Overview
Syllabus
Intro
Link flooding attacks (LFA) target the infrastructure
Learning large topologies by combining many path measurements
Reactive and proactive strategies to mitigate link-flooding attacks
Topology obfuscation as an optimization problem
A topology is robust against LFAS if the flow density of each link does not exceed is capacity
Two basic strategies for attacking the virtual topology despite obfuscation
Accuracy and utility measure the closeness of P and V
NetHide optimizes over a random sample of solutions to improve performance and security
Maintaining the utility of debugging tools requires sending packets through the actual network
Programmable network devices allow modifying tracing packets at line rate
Encoding state in packets instead of storing it in devices
High protection with small impact on accuracy and utility
NetHide: Secure and Practical Network Topology Obfuscation
Taught by
USENIX