Zhicheng Zhu, Rongbao Kang, Wei Zhang, Kun Lan, Yuguang Zhang
{"title":"一种对抗主动拓扑推理的拓扑混淆技术","authors":"Zhicheng Zhu, Rongbao Kang, Wei Zhang, Kun Lan, Yuguang Zhang","doi":"10.1109/WCEEA56458.2022.00053","DOIUrl":null,"url":null,"abstract":"Protecting critical information infrastructure is a frontier of current cyberspace security research. This paper firstly introduces the concepts and common methods of topology inference and topology obfuscation. Then, an improved topology obfuscation method is proposed for active topology inference represented by trace route. It improves the selection algorithm of deployment nodes, adding virtual nodes and links by replicating the key topologies of the real network. For attackers who use traceroute for topology inference, this method will mislead them to obtain wrong node importance ranking. Finally, the simulation results show that the proposed topology obfuscation method can effectively against active topology inference in typical star-structured topology network.","PeriodicalId":143024,"journal":{"name":"2022 International Conference on Wireless Communications, Electrical Engineering and Automation (WCEEA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Technique of Topology Obfuscation Against Active Topology Inference\",\"authors\":\"Zhicheng Zhu, Rongbao Kang, Wei Zhang, Kun Lan, Yuguang Zhang\",\"doi\":\"10.1109/WCEEA56458.2022.00053\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Protecting critical information infrastructure is a frontier of current cyberspace security research. This paper firstly introduces the concepts and common methods of topology inference and topology obfuscation. Then, an improved topology obfuscation method is proposed for active topology inference represented by trace route. It improves the selection algorithm of deployment nodes, adding virtual nodes and links by replicating the key topologies of the real network. For attackers who use traceroute for topology inference, this method will mislead them to obtain wrong node importance ranking. Finally, the simulation results show that the proposed topology obfuscation method can effectively against active topology inference in typical star-structured topology network.\",\"PeriodicalId\":143024,\"journal\":{\"name\":\"2022 International Conference on Wireless Communications, Electrical Engineering and Automation (WCEEA)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Wireless Communications, Electrical Engineering and Automation (WCEEA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCEEA56458.2022.00053\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Wireless Communications, Electrical Engineering and Automation (WCEEA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCEEA56458.2022.00053","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Technique of Topology Obfuscation Against Active Topology Inference
Protecting critical information infrastructure is a frontier of current cyberspace security research. This paper firstly introduces the concepts and common methods of topology inference and topology obfuscation. Then, an improved topology obfuscation method is proposed for active topology inference represented by trace route. It improves the selection algorithm of deployment nodes, adding virtual nodes and links by replicating the key topologies of the real network. For attackers who use traceroute for topology inference, this method will mislead them to obtain wrong node importance ranking. Finally, the simulation results show that the proposed topology obfuscation method can effectively against active topology inference in typical star-structured topology network.