SlideShare a Scribd company logo
NTUST - Mobilizing Information Technology Lab
NEW SECURE ROUTING METHOD &
APPLICATIONS FACING MITM ATTACKS
Next Generation Networks and Services (NGNS), 2014
Advisor:Jenq-Shiou Leu
Student:Bing-Syuan Wang
Date:2015/05/12
National Taiwan University of Science and Technology
NTUST - Mobilizing Information Technology Lab
Outline
• Introduction
• Graph theory in computer network
• Algorithm for pathfinder
• Choice of a secure combination of paths to use
• Conclusion
2
NTUST - Mobilizing Information Technology Lab
Introduction
• Majority of solutions proposed till now for security are located at User
Application Level (Anti-Virus, Intrusion detector…).
• Routing is the act of moving information across an Internetwork from a source
to a destination.
• Packet sniffing allows individuals to capture data as it is transmitted over a
network.
• MITM: Main-in-the-middle attack
3
NTUST - Mobilizing Information Technology Lab
Introduction
• Using Graph Theory
• Choose from possible paths given by
pathfinder algorithm, all combinations
that meet a number of criteria such as
safety, speed, buffer size, etc.
4
NTUST - Mobilizing Information Technology Lab
Graph theory in computer network
• 𝐺 = (𝑉, 𝐸) Where 𝑉 is the set of vertices and 𝐸 is the set of edges, formed by
pairs of vertices.
• In this condition every Graph could be represented as a simple Matrix called
adjacency matrix.
• The adjacency matrix of 𝐺 = (𝑉, 𝐸) is a 𝑛 × 𝑛 Matrix 𝐷 = (𝑑𝑖𝑗) where 𝑛 is the
number of nodes in G, and 𝑑𝑖𝑗 represent the weight of each edge.
5
NTUST - Mobilizing Information Technology Lab
Graph theory in computer network
• Go from n1 to n6 we have:
n1 → n2 → n3 → n6
• And
n1 → n2 → n5 → n3 → n6
6
NTUST - Mobilizing Information Technology Lab
Algorithm for pathFinder
• Source = n0
• Destination = n2
7
NTUST - Mobilizing Information Technology Lab
Algorithm for pathFinder
• no impact is foreseen on Routers if the number of hops does not exceed 12
8
NTUST - Mobilizing Information Technology Lab
Choice of a secure combination of paths to use
• Source n0 and Destination n8
9
NTUST - Mobilizing Information Technology Lab
Choice of a secure combination of paths to use
• The best solution will be to have at minimum two paths (Pi & Pj) with same
weight (wi = wj) and also using different intermediate nodes
• OSPF: Open Shortest Path First
• two paths with the same smallest total weight = 4
n0 → n4 → n8 = 4
n0 → n1 → n2 → n5 → n8 = 4
10
NTUST - Mobilizing Information Technology Lab
Choice of a secure combination of paths to use
• When such solution is not possible, then we can consider another option
which is to look for two paths that satisfies the condition
𝑚𝑖 × 𝑤𝑖 = 𝑚𝑗 × 𝑤𝑗
• Again from past example we can consider the solution:
n0 → n1 → n2 → n5 → n8 = 4
n0 → n3 → n6 → n4 → n7 → n8 = 8
• With:
m1= 2 (2 messages on P1, load of 67%)
w1 = 4
m2= 1 (1 messages on P2, load of 33%)
w2 = 8
11
NTUST - Mobilizing Information Technology Lab
Conclusion
• Using Graph Theory, this paper developed a new way of routing that includes
indirectly the notion of security, a simulation was done to confirm that this new
method will not have any major impact on the router performance
• This paper highlighted some conditions to be used in order to chose the most
safer combination of paths.
• Finally, Optimization is still needed in order to be able to handle more nodes in
one AREA, and also to add the possibility to show only most secure paths in
one algorithm.
12

More Related Content

PPTX
Denclue Algorithm - Cluster, Pe
PDF
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
PDF
Feature Subset Selection for High Dimensional Data Using Clustering Techniques
PDF
Chaos Image Encryption Methods: A Survey Study
PPTX
Object classification using CNN & VGG16 Model (Keras and Tensorflow)
PDF
Optimal Converge cast Methods for Tree- Based WSNs
PPTX
Clustering in wireless sensor networks with compressive sensing
Denclue Algorithm - Cluster, Pe
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Feature Subset Selection for High Dimensional Data Using Clustering Techniques
Chaos Image Encryption Methods: A Survey Study
Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Optimal Converge cast Methods for Tree- Based WSNs
Clustering in wireless sensor networks with compressive sensing

What's hot (19)

PPTX
Numerical Integral using NNI
PDF
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
PDF
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
PDF
The Predictron: End-to-end Learning and Planning
PDF
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
PDF
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
PDF
An Introduction to Neural Architecture Search
PDF
Training machine learning k means 2017
PDF
A New Chaotic Map for Secure Transmission
PDF
Unsupervised Learning: Similarities and distance functions for IoT data
PPTX
Applications of Information Theory
DOCX
transmission-efficient clustering method for wireless sensor networks using c...
PDF
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
PPTX
Using Hopfield Networks for Solving TSP
PDF
Enterprise Scale Topological Data Analysis Using Spark
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
PDF
ME Synopsis
PPTX
Architecture and Performance of Runtime Environments for Data Intensive Scala...
Numerical Integral using NNI
Variable neighborhood Prediction of temporal collective profiles by Keun-Woo ...
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
The Predictron: End-to-end Learning and Planning
Scalable Graph Convolutional Network Based Link Prediction on a Distributed G...
PFP:材料探索のための汎用Neural Network Potential - 2021/10/4 QCMSR + DLAP共催
An Introduction to Neural Architecture Search
Training machine learning k means 2017
A New Chaotic Map for Secure Transmission
Unsupervised Learning: Similarities and distance functions for IoT data
Applications of Information Theory
transmission-efficient clustering method for wireless sensor networks using c...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
Using Hopfield Networks for Solving TSP
Enterprise Scale Topological Data Analysis Using Spark
IEEE 2014 JAVA NETWORKING PROJECTS Snapshot and continuous data collection in...
ME Synopsis
Architecture and Performance of Runtime Environments for Data Intensive Scala...
Ad

Viewers also liked (12)

PDF
Configuring dynamic and static routing
PPT
Dynamic routing under_sec
PPT
Routing, Different types of forwarding technique
PDF
static and dynamic routing
PPT
Static Routing
PPT
Dynamic Routing
PPT
Static Routing
PPT
Presentation on router
PPTX
Routers and Routing Configuration
PPTX
Routers.ppt
DOCX
Dsdv
Configuring dynamic and static routing
Dynamic routing under_sec
Routing, Different types of forwarding technique
static and dynamic routing
Static Routing
Dynamic Routing
Static Routing
Presentation on router
Routers and Routing Configuration
Routers.ppt
Dsdv
Ad

Similar to Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM attacks (20)

PDF
X RAJKUMAR (1) (1)
PPTX
Fakhre alam
PDF
Mobile ad hoc networks – dangling issues of optimal path strategy
PPTX
Improve MANET network performance using ESPS approach
PDF
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
PDF
Misconduct disclosure of the intermediates using the trusted authority
PDF
IRJET- Survey on Adaptive Routing Algorithms
PPTX
mini project_shortest path visualizer.pptx
PDF
Ijcatr04041022
PDF
SHORTEST PATH FINDING VISUALIZER
PPTX
Secured Data Transmission
PPTX
Routing algorithm
PPTX
Trust Based Routing In wireless sensor Network
PPTX
Bl cybersecurity z_dooly
PDF
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
PDF
Safe Trust Alert Routing in MANET
PPTX
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
DOCX
Detection and elemination of block hole attack
PDF
DCCN Network Layer congestion control TCP
X RAJKUMAR (1) (1)
Fakhre alam
Mobile ad hoc networks – dangling issues of optimal path strategy
Improve MANET network performance using ESPS approach
COMPUTER NETWORKS CHAPTER 3 NETWORK LAYER NOTES CSE 3RD year sem 1
Misconduct disclosure of the intermediates using the trusted authority
IRJET- Survey on Adaptive Routing Algorithms
mini project_shortest path visualizer.pptx
Ijcatr04041022
SHORTEST PATH FINDING VISUALIZER
Secured Data Transmission
Routing algorithm
Trust Based Routing In wireless sensor Network
Bl cybersecurity z_dooly
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Safe Trust Alert Routing in MANET
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Detection and elemination of block hole attack
DCCN Network Layer congestion control TCP

More from Syuan Wang (7)

PPTX
20150826 Introduction to Arduino
PPTX
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
PPTX
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
PPTX
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
PPTX
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
PPTX
Lab Meeting - 20141028 - Augmented Reality Interfaces
PPTX
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
20150826 Introduction to Arduino
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20141202 - Time-based Power Control Architecture for Application...
Lab Meeting - 20141028 - Augmented Reality Interfaces
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Construction Project Organization Group 2.pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
composite construction of structures.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
PPT on Performance Review to get promotions
bas. eng. economics group 4 presentation 1.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Construction Project Organization Group 2.pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Foundation to blockchain - A guide to Blockchain Tech
CH1 Production IntroductoryConcepts.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Internet of Things (IOT) - A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf
composite construction of structures.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT on Performance Review to get promotions

Labmeeting - 20150512 - New Secure Routing Method & Applications Facing MitM attacks

  • 1. NTUST - Mobilizing Information Technology Lab NEW SECURE ROUTING METHOD & APPLICATIONS FACING MITM ATTACKS Next Generation Networks and Services (NGNS), 2014 Advisor:Jenq-Shiou Leu Student:Bing-Syuan Wang Date:2015/05/12 National Taiwan University of Science and Technology
  • 2. NTUST - Mobilizing Information Technology Lab Outline • Introduction • Graph theory in computer network • Algorithm for pathfinder • Choice of a secure combination of paths to use • Conclusion 2
  • 3. NTUST - Mobilizing Information Technology Lab Introduction • Majority of solutions proposed till now for security are located at User Application Level (Anti-Virus, Intrusion detector…). • Routing is the act of moving information across an Internetwork from a source to a destination. • Packet sniffing allows individuals to capture data as it is transmitted over a network. • MITM: Main-in-the-middle attack 3
  • 4. NTUST - Mobilizing Information Technology Lab Introduction • Using Graph Theory • Choose from possible paths given by pathfinder algorithm, all combinations that meet a number of criteria such as safety, speed, buffer size, etc. 4
  • 5. NTUST - Mobilizing Information Technology Lab Graph theory in computer network • 𝐺 = (𝑉, 𝐸) Where 𝑉 is the set of vertices and 𝐸 is the set of edges, formed by pairs of vertices. • In this condition every Graph could be represented as a simple Matrix called adjacency matrix. • The adjacency matrix of 𝐺 = (𝑉, 𝐸) is a 𝑛 × 𝑛 Matrix 𝐷 = (𝑑𝑖𝑗) where 𝑛 is the number of nodes in G, and 𝑑𝑖𝑗 represent the weight of each edge. 5
  • 6. NTUST - Mobilizing Information Technology Lab Graph theory in computer network • Go from n1 to n6 we have: n1 → n2 → n3 → n6 • And n1 → n2 → n5 → n3 → n6 6
  • 7. NTUST - Mobilizing Information Technology Lab Algorithm for pathFinder • Source = n0 • Destination = n2 7
  • 8. NTUST - Mobilizing Information Technology Lab Algorithm for pathFinder • no impact is foreseen on Routers if the number of hops does not exceed 12 8
  • 9. NTUST - Mobilizing Information Technology Lab Choice of a secure combination of paths to use • Source n0 and Destination n8 9
  • 10. NTUST - Mobilizing Information Technology Lab Choice of a secure combination of paths to use • The best solution will be to have at minimum two paths (Pi & Pj) with same weight (wi = wj) and also using different intermediate nodes • OSPF: Open Shortest Path First • two paths with the same smallest total weight = 4 n0 → n4 → n8 = 4 n0 → n1 → n2 → n5 → n8 = 4 10
  • 11. NTUST - Mobilizing Information Technology Lab Choice of a secure combination of paths to use • When such solution is not possible, then we can consider another option which is to look for two paths that satisfies the condition 𝑚𝑖 × 𝑤𝑖 = 𝑚𝑗 × 𝑤𝑗 • Again from past example we can consider the solution: n0 → n1 → n2 → n5 → n8 = 4 n0 → n3 → n6 → n4 → n7 → n8 = 8 • With: m1= 2 (2 messages on P1, load of 67%) w1 = 4 m2= 1 (1 messages on P2, load of 33%) w2 = 8 11
  • 12. NTUST - Mobilizing Information Technology Lab Conclusion • Using Graph Theory, this paper developed a new way of routing that includes indirectly the notion of security, a simulation was done to confirm that this new method will not have any major impact on the router performance • This paper highlighted some conditions to be used in order to chose the most safer combination of paths. • Finally, Optimization is still needed in order to be able to handle more nodes in one AREA, and also to add the possibility to show only most secure paths in one algorithm. 12

Editor's Notes

  • #4: or at most between Layer 4 and 7 like: Firewall (Access Control List), IPsec, Transport Layer Security …, when it is also possible to introduce security in the lower layers such as the network layer, where we have the famous router.