Combating Adversarial Network Topology Inference by Proactive Topology Obfuscation

被引:8
作者
Hou, Tao [1 ]
Wang, Tao [2 ]
Lu, Zhuo [3 ]
Liu, Yao [1 ]
机构
[1] Univ S Florida, Dept Comp Sci & Engn, Tampa, FL 33620 USA
[2] New Mexico State Univ, Dept Comp Sci, Las Cruces, NM 88003 USA
[3] Univ S Florida, Dept Elect Engn, Tampa, FL 33620 USA
基金
美国国家科学基金会;
关键词
Network systems; topology inference; network security; machine learning; TOMOGRAPHY; DEFENSE; ATTACK;
D O I
10.1109/TNET.2021.3101692
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Y The topology of a network is fundamental for building network infrastructure functionalities. In many scenarios, enterprise networks may have no desire to disclose their topology information. In this paper, we aim at preventing attacks that use adversarial, active end-to-end topology inference to obtain the topology information of a target network. To this end, we propose a Proactive Topology Obfuscation (ProTO) system that adopts a detect-then-obfuscate framework: (i) a lightweight probing behavior identification mechanism based on machine learning is designed to detect any probing behavior, and then (ii) a topology obfuscation design is developed to proactively delay all identified probe packets in a way such that the attacker will obtain a structurally accurate yet fake network topology based on the measurements of these delayed probe packets, therefore deceiving the attacker and decreasing its appetency for future inference. We evaluate ProTO under different evaluation scenarios. Experimental results show that ProTO is able to (i) achieve a detection rate of 99.9% with a false alarm of 3%, (ii) effectively disrupt adversarial topology inference and lead to the topology inferred by the attacker close to a fake topology, and (iii) result in an overall network delay performance degradation of 1.3% - 2.0%.
引用
收藏
页码:2779 / 2792
页数:14
相关论文
共 71 条
[1]   Few Throats to Choke: On the Current Structure of the Internet [J].
Acharya, H. B. ;
Chakravarty, Sambuddho ;
Gosain, Devashish .
2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, :339-346
[2]   Cyber Deception: Virtual Networks to Defend Insider Reconnaissance [J].
Achleitner, Stefan ;
La Porta, Thomas ;
McDaniel, Patrick ;
Sugrim, Shridatt ;
Krishnamurthy, Srikanth V. ;
Chadha, Ritu .
MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, :57-68
[3]   Adaptive Encrypted Traffic Fingerprinting With Si-Directional Dependence [J].
Al-Naami, Khaled ;
Chandra, Swarup ;
Mustafa, Ahmad ;
Khan, Latifur ;
Lin, Zhiqiang ;
Hamlen, Kevin ;
Thuraisingham, Bhavani .
32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, :177-188
[4]  
[Anonymous], 2018, DOMAIN NAME SYSTEM
[5]  
[Anonymous], 2007, PROC 27 INT C DISTRI
[6]  
[Anonymous], 2018, RIPE ATLAS
[7]  
[Anonymous], 2018, 792 RFC
[8]  
[Anonymous], 2002, ACM SIGMETRICS
[9]  
[Anonymous], 2018, OPENWRT PROJECT WELC
[10]  
[Anonymous], 2001, 5th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), DOI [DOI 10.1109/34.310689, DOI 10.1007/3-540-45357-19, 10.1007/3-540-45357-19, DOI 10.1007/3-540-45357-1_9]