Cargando…
Towards attack tolerant networks: Concurrent multipath routing and the butterfly network
It is crucial for large-scale communication networks such as the internet to be resilient against attacks such as censorship and surveillance, which pose a threat to free expression and free association. Self-organized networks such as the internet’s router network typically have heavy-tailed degree...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6447174/ https://www.ncbi.nlm.nih.gov/pubmed/30943216 http://dx.doi.org/10.1371/journal.pone.0214292 |
_version_ | 1783408469493153792 |
---|---|
author | Platt, Edward L. Romero, Daniel M. |
author_facet | Platt, Edward L. Romero, Daniel M. |
author_sort | Platt, Edward L. |
collection | PubMed |
description | It is crucial for large-scale communication networks such as the internet to be resilient against attacks such as censorship and surveillance, which pose a threat to free expression and free association. Self-organized networks such as the internet’s router network typically have heavy-tailed degree distributions, making them highly vulnerable to targeted attacks against central nodes. While cryptographic solutions exist, they fail to address the underlying topological problem, and remain vulnerable to man-in-the-middle attacks and coercion. Coercion-resistant, topological approaches to attack tolerance are needed to address the current vulnerability of communications infrastructure to censorship and surveillance. We present a novel concurrent multipath routing (CMR) algorithm for the wraparound butterfly network topology, as well as a highly attack-tolerant Structured Multipath Fault Tolerance (SMFT) architecture which incorporates the butterfly CMR algorithm. We also identify a previously unexplored relationship between network topology, trust transitivity, and attack-tolerance, and provide a framework for further exploration of this relationship. Our work is the first theoretical demonstration of a point-to-point communication network architecture that can resist coercion and other non-technical attacks, without requiring infinitely transitive trust. To address cases where the network structure cannot be fully controlled, we demonstrate how a snapshot of the internet’s router network can be partially rewired for greater attack-tolerance. More broadly, we hope that this work will serve as a starting point for the evelopment of additional topology-based attack-tolerant communication architectures to guard against the dangers of censorship and surveillance. |
format | Online Article Text |
id | pubmed-6447174 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-64471742019-04-17 Towards attack tolerant networks: Concurrent multipath routing and the butterfly network Platt, Edward L. Romero, Daniel M. PLoS One Research Article It is crucial for large-scale communication networks such as the internet to be resilient against attacks such as censorship and surveillance, which pose a threat to free expression and free association. Self-organized networks such as the internet’s router network typically have heavy-tailed degree distributions, making them highly vulnerable to targeted attacks against central nodes. While cryptographic solutions exist, they fail to address the underlying topological problem, and remain vulnerable to man-in-the-middle attacks and coercion. Coercion-resistant, topological approaches to attack tolerance are needed to address the current vulnerability of communications infrastructure to censorship and surveillance. We present a novel concurrent multipath routing (CMR) algorithm for the wraparound butterfly network topology, as well as a highly attack-tolerant Structured Multipath Fault Tolerance (SMFT) architecture which incorporates the butterfly CMR algorithm. We also identify a previously unexplored relationship between network topology, trust transitivity, and attack-tolerance, and provide a framework for further exploration of this relationship. Our work is the first theoretical demonstration of a point-to-point communication network architecture that can resist coercion and other non-technical attacks, without requiring infinitely transitive trust. To address cases where the network structure cannot be fully controlled, we demonstrate how a snapshot of the internet’s router network can be partially rewired for greater attack-tolerance. More broadly, we hope that this work will serve as a starting point for the evelopment of additional topology-based attack-tolerant communication architectures to guard against the dangers of censorship and surveillance. Public Library of Science 2019-04-03 /pmc/articles/PMC6447174/ /pubmed/30943216 http://dx.doi.org/10.1371/journal.pone.0214292 Text en © 2019 Platt, Romero http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Platt, Edward L. Romero, Daniel M. Towards attack tolerant networks: Concurrent multipath routing and the butterfly network |
title | Towards attack tolerant networks: Concurrent multipath routing and the butterfly network |
title_full | Towards attack tolerant networks: Concurrent multipath routing and the butterfly network |
title_fullStr | Towards attack tolerant networks: Concurrent multipath routing and the butterfly network |
title_full_unstemmed | Towards attack tolerant networks: Concurrent multipath routing and the butterfly network |
title_short | Towards attack tolerant networks: Concurrent multipath routing and the butterfly network |
title_sort | towards attack tolerant networks: concurrent multipath routing and the butterfly network |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6447174/ https://www.ncbi.nlm.nih.gov/pubmed/30943216 http://dx.doi.org/10.1371/journal.pone.0214292 |
work_keys_str_mv | AT plattedwardl towardsattacktolerantnetworksconcurrentmultipathroutingandthebutterflynetwork AT romerodanielm towardsattacktolerantnetworksconcurrentmultipathroutingandthebutterflynetwork |