NetHide - Secure and Practical Network Topology Obfuscation

NetHide - Secure and Practical Network Topology Obfuscation

USENIX via YouTube Direct link

Accuracy and utility measure the closeness of P and V

8 of 14

8 of 14

Accuracy and utility measure the closeness of P and V

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

NetHide - Secure and Practical Network Topology Obfuscation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Link flooding attacks (LFA) target the infrastructure
  3. 3 Learning large topologies by combining many path measurements
  4. 4 Reactive and proactive strategies to mitigate link-flooding attacks
  5. 5 Topology obfuscation as an optimization problem
  6. 6 A topology is robust against LFAS if the flow density of each link does not exceed is capacity
  7. 7 Two basic strategies for attacking the virtual topology despite obfuscation
  8. 8 Accuracy and utility measure the closeness of P and V
  9. 9 NetHide optimizes over a random sample of solutions to improve performance and security
  10. 10 Maintaining the utility of debugging tools requires sending packets through the actual network
  11. 11 Programmable network devices allow modifying tracing packets at line rate
  12. 12 Encoding state in packets instead of storing it in devices
  13. 13 High protection with small impact on accuracy and utility
  14. 14 NetHide: Secure and Practical Network Topology Obfuscation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.