Cargando…

Towards attack tolerant networks: Concurrent multipath routing and the butterfly network

It is crucial for large-scale communication networks such as the internet to be resilient against attacks such as censorship and surveillance, which pose a threat to free expression and free association. Self-organized networks such as the internet’s router network typically have heavy-tailed degree...

Descripción completa

Detalles Bibliográficos
Autores principales: Platt, Edward L., Romero, Daniel M.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6447174/
https://www.ncbi.nlm.nih.gov/pubmed/30943216
http://dx.doi.org/10.1371/journal.pone.0214292
_version_ 1783408469493153792
author Platt, Edward L.
Romero, Daniel M.
author_facet Platt, Edward L.
Romero, Daniel M.
author_sort Platt, Edward L.
collection PubMed
description It is crucial for large-scale communication networks such as the internet to be resilient against attacks such as censorship and surveillance, which pose a threat to free expression and free association. Self-organized networks such as the internet’s router network typically have heavy-tailed degree distributions, making them highly vulnerable to targeted attacks against central nodes. While cryptographic solutions exist, they fail to address the underlying topological problem, and remain vulnerable to man-in-the-middle attacks and coercion. Coercion-resistant, topological approaches to attack tolerance are needed to address the current vulnerability of communications infrastructure to censorship and surveillance. We present a novel concurrent multipath routing (CMR) algorithm for the wraparound butterfly network topology, as well as a highly attack-tolerant Structured Multipath Fault Tolerance (SMFT) architecture which incorporates the butterfly CMR algorithm. We also identify a previously unexplored relationship between network topology, trust transitivity, and attack-tolerance, and provide a framework for further exploration of this relationship. Our work is the first theoretical demonstration of a point-to-point communication network architecture that can resist coercion and other non-technical attacks, without requiring infinitely transitive trust. To address cases where the network structure cannot be fully controlled, we demonstrate how a snapshot of the internet’s router network can be partially rewired for greater attack-tolerance. More broadly, we hope that this work will serve as a starting point for the evelopment of additional topology-based attack-tolerant communication architectures to guard against the dangers of censorship and surveillance.
format Online
Article
Text
id pubmed-6447174
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-64471742019-04-17 Towards attack tolerant networks: Concurrent multipath routing and the butterfly network Platt, Edward L. Romero, Daniel M. PLoS One Research Article It is crucial for large-scale communication networks such as the internet to be resilient against attacks such as censorship and surveillance, which pose a threat to free expression and free association. Self-organized networks such as the internet’s router network typically have heavy-tailed degree distributions, making them highly vulnerable to targeted attacks against central nodes. While cryptographic solutions exist, they fail to address the underlying topological problem, and remain vulnerable to man-in-the-middle attacks and coercion. Coercion-resistant, topological approaches to attack tolerance are needed to address the current vulnerability of communications infrastructure to censorship and surveillance. We present a novel concurrent multipath routing (CMR) algorithm for the wraparound butterfly network topology, as well as a highly attack-tolerant Structured Multipath Fault Tolerance (SMFT) architecture which incorporates the butterfly CMR algorithm. We also identify a previously unexplored relationship between network topology, trust transitivity, and attack-tolerance, and provide a framework for further exploration of this relationship. Our work is the first theoretical demonstration of a point-to-point communication network architecture that can resist coercion and other non-technical attacks, without requiring infinitely transitive trust. To address cases where the network structure cannot be fully controlled, we demonstrate how a snapshot of the internet’s router network can be partially rewired for greater attack-tolerance. More broadly, we hope that this work will serve as a starting point for the evelopment of additional topology-based attack-tolerant communication architectures to guard against the dangers of censorship and surveillance. Public Library of Science 2019-04-03 /pmc/articles/PMC6447174/ /pubmed/30943216 http://dx.doi.org/10.1371/journal.pone.0214292 Text en © 2019 Platt, Romero http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Platt, Edward L.
Romero, Daniel M.
Towards attack tolerant networks: Concurrent multipath routing and the butterfly network
title Towards attack tolerant networks: Concurrent multipath routing and the butterfly network
title_full Towards attack tolerant networks: Concurrent multipath routing and the butterfly network
title_fullStr Towards attack tolerant networks: Concurrent multipath routing and the butterfly network
title_full_unstemmed Towards attack tolerant networks: Concurrent multipath routing and the butterfly network
title_short Towards attack tolerant networks: Concurrent multipath routing and the butterfly network
title_sort towards attack tolerant networks: concurrent multipath routing and the butterfly network
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6447174/
https://www.ncbi.nlm.nih.gov/pubmed/30943216
http://dx.doi.org/10.1371/journal.pone.0214292
work_keys_str_mv AT plattedwardl towardsattacktolerantnetworksconcurrentmultipathroutingandthebutterflynetwork
AT romerodanielm towardsattacktolerantnetworksconcurrentmultipathroutingandthebutterflynetwork