Int J Performability Eng ›› 2019, Vol. 15 ›› Issue (8): 2199-2207.doi: 10.23940/ijpe.19.08.p20.21992207

Previous Articles     Next Articles

Fast Multipath Jump Algorithms for Security Constraints

Wanwei Huanga, Yang Chenc, Jianwei Zhanga,*, Chunfeng Dub, Sunan Wangd   

  1. a Software Engineering College, Zhengzhou University of Light Industry, Zhengzhou, 450002, China
    b School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China
    c National Digital Switching System Engineering Technology Research Center, Zhengzhou, 450002, China
    d School of Electronics and Communication Engineering, Shenzhen Polytechnic College, Shenzhen, 518055, China
  • Submitted on ;
  • Contact: * E-mail address: zhangjw@zzu.edu.cn
  • About author:Wanwei Huang received his Ph.D. in communication and information systems from PLA Information Engineering University in 2009. He is currently a lecturer at Zhengzhou University of Light Industry. His research interest is communication engineering. Yang Chen is a master's student at the National Digital Switching System Engineering Technology Research Center. His research interests include cloud computing, SDN, and network security. Jianwei Zhang received his Ph.D. in computer application technology from PLA Information Engineering University in 2010. He is currently a professor at Zhengzhou University of Light Industry. His research interests include broadband information networks and network security. Chunfeng Du is a master's student in the School of Computer and Communication Engineering at Zhengzhou University of Light Industry. His research interests include network engineering and big data. Sunan Wang is an associate professor in the Electronic and Communication Engineering College at Shenzhen Vocational and Technical College. His research fields are network system architecture, data flow analysis, and information security.
  • Supported by:
    This work is supported by the National Natural Science Foundation of China (No. 61672471), Henan Province University Science and Technology Innovation Team (No. 18IRTSTHN012), Plan for Scientific Innovation Talent of Henan Province (No. 184200510010), and Ph.D. Foundation of Zhengzhou Institute of Light Industry (No. 2016BSJJ041).

Abstract: Transmission path jump can effectively resist network reconnaissance attacks by fragmented data transmission. However, most of the existing path jump models are based on SMT or game theory, which results in an exponential increase of computing time with network size. An efficient path generation algorithm for active random routing is proposed. Firstly, based on the global view of the network defined by the software, the paths of multiple streams are randomly changed actively and concurrently to resist reconnaissance, eavesdropping, and DoS attacks. Secondly, the traditional path calculation algorithm is re-modelled to satisfy the capacity, security, and QoS constraints of the K path generated, while improving the computational efficiency. Then, the optimal K value is solved, and the security effect of dynamic path is analysed. Finally, simulation results based on typical network topology show that the proposed algorithm can avoid and defend against malicious eavesdropping by attackers and improve the computational efficiency.

Key words: software-defined networking, multi-path, path jump