Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks

Exploiting software-defined networking techniques, randomly and instantly mutating routes can disguise strategically important infrastructure and protect the integrity of data networks. Route mutation has been to date formulated as NP-complete constraint satisfaction problem where feasible sets of r...

Full description

Bibliographic Details
Main Authors: Yang Zhou, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Yixian Yang
Format: Article
Language:English
Published: Hindawi-Wiley 2017-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2017/4651395
id doaj-ba25411d8a3d4ba78ac99045bfa88d08
record_format Article
spelling doaj-ba25411d8a3d4ba78ac99045bfa88d082020-11-24T23:46:18ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222017-01-01201710.1155/2017/46513954651395Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined NetworksYang Zhou0Wei Ni1Kangfeng Zheng2Ren Ping Liu3Yixian Yang4School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaCSIRO, Sydney, NSW 2122, AustraliaSchool of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaGlobal Big Data Technologies Centre, University of Technology Sydney, Ultimo, NSW 2007, AustraliaSchool of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaExploiting software-defined networking techniques, randomly and instantly mutating routes can disguise strategically important infrastructure and protect the integrity of data networks. Route mutation has been to date formulated as NP-complete constraint satisfaction problem where feasible sets of routes need to be generated with exponential computational complexities, limiting algorithmic scalability to large-scale networks. In this paper, we propose a novel node-centric route mutation method which interprets route mutation as a signature matching problem. We formulate the route mutation problem as a three-dimensional earth mover’s distance (EMD) model and solve it by using a binary branch and bound method. Considering the scalability, we further propose that a heuristic method yields significantly lower computational complexities with marginal loss of robustness against eavesdropping. Simulation results show that our proposed methods can effectively disguise key infrastructure by reducing the difference of historically accumulative traffic among different switches. With significantly reduced complexities, our algorithms are of particular interest to safeguard large-scale networks.http://dx.doi.org/10.1155/2017/4651395
collection DOAJ
language English
format Article
sources DOAJ
author Yang Zhou
Wei Ni
Kangfeng Zheng
Ren Ping Liu
Yixian Yang
spellingShingle Yang Zhou
Wei Ni
Kangfeng Zheng
Ren Ping Liu
Yixian Yang
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
Security and Communication Networks
author_facet Yang Zhou
Wei Ni
Kangfeng Zheng
Ren Ping Liu
Yixian Yang
author_sort Yang Zhou
title Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
title_short Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
title_full Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
title_fullStr Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
title_full_unstemmed Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
title_sort scalable node-centric route mutation for defense of large-scale software-defined networks
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2017-01-01
description Exploiting software-defined networking techniques, randomly and instantly mutating routes can disguise strategically important infrastructure and protect the integrity of data networks. Route mutation has been to date formulated as NP-complete constraint satisfaction problem where feasible sets of routes need to be generated with exponential computational complexities, limiting algorithmic scalability to large-scale networks. In this paper, we propose a novel node-centric route mutation method which interprets route mutation as a signature matching problem. We formulate the route mutation problem as a three-dimensional earth mover’s distance (EMD) model and solve it by using a binary branch and bound method. Considering the scalability, we further propose that a heuristic method yields significantly lower computational complexities with marginal loss of robustness against eavesdropping. Simulation results show that our proposed methods can effectively disguise key infrastructure by reducing the difference of historically accumulative traffic among different switches. With significantly reduced complexities, our algorithms are of particular interest to safeguard large-scale networks.
url http://dx.doi.org/10.1155/2017/4651395
work_keys_str_mv AT yangzhou scalablenodecentricroutemutationfordefenseoflargescalesoftwaredefinednetworks
AT weini scalablenodecentricroutemutationfordefenseoflargescalesoftwaredefinednetworks
AT kangfengzheng scalablenodecentricroutemutationfordefenseoflargescalesoftwaredefinednetworks
AT renpingliu scalablenodecentricroutemutationfordefenseoflargescalesoftwaredefinednetworks
AT yixianyang scalablenodecentricroutemutationfordefenseoflargescalesoftwaredefinednetworks
_version_ 1725493882052935680