decoy routing systems

Censorship circumvention is often characterized as an arms race between a nation-state censor and the developers of censorship resistance systems. Decoy routing systems offer a solution to censorship resistance that has the potential to tilt this arms race in the favour of the censorship resistor. Decoy routing uses real connections to unblocked, overt sites to deliver censored content to users...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • TinyToCS

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2016