Open Access Open Access  Restricted Access Subscription Access

Fast IP Hopping Protocol SDI Implementation


Affiliations
1 Nizhny Novgorod State Technical University Named after RE Alekseev, Nizhny Novgorod, Russian Federation
2 Nizhny Novgorod State Technical University Named after RE Alekseev, Nizhny Novgorod
 

Background/Objectives: This paper suggests a new approach against Distributed Denial of Service attacks and traffic eavesdropping in TCP/IP networks. Methods/Statistical Analysis: In our method, DDoS resistance is achieved by introducing a new address policy in IP networks. This policy hides physical location of protected server for all unauthorized clients by dynamic mapping of server’s address on a large set of temporary addresses. This paper provides detailed description of the method and its mathematical model. Findings: The authors discuss basic implementation, its major practical constraints and results of initial validation. The proposed method is compatible with Software Defined Network and we discuss major possible advantages of IP Fast Hopping application in SDN. Applications/Improvements: The demonstrated technique suggests new addressing policy that based on randomizing of server’s address. This new addressing policy does not require any global significant changes in the existing Internet architecture and can be implemented as software solution on client and server ends without impact on transit infrastructure.

Keywords

DDoS, IP Fast Hopping, Network Security, SDN, Traffic Intrusion
User

Abstract Views: 161

PDF Views: 0




  • Fast IP Hopping Protocol SDI Implementation

Abstract Views: 161  |  PDF Views: 0

Authors

Vladimir Krylov
Nizhny Novgorod State Technical University Named after RE Alekseev, Nizhny Novgorod, Russian Federation
Kirill Kravtsov
Nizhny Novgorod State Technical University Named after RE Alekseev, Nizhny Novgorod
Eleanora Sokolova
Nizhny Novgorod State Technical University Named after RE Alekseev, Nizhny Novgorod, Russian Federation

Abstract


Background/Objectives: This paper suggests a new approach against Distributed Denial of Service attacks and traffic eavesdropping in TCP/IP networks. Methods/Statistical Analysis: In our method, DDoS resistance is achieved by introducing a new address policy in IP networks. This policy hides physical location of protected server for all unauthorized clients by dynamic mapping of server’s address on a large set of temporary addresses. This paper provides detailed description of the method and its mathematical model. Findings: The authors discuss basic implementation, its major practical constraints and results of initial validation. The proposed method is compatible with Software Defined Network and we discuss major possible advantages of IP Fast Hopping application in SDN. Applications/Improvements: The demonstrated technique suggests new addressing policy that based on randomizing of server’s address. This new addressing policy does not require any global significant changes in the existing Internet architecture and can be implemented as software solution on client and server ends without impact on transit infrastructure.

Keywords


DDoS, IP Fast Hopping, Network Security, SDN, Traffic Intrusion



DOI: https://doi.org/10.17485/ijst%2F2015%2Fv8i36%2F130080