SlideShare a Scribd company logo
1 of 12
NTUST - Mobilizing Information Technology Lab
NEW SECURE ROUTING METHOD &
APPLICATIONS FACING MITM ATTACKS
Next Generation Networks and Services (NGNS), 2014
Advisor:Jenq-Shiou Leu
Student:Bing-Syuan Wang
Date:2015/05/12
National Taiwan University of Science and Technology
NTUST - Mobilizing Information Technology Lab
Outline
• Introduction
• Graph theory in computer network
• Algorithm for pathfinder
• Choice of a secure combination of paths to use
• Conclusion
2
NTUST - Mobilizing Information Technology Lab
Introduction
• Majority of solutions proposed till now for security are located at User
Application Level (Anti-Virus, Intrusion detector…).
• Routing is the act of moving information across an Internetwork from a source
to a destination.
• Packet sniffing allows individuals to capture data as it is transmitted over a
network.
• MITM: Main-in-the-middle attack
3
NTUST - Mobilizing Information Technology Lab
Introduction
• Using Graph Theory
• Choose from possible paths given by
pathfinder algorithm, all combinations
that meet a number of criteria such as
safety, speed, buffer size, etc.
4
NTUST - Mobilizing Information Technology Lab
Graph theory in computer network
• 𝐺 = (𝑉, 𝐸) Where 𝑉 is the set of vertices and 𝐸 is the set of edges, formed by
pairs of vertices.
• In this condition every Graph could be represented as a simple Matrix called
adjacency matrix.
• The adjacency matrix of 𝐺 = (𝑉, 𝐸) is a 𝑛 × 𝑛 Matrix 𝐷 = (𝑑𝑖𝑗) where 𝑛 is the
number of nodes in G, and 𝑑𝑖𝑗 represent the weight of each edge.
5
NTUST - Mobilizing Information Technology Lab
Graph theory in computer network
• Go from n1 to n6 we have:
n1 → n2 → n3 → n6
• And
n1 → n2 → n5 → n3 → n6
6
NTUST - Mobilizing Information Technology Lab
Algorithm for pathFinder
• Source = n0
• Destination = n2
7
NTUST - Mobilizing Information Technology Lab
Algorithm for pathFinder
• no impact is foreseen on Routers if the number of hops does not exceed 12
8
NTUST - Mobilizing Information Technology Lab
Choice of a secure combination of paths to use
• Source n0 and Destination n8
9
NTUST - Mobilizing Information Technology Lab
Choice of a secure combination of paths to use
• The best solution will be to have at minimum two paths (Pi & Pj) with same
weight (wi = wj) and also using different intermediate nodes
• OSPF: Open Shortest Path First
• two paths with the same smallest total weight = 4
n0 → n4 → n8 = 4
n0 → n1 → n2 → n5 → n8 = 4
10
NTUST - Mobilizing Information Technology Lab
Choice of a secure combination of paths to use
• When such solution is not possible, then we can consider another option
which is to look for two paths that satisfies the condition
𝑚𝑖 × 𝑤𝑖 = 𝑚𝑗 × 𝑤𝑗
• Again from past example we can consider the solution:
n0 → n1 → n2 → n5 → n8 = 4
n0 → n3 → n6 → n4 → n7 → n8 = 8
• With:
m1= 2 (2 messages on P1, load of 67%)
w1 = 4
m2= 1 (1 messages on P2, load of 33%)
w2 = 8
11
NTUST - Mobilizing Information Technology Lab
Conclusion
• Using Graph Theory, this paper developed a new way of routing that includes
indirectly the notion of security, a simulation was done to confirm that this new
method will not have any major impact on the router performance
• This paper highlighted some conditions to be used in order to chose the most
safer combination of paths.
• Finally, Optimization is still needed in order to be able to handle more nodes in
one AREA, and also to add the possibility to show only most secure paths in
one algorithm.
12

More Related Content

What's hot

Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
miyurud
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
csandit
 

What's hot (19)

Numerical Integral using NNI
Numerical Integral using NNINumerical Integral using NNI
Numerical Integral using NNI
 
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
 
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETSFAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
 
The Predictron: End-to-end Learning and Planning
The Predictron: End-to-end Learning and PlanningThe Predictron: End-to-end Learning and Planning
The Predictron: End-to-end Learning and Planning
 
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
 
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
 
An Introduction to Neural Architecture Search
An Introduction to Neural Architecture SearchAn Introduction to Neural Architecture Search
An Introduction to Neural Architecture Search
 
Training machine learning k means 2017
Training machine learning k means 2017Training machine learning k means 2017
Training machine learning k means 2017
 
A New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure TransmissionA New Chaotic Map for Secure Transmission
A New Chaotic Map for Secure Transmission
 
Unsupervised Learning: Similarities and distance functions for IoT data
Unsupervised Learning: Similarities and distance functions for IoT dataUnsupervised Learning: Similarities and distance functions for IoT data
Unsupervised Learning: Similarities and distance functions for IoT data
 
Applications of Information Theory
Applications of Information TheoryApplications of Information Theory
Applications of Information Theory
 
transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...transmission-efficient clustering method for wireless sensor networks using c...
transmission-efficient clustering method for wireless sensor networks using c...
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
 
Using Hopfield Networks for Solving TSP
Using Hopfield Networks for Solving TSPUsing Hopfield Networks for Solving TSP
Using Hopfield Networks for Solving TSP
 
Enterprise Scale Topological Data Analysis Using Spark
Enterprise Scale Topological Data Analysis Using SparkEnterprise Scale Topological Data Analysis Using Spark
Enterprise Scale Topological Data Analysis Using Spark
 
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
 
ME Synopsis
ME SynopsisME Synopsis
ME Synopsis
 
Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...Architecture and Performance of Runtime Environments for Data Intensive Scala...
Architecture and Performance of Runtime Environments for Data Intensive Scala...
 
9
99
9
 

Viewers also liked

Configuring dynamic and static routing
Configuring dynamic and static routingConfiguring dynamic and static routing
Configuring dynamic and static routing
Anand Dhouni
 
Dynamic routing under_sec
Dynamic routing under_secDynamic routing under_sec
Dynamic routing under_sec
subhash85
 

Viewers also liked (13)

Configuring dynamic and static routing
Configuring dynamic and static routingConfiguring dynamic and static routing
Configuring dynamic and static routing
 
Dynamic routing under_sec
Dynamic routing under_secDynamic routing under_sec
Dynamic routing under_sec
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding technique
 
Dsdv
DsdvDsdv
Dsdv
 
static and dynamic routing
static and dynamic routingstatic and dynamic routing
static and dynamic routing
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Dynamic Routing
Dynamic RoutingDynamic Routing
Dynamic Routing
 
Static Routing
Static RoutingStatic Routing
Static Routing
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Dsdv
DsdvDsdv
Dsdv
 

Similar to Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM attacks

Artificial Intelligence Chapter 9 Negnevitsky
Artificial Intelligence Chapter 9 NegnevitskyArtificial Intelligence Chapter 9 Negnevitsky
Artificial Intelligence Chapter 9 Negnevitsky
lopanath
 

Similar to Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM attacks (20)

FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
 
J04401066071
J04401066071J04401066071
J04401066071
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
Backbone search for object detection for applications in intrusion warning sy...
Backbone search for object detection for applications in intrusion warning sy...Backbone search for object detection for applications in intrusion warning sy...
Backbone search for object detection for applications in intrusion warning sy...
 
Dijkstra Shortest Path Visualization
Dijkstra Shortest Path VisualizationDijkstra Shortest Path Visualization
Dijkstra Shortest Path Visualization
 
[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...
[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...
[IJET V2I3P11] Authors: Payal More, Rohini Pandit, Supriya Makude, Harsh Nirb...
 
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
BalloonNet: A Deploying Method for a Three-Dimensional Wireless Network Surro...
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossip
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
 
Neural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key ExchangeNeural Cryptography for Secret Key Exchange
Neural Cryptography for Secret Key Exchange
 
Artificial Intelligence Chapter 9 Negnevitsky
Artificial Intelligence Chapter 9 NegnevitskyArtificial Intelligence Chapter 9 Negnevitsky
Artificial Intelligence Chapter 9 Negnevitsky
 
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network AlgorithmsWeb Spam Classification Using Supervised Artificial Neural Network Algorithms
Web Spam Classification Using Supervised Artificial Neural Network Algorithms
 
Dp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_finalDp2 ppt by_bikramjit_chowdhury_final
Dp2 ppt by_bikramjit_chowdhury_final
 
F017533540
F017533540F017533540
F017533540
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
X trepan an extended trepan for
X trepan an extended trepan forX trepan an extended trepan for
X trepan an extended trepan for
 

More from Syuan Wang

More from Syuan Wang (7)

20150826 Introduction to Arduino
20150826 Introduction to Arduino20150826 Introduction to Arduino
20150826 Introduction to Arduino
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
 
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
 
Lab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality InterfacesLab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20141028 - Augmented Reality Interfaces
 
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android PhonesLab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
 

Recently uploaded

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 

Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM attacks

  • 1. NTUST - Mobilizing Information Technology Lab NEW SECURE ROUTING METHOD & APPLICATIONS FACING MITM ATTACKS Next Generation Networks and Services (NGNS), 2014 Advisor:Jenq-Shiou Leu Student:Bing-Syuan Wang Date:2015/05/12 National Taiwan University of Science and Technology
  • 2. NTUST - Mobilizing Information Technology Lab Outline • Introduction • Graph theory in computer network • Algorithm for pathfinder • Choice of a secure combination of paths to use • Conclusion 2
  • 3. NTUST - Mobilizing Information Technology Lab Introduction • Majority of solutions proposed till now for security are located at User Application Level (Anti-Virus, Intrusion detector…). • Routing is the act of moving information across an Internetwork from a source to a destination. • Packet sniffing allows individuals to capture data as it is transmitted over a network. • MITM: Main-in-the-middle attack 3
  • 4. NTUST - Mobilizing Information Technology Lab Introduction • Using Graph Theory • Choose from possible paths given by pathfinder algorithm, all combinations that meet a number of criteria such as safety, speed, buffer size, etc. 4
  • 5. NTUST - Mobilizing Information Technology Lab Graph theory in computer network • 𝐺 = (𝑉, 𝐸) Where 𝑉 is the set of vertices and 𝐸 is the set of edges, formed by pairs of vertices. • In this condition every Graph could be represented as a simple Matrix called adjacency matrix. • The adjacency matrix of 𝐺 = (𝑉, 𝐸) is a 𝑛 × 𝑛 Matrix 𝐷 = (𝑑𝑖𝑗) where 𝑛 is the number of nodes in G, and 𝑑𝑖𝑗 represent the weight of each edge. 5
  • 6. NTUST - Mobilizing Information Technology Lab Graph theory in computer network • Go from n1 to n6 we have: n1 → n2 → n3 → n6 • And n1 → n2 → n5 → n3 → n6 6
  • 7. NTUST - Mobilizing Information Technology Lab Algorithm for pathFinder • Source = n0 • Destination = n2 7
  • 8. NTUST - Mobilizing Information Technology Lab Algorithm for pathFinder • no impact is foreseen on Routers if the number of hops does not exceed 12 8
  • 9. NTUST - Mobilizing Information Technology Lab Choice of a secure combination of paths to use • Source n0 and Destination n8 9
  • 10. NTUST - Mobilizing Information Technology Lab Choice of a secure combination of paths to use • The best solution will be to have at minimum two paths (Pi & Pj) with same weight (wi = wj) and also using different intermediate nodes • OSPF: Open Shortest Path First • two paths with the same smallest total weight = 4 n0 → n4 → n8 = 4 n0 → n1 → n2 → n5 → n8 = 4 10
  • 11. NTUST - Mobilizing Information Technology Lab Choice of a secure combination of paths to use • When such solution is not possible, then we can consider another option which is to look for two paths that satisfies the condition 𝑚𝑖 × 𝑤𝑖 = 𝑚𝑗 × 𝑤𝑗 • Again from past example we can consider the solution: n0 → n1 → n2 → n5 → n8 = 4 n0 → n3 → n6 → n4 → n7 → n8 = 8 • With: m1= 2 (2 messages on P1, load of 67%) w1 = 4 m2= 1 (1 messages on P2, load of 33%) w2 = 8 11
  • 12. NTUST - Mobilizing Information Technology Lab Conclusion • Using Graph Theory, this paper developed a new way of routing that includes indirectly the notion of security, a simulation was done to confirm that this new method will not have any major impact on the router performance • This paper highlighted some conditions to be used in order to chose the most safer combination of paths. • Finally, Optimization is still needed in order to be able to handle more nodes in one AREA, and also to add the possibility to show only most secure paths in one algorithm. 12

Editor's Notes

  1. or at most between Layer 4 and 7 like: Firewall (Access Control List), IPsec, Transport Layer Security …, when it is also possible to introduce security in the lower layers such as the network layer, where we have the famous router.