Zhicheng Zhu, Rongbao Kang, Wei Zhang, Kun Lan, Yuguang Zhang
{"title":"A Technique of Topology Obfuscation Against Active Topology Inference","authors":"Zhicheng Zhu, Rongbao Kang, Wei Zhang, Kun Lan, Yuguang Zhang","doi":"10.1109/WCEEA56458.2022.00053","DOIUrl":null,"url":null,"abstract":"Protecting critical information infrastructure is a frontier of current cyberspace security research. This paper firstly introduces the concepts and common methods of topology inference and topology obfuscation. Then, an improved topology obfuscation method is proposed for active topology inference represented by trace route. It improves the selection algorithm of deployment nodes, adding virtual nodes and links by replicating the key topologies of the real network. For attackers who use traceroute for topology inference, this method will mislead them to obtain wrong node importance ranking. Finally, the simulation results show that the proposed topology obfuscation method can effectively against active topology inference in typical star-structured topology network.","PeriodicalId":143024,"journal":{"name":"2022 International Conference on Wireless Communications, Electrical Engineering and Automation (WCEEA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Wireless Communications, Electrical Engineering and Automation (WCEEA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCEEA56458.2022.00053","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Protecting critical information infrastructure is a frontier of current cyberspace security research. This paper firstly introduces the concepts and common methods of topology inference and topology obfuscation. Then, an improved topology obfuscation method is proposed for active topology inference represented by trace route. It improves the selection algorithm of deployment nodes, adding virtual nodes and links by replicating the key topologies of the real network. For attackers who use traceroute for topology inference, this method will mislead them to obtain wrong node importance ranking. Finally, the simulation results show that the proposed topology obfuscation method can effectively against active topology inference in typical star-structured topology network.