BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception

Cited 6 time in webofscience Cited 0 time in scopus
  • Hit : 375
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Jinwooko
dc.contributor.authorNam, Jaehyunko
dc.contributor.authorLee, Suyeolko
dc.contributor.authorYegneswaran, Vinodko
dc.contributor.authorPorras, Phillipko
dc.contributor.authorShin, Seungwonko
dc.date.accessioned2021-06-14T06:10:08Z-
dc.date.available2021-06-14T06:10:08Z-
dc.date.created2021-06-14-
dc.date.created2021-06-14-
dc.date.created2021-06-14-
dc.date.issued2021-06-
dc.identifier.citationIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.16, pp.3138 - 3153-
dc.identifier.issn1556-6013-
dc.identifier.urihttp://hdl.handle.net/10203/285840-
dc.description.abstractThe robustness of a network's connectivity to other networks is often highly dependent on a few critical nodes and links that tie the network to the larger topology. The failure or degradation to such network bottlenecks can result in outages that may propagate throughout the network. Unfortunately, the presence of the bottlenecks also offers opportunities for targeted link flooding attacks (LFAs). Researchers have proposed a new and promising defense to counter LFAs, referred to as topology deception. This strategy centers on hindering the discovery of bottlenecks by presenting false trace responses to adversaries as they perform topological probing of the target network. Even though the goal of topology deception centers on obscuring critical links, node dependencies can be exploited by an adversary. However, current approaches do not consider a wide range of metrics that may reveal important and diverse aspects of network bottlenecks. Furthermore, existing approaches create a simple form of virtual topology, which is subject to relatively easy detection by the adversary, reducing its effectiveness. In this paper, we propose a comprehensive topology deception framework, which we refer to as BottleNet. Our suggested approach can analyze various network topology features both with respect to static and dynamic metrics and then use this information to identify bottlenecks, finally producing complex virtual topologies that are resilient to adversarial detection.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleBottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception-
dc.typeArticle-
dc.identifier.wosid000652786500002-
dc.identifier.scopusid2-s2.0-85105085788-
dc.type.rimsART-
dc.citation.volume16-
dc.citation.beginningpage3138-
dc.citation.endingpage3153-
dc.citation.publicationnameIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY-
dc.identifier.doi10.1109/TIFS.2021.3075845-
dc.contributor.localauthorShin, Seungwon-
dc.contributor.nonIdAuthorNam, Jaehyun-
dc.contributor.nonIdAuthorLee, Suyeol-
dc.contributor.nonIdAuthorYegneswaran, Vinod-
dc.contributor.nonIdAuthorPorras, Phillip-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorTopology-
dc.subject.keywordAuthorNetwork topology-
dc.subject.keywordAuthorMeasurement-
dc.subject.keywordAuthorServers-
dc.subject.keywordAuthorTools-
dc.subject.keywordAuthorRobustness-
dc.subject.keywordAuthorHeuristic algorithms-
dc.subject.keywordAuthorLink flooding attacks (LFAs)-
dc.subject.keywordAuthortopology deception-
dc.subject.keywordAuthornetwork robustness-
dc.subject.keywordAuthorsoftware-defined networking (SDN)-
dc.subject.keywordPlusINTERNET-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 6 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0