Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2016 (2016), Article ID 8927169, 13 pages
http://dx.doi.org/10.1155/2016/8927169
Research Article

SDN-Based Double Hopping Communication against Sniffer Attack

1Zhengzhou Science and Technology Institute, Zhengzhou 450002, China
2Railway Police College, Zhengzhou 450002, China
3National Digital Switching System Engineering & Technological R&D Center, Zhengzhou 450002, China

Received 7 September 2015; Revised 6 December 2015; Accepted 8 December 2015

Academic Editor: Oleg V. Gendelman

Copyright © 2016 Zheng Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. National Cyber Leap Year Summit 2009 Co-Chairs' Report, “Networking and information technology research and development,” Tech. Rep., 2009. View at Google Scholar
  2. T. Cyberspace, Strategic Plan for the Federal Cybersecurity Research and Development Program, Executive Office of the President National Science and Technology Council, Washington, DC, USA, 2011.
  3. S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, vol. 54, Springer Science & Business Media, New York, NY, USA, 2011.
  4. E. Al-Shaer, “Toward network configuration randomization for moving target defense,” in Moving Target Defense, vol. 54 of Advances in Information Security, pp. 153–159, Springer, New York, NY, USA, 2011. View at Publisher · View at Google Scholar
  5. P. Kampanakis, H. Perros, and T. Beyene, “SDN-based solutions for Moving Target Defense network protection,” in Proceedings of the 15th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '14), pp. 1–6, Sydney, Australia, June 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. M. Atighetchi, P. Pal, F. Webber, and C. Jones, “Adaptive use of network-centric mechanisms in cyber-defense,” in Proceedings of the 6th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, pp. 183–192, Hokkaido, Japan, May 2003. View at Publisher · View at Google Scholar
  7. J. H. Jafarian, E. Al-Shaer, and Q. Duan, “Openflow random host mutation: transparent moving target defense using software defined networking,” in Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks (HotSDN '12), pp. 127–132, ACM, Helsinki, Finland, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. Q. Duan, E. Al-Shaer, and H. Jafarian, “Efficient Random Route Mutation considering flow and network constraints,” in Proceedings of the IEEE Conference on Communications and Network Security (CNS '13), pp. 260–268, IEEE, National Harbor, Md, USA, October 2013. View at Publisher · View at Google Scholar
  9. E. Al-Shaer, Q. Duan, and J. H. Jafarian, “Random host mutation for moving target defense,” in Security and Privacy in Communication Networks, pp. 310–327, Springer, New York, NY, USA, 2013. View at Google Scholar
  10. G. Badishi, A. Herzberg, and I. Keidar, “Keeping denial-of-service attackers in the dark,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 3, pp. 191–204, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. H. Wang, Q. Jia, D. Fleck, W. Powell, F. Li, and A. Stavrou, “A moving target DDoS defense mechanism,” Computer Communications, vol. 46, pp. 10–21, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. C.-Y. Hong, S. Kandula, R. Mahajan et al., “Achieving high utilization with software-driven WAN,” ACM SIGCOMM Computer Communication Review, vol. 43, no. 3, pp. 15–26, 2013. View at Publisher · View at Google Scholar
  13. N. McKeown, “Software-defined networking,” INFOCOM Keynote Talk, vol. 17, no. 2, pp. 30–32, 2009. View at Google Scholar
  14. M. Carvalho and R. Ford, “Moving-target defenses for computer networks,” IEEE Security & Privacy, vol. 12, no. 2, pp. 73–76, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. M. Sifalakis, S. Schmid, and D. Hutchison, “Network address hopping: a mechanism to enhance data protection for packet communications,” in Proceedings of the IEEE International Conference on Communications (ICC '05), vol. 3, pp. 1518–1523, IEEE, Seoul, Republic of Korea, May 2005. View at Publisher · View at Google Scholar
  16. M. Dunlop, S. Groat, W. Urbanski, R. Marchany, and J. Tront, “MT6D: a moving target IPv6 defense,” in Proceedings of the Military Communications Conference (MILCOM '11), pp. 1321–1326, IEEE, Baltimore, Md, USA, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. J. H. Jafarian, E. Al-Shaer, and Q. Duan, “An effective address mutation approach for disrupting reconnaissance attacks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2562–2577, 2015. View at Publisher · View at Google Scholar
  18. J. H. H. Jafarian, E. Al-Shaer, and Q. Duan, “Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers,” in Proceedings of the 1st ACM Workshop on Moving Target Defense (MTD '14), pp. 69–78, Scottsdale, AZ, USA, November 2014. View at Publisher · View at Google Scholar
  19. J. H. Jafarian, E. Al-Shaer, and Q. Duan, “Adversary-aware IP address randomization for proactive agility against sophisticated attackers,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '15), pp. 738–746, IEEE, April 2015. View at Publisher · View at Google Scholar
  20. D. C. MacFarland and C. A. Shue, “The SDN shuffle: creating a moving-target defense using host-based software-defined networking,” in Proceedings of the 2nd ACM Workshop on Moving Target Defense (MTD '15), pp. 37–41, ACM, Denver, Colo, USA, October 2015. View at Publisher · View at Google Scholar
  21. J. Jafarian, E. Al-Shaer, and Q. Duan, “Formal approach for route agility against persistent attackers,” in Computer Security—ESORICS 2013, J. Crampton, S. Jajodia, and K. Mayes, Eds., vol. 8134 of Lecture Notes in Computer Science, pp. 237–254, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  22. S. Dolev and S. T. David, “SDN-based private interconnection,” in Proceedings of the IEEE 13th International Symposium on Network Computing and Applications (NCA '14), 2014.
  23. F. Gillani, E. Al-Shaer, S. Lo, Q. Duan, M. H. Ammar, and E. W. Zegura, “Agile virtualized infrastructure to proactively defend against cyber attacks,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '15), pp. 729–737, Hong Kong, April-May 2015.
  24. D. Gkounis, V. Kotronis, and X. Dimitropoulos, “Towards defeating the crossfire attack using SDN,” http://arxiv.org/abs/1412.2013.
  25. A. Studer and A. Perrig, “The coremelt attack,” in Computer Security—ESORICS 2009, vol. 5789 of Lecture Notes in Computer Science, pp. 37–52, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  26. B. Lantz, B. Heller, and N. McKeown, “A network in a laptop: rapid prototyping for software-defined networks,” in Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, ACM, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  27. N. McKeown, T. Anderson, H. Balakrishnan et al., “OpenFlow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008. View at Publisher · View at Google Scholar
  28. M. McCauley, “About pox,” 2013, http://www.github.com/noxrepo/pox/.
  29. S. De Maesschalck, D. Colle, I. Lievens et al., “Pan-European optical transport networks: an availability-based comparison,” Photonic Network Communications, vol. 5, no. 3, pp. 203–225, 2003. View at Publisher · View at Google Scholar
  30. A. Dixit, F. Hao, S. Mukherjee, T. V. Lakshman, and R. Kompella, “Towards an elastic distributed SDN controller,” ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 7–12, 2013. View at Publisher · View at Google Scholar