作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2023, Vol. 49 ›› Issue (12): 282-293, 303. doi: 10.19678/j.issn.1000-3428.0066278

• 开发研究与工程应用 • 上一篇    下一篇

对抗多模式网络层析成像的拓扑混淆机制

林洪秀, 邢长友, 詹熙   

  1. 中国人民解放军陆军工程大学 指挥控制工程学院, 南京 210007
  • 收稿日期:2022-11-16 出版日期:2023-12-15 发布日期:2023-12-14
  • 作者简介:

    林洪秀(1998—),女,硕士研究生,主研方向为网络拓扑混淆、软件定义网络

    邢长友,副教授、博士

    詹熙,硕士研究生

  • 基金资助:
    国家自然科学基金(62172432)

Topology Obfuscation Mechanism Against Multi-mode Network Tomography

Hongxiu LIN, Changyou XING, Xi ZHAN   

  1. College of Command and Control Engineering, The Army Engineering University of PLA, Nanjing 210007, China
  • Received:2022-11-16 Online:2023-12-15 Published:2023-12-14

摘要:

网络层析成像技术能通过测量目标网络的端到端性能测度来推断其拓扑结构,进而为攻击者开展更加精准的网络攻击行为提供支持。尽管网络拓扑混淆技术为对抗这类侦察行为提供了一种解决思路,但现有的网络拓扑混淆技术在探测模式识别准确度、对抗行为有效性等方面仍存在不足。为此,提出一种对抗多模式网络层析成像的拓扑混淆机制M2NTO。针对网络层析成像模式多样化的特点,M2NTO基于增量更新的动态决策树分类算法,构建一种能够在线对抗多样化探测行为的端到端性能参数扰动方法,以应对不同模式的层析成像拓扑探测手段。在多种典型真实网络拓扑上的仿真实验表明,M2NTO在多个场景中都能够以在线的方式准确识别不同模式的探测行为,探测流识别准确率在多个场景下都达到了98%以上,误报率维持在2%之内,探测流分类准确率达到95%以上,在此基础上,通过扰动相应的性能测度干扰攻击者的推断结果,使攻击者推断的网络拓扑与真实网络拓扑的相似度下降到60%以下,有效增强混淆拓扑生成的效能。

关键词: 拓扑混淆, 拓扑推断, 网络层析成像, 流量识别, 动态决策树

Abstract:

By performing an end-to-end performance measurement of a target network, the network tomography method can infer its internal topology accurately, which can support attackers in carrying out more effective attacks.Although network topology obfuscation techniques provide a solution to counter such reconnaissance behaviors, they still have shortcomings in the recognition accuracy of the probe pattern as well as the effectiveness of the countermeasures.Therefore, this study proposes a topology obfuscation mechanism for Multi-mode Network Tomography(M2NTO). Based on the characteristics of diverse network tomography modes, M2NTO constructs an end-to-end performance metric dynamic perturbation-based online dynamic decision tree recognition and classification model of probe behaviors to cope with diverse network tomography methods. Simulation results based on several typical real network topologies demonstrate that M2NTO can accurately identify the patterns of different probe behaviors online in multiple scenarios.The detection flow identification accuracy was more than 98% in multiple scenarios, the false positive rate was maintained within 2%, and the detection flow classification accuracy was more than 95%. On this basis, M2NTO interferes with the attacker's inference results by perturbing the corresponding performance metrics.Thus, the similarity between the inferred network topology and the real network topology is reduced to less than 60%, which effectively enhances the obfuscated topology generation efficiency.

Key words: topology obfuscation, topology inference, network tomography, traffic identification, dynamic decision tree