[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20080151865A1 - Security Through Manipulation of Virtual Topography - Google Patents

Security Through Manipulation of Virtual Topography Download PDF

Info

Publication number
US20080151865A1
US20080151865A1 US12/045,358 US4535808A US2008151865A1 US 20080151865 A1 US20080151865 A1 US 20080151865A1 US 4535808 A US4535808 A US 4535808A US 2008151865 A1 US2008151865 A1 US 2008151865A1
Authority
US
United States
Prior art keywords
packets
node
packet
ordered
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/045,358
Inventor
T. Liam Leahy
Eric Coley
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LEAHY LIAM
Original Assignee
LEAHY LIAM
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LEAHY LIAM filed Critical LEAHY LIAM
Priority to US12/045,358 priority Critical patent/US20080151865A1/en
Publication of US20080151865A1 publication Critical patent/US20080151865A1/en
Assigned to GLOBAL AREA NETWORK, INC. reassignment GLOBAL AREA NETWORK, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: COLEY, ERIC GIRARD, LEAHY, LIAM
Assigned to LEAHY, LIAM reassignment LEAHY, LIAM ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GLOBAL AREA NETWORK, INC.
Assigned to LEAHY, LIAM reassignment LEAHY, LIAM LETTER DISPUTING OWNERSHIP Assignors: GLOBAL AREA NETWORK
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Definitions

  • the field of the invention is network security.
  • Such a packet typically also includes a header that contains an identifier identifying a destination node and often an identifier identifying the sending/source node as well.
  • a node using IP packets to send a data object to another node will often break the data object up into an ordered set of packets where each packet comprises a data block portion containing a piece of the data object, and a header portion the contains both a source IP address and a destination IP address.
  • ordered set of packets is used herein to denote any set of packets used to transmit a data object between nodes such that the contents of all of the data packets is necessary to reconstruct the data object at a receiving node. It is a set in the sense that all the packets are necessary to recreate the data object, and ordered in the sense that the contents of the packets must be ordered in a particular way to recreate the data object. In some instances multiple data objects may be transmitted via a single ordered set of packets.
  • source and destination identifiers in packet headers provides a mechanism by which an entity that monitors the flow of packets across a network can identify nodes and possibly reconstruct the topology of the network. Having their identifiers known raises security concerns for the nodes as the identifier can be used to send packets to the node and possibly to gain access to the node.
  • the present invention is directed to methods and apparatus for improving security securing networks through manipulation of virtual topography.
  • identifiers used by nodes to receive packets and the identifiers that nodes use in packet headers of packets being sent.
  • ID identifier
  • focus will be given primarily to three particular identifiers that will be referred to as the node identifier, the source identifier, and the destination identifiers.
  • the node identifier is an identifier that a particular node looks for when observing packets being transmitted on a network to determine if a particular packet is being sent to the node.
  • the source (SID) identifier is an identifier that the node uses when sending packets having a header that contains a source identifier
  • the destination identifier (DID) is an identifier that the node uses when specifying the destination of a packet.
  • SID source
  • DID destination identifier
  • each node will be assigned a set of NIDs, a set of SIDs, and a set of DIDs for use in sending and receiving packets, and will also be provided with a set of rules, a table, or some other ID determination mechanism (IDDM) by which the node can determine which IDs are to be used at a particular time.
  • IDDM ID determination mechanism
  • the node will then proceed to use the IDDM to vary the SIDs and DIDs of packets it sends and the NID or NIDs it uses in filtering received packets.
  • NIDs, SIDs, and DIDs are IP addresses used to send and receive IP packets.
  • IDDMs may employ various methods, but that in some instances it will be advantageous to utilize tables specifying sequences of NIDs and sequences of pairs of SIDs and DIDs.
  • FIG. 1A is a schematic view of a network.
  • FIG. 1B is a schematic view of the apparent topology of the network of FIG. 1A .
  • FIG. 1C is a schematic view of the apparent topology of a network having a node assigned multiple identifiers.
  • FIG. 1D is a schematic view of a network having the apparent topology of FIG. 1C .
  • FIG. 1E is a schematic view of a first possible apparent topology of a network having multiple nodes assigned multiple identifiers.
  • FIG. 1F is a schematic view of a second possible apparent topology of a network having multiple nodes assigned multiple identifiers.
  • FIG. 1G is a schematic view of a network having the apparent topology of FIG. 1E .
  • FIG. 1H is an ID relationship table showing the relationships between nodes, NIDs, SIDs, and DIDs for the network and packets of FIG. 1G and the apparent topology of FIG. 1E .
  • FIG. 1I is a an ID relationship table corresponding to the apparent topology of FIG. 1F .
  • FIG. 1J is a schematic view the apparent topology of the network of FIG. 1A when NN SIDs are in use.
  • FIG. 1K is a schematic view of the apparent topology of the network of FIG. 1A when all nodes use NN SIDs.
  • FIG. 1L is a schematic of an apparent topology achievable by combining the assignment of multiple identifiers to nodes and the use of NN SIDs by the nodes.
  • FIG. 1M is a schematic of an apparent topology achievable by combining the assignment of multiple identifiers to nodes and the use of NN SIDs by the nodes.
  • FIG. 1N is an ID relationship table corresponding to FIG. 1L .
  • FIG. 2A is a schematic view of a network comprising an intermediary routing node acting as a hub for communications between end routing nodes.
  • FIG. 2B is a table illustrating a possible set of SD Pairs used to transmit a packet across multiple segments of a network using encapsulation, NN SIDs, and nodes assigned multiple NIDs.
  • FIG. 3A is a table illustrating a possible acceptable sequence of SD Pairs that may be required to be used for packets to be accepted at a destination node.
  • FIG. 3B illustrates the use of a source key with a sequence of SD Pairs to validate packets.
  • FIG. 3C illustrates the use of a possible acceptable sequence of SD Pair/Key combination that may be required to be used for packets to be accepted at a destination node.
  • network 100 comprises node 110 sending a copy of data object 111 (a file containing the text of the Declaration of Independence) as an ordered set of packets 120 (some of which have already been received by node 130 ) to node 130 where the packets are being reassembled as data object 131 .
  • the node ID (NID) of node 110 in FIG. 1 is “1” and the NID of node 130 in FIG. 1 is “3”.
  • Each packet ( 121 - 123 ) of the set of packets 120 comprises a header having both a source ID (SID) and a destination ID (DID) which are equivalent to the NIDs of nodes 110 and 130 .
  • Nodes 110 and 130 are coupled together via transmission medium 140 .
  • the topology of network 100 can be determined by monitoring packets transmitted via medium 140 from the SIDs and DIDs of the transmitted packets.
  • FIG. 1B is an illustration of what that topology would look like where a circle is assigned to each SID and DID seen, and lines are drawn between circles to indicate that SID/DID pairs seen in monitored packets. Thus, in FIG. 1B , the circles indicated that SID/DID values of “1” and “3” are visible, while the line indicates the SID/DID pair that is visible.
  • security could be improved by assigning a plurality of NIDs to a node such that the packets addressed with any of the currently assigned NIDs will be routed to and received by the node.
  • the phrase “received by the node” is used herein to mean that not only will the packet physically reach the node but that the node will be programmed or otherwise adapted to recognize that it should perform further processing on any packets having a DID equivalent to a currently assigned NID.
  • FIG. 1C illustrates the apparent topology of network 100 if node 130 is assigned a plurality of NIDs ( 3 A, 3 B, and 3 C), and node 110 uses all of the assigned NIDs to send packets to node 130 as illustrated in FIG. 1D .
  • the elements of FIG. 1D correspond to those of FIG. 1A with the primary changes being in the SID and DID pairs (SD Pairs) of packets 121 - 123 and the NIDs of node 130 .
  • Elements 111 and 131 and the data block contents of packets 121 - 123 were left out of FIG. 1D to simplify the presentation.
  • FIG. 1E illustrates a possible apparent topology of network 100 if both node 110 and node 130 are assigned a plurality of NIDs ( 1 A, 1 B, 1 C, 3 A, 3 B, 3 C), and node 110 uses all of the assigned NIDs to send packets to node 130 as illustrated in FIG. 1G .
  • FIG. 1G provides a simplified view of the network of FIG. 1A wherein the only difference is in regard to the NIDs assigned to the nodes and the SD Pairs used by packets 121 - 123 .
  • FIG. 1F shows an alternate apparent topology if all possible SD Pairs are used.
  • FIGS. 1H and 1I are ID relationship tables that illustrate the relationships between the nodes and various IDs for each of the packets sent across the network where table 1 H corresponds to the topology of FIG. 1E and table 1 I to the topology of FIG. 1F . It is important to note that someone observing packets being transmitted be able to recreate, at most, the SID and DID columns of the packets.
  • security could also be improved by having a node use SIDs in packets it sends that do not correspond to any NIDs assigned to the node.
  • node 110 of FIG. 1A used “2” as the SID in any sent packets
  • the apparent topology of network 100 would be that shown in FIG. 1J rather than that of FIG. 1B .
  • SIDs that aren't NIDs the actual NIDs of the source node of the packets will not be visible to anyone seeing the SIDs and DIDs of the packets.
  • security could be further improved by having all nodes that send packets use SIDs that do not correspond to any assigned NIDs.
  • node 110 of FIG. 1A had a NID of “1” and used “2” as the SID of any sent packets
  • node 130 of FIG. 1A had a NID of “3” and used a “4” as the SID of any sent packets
  • the apparent topology of network 100 would be that shown in FIG. 1K rather than that of FIG. 1B or 1 J.
  • FIG. 1N provides an ID relationship table corresponding to FIG. 1L . Once again, the only portion of the table of FIG. 1L that is visible to someone examining packets are the SID and DID columns showing the SD Pairs of the packets.
  • FIG. 2A illustrates the physical/actual topology of a network comprising two end routing nodes, 210 and 230 , and one intermediary routing node 220 .
  • End routing nodes 210 and 230 act to couple sub-networks N 1 and N 3 to each other via network N 2 .
  • networks N 1 and N 3 will be private sub-networks while network N 2 is a public network such as the Internet. If node 211 sends a packet to node 234 , routing node 210 will encapsulate it an send it to intermediate routing node 220 .
  • Intermediate routing node 220 will then strip the encapsulating packet off, and re-encapsulate and send the original pack sent by node 211 on to routing node 230 .
  • Routing node 230 will then strip off the encapsulating packet and send it on to node 234 .
  • the original packet from node 211 would comprise the SD Pair ( 211 , 234 ) in its header as it traverses segment 241 .
  • the packet encapsulating the original packet would have an SD Pair of ( 210 , 220 ) if NN SIDs aren't used, and only a single NID is assigned to each routing node as it traverses segment 242 .
  • the packet encapsulating the original packet would have the SD Pair ( 220 , 230 ) as it traverses segment 243 . Finally the original packet with the SD Pair ( 211 , 234 ) would traverse segment 244 to reach node 234 .
  • node 220 Simply forcing all traffic passing between nodes 210 and 230 to pass through node 220 provides a security enhancement (assuming the headers of any encapsulated packets are encrypted in some fashion) as anyone viewing packets traversing segment 242 or segment 243 will only have visibility to the SD Pairs used on those segments. If nodes 210 , 220 , and 230 are assigned multiple NIDs and if NN SIDs are used, the benefits described above come in to play as well. As an example, if node 210 were pictured as being in the position of node 110 of network 100 , and node 220 is the position of node 130 , then the SD Pairs of encapsulating packets traversing segment 242 could be manipulated to give the apparent topology of FIGS. 1L , 1 M, or some other desired topology.
  • an ordered set of packets may comprise all the packets sent through a particular “tunnel” during a given time period and thus may comprise packets that when reassembled make up a plurality of data objects.
  • FIG. 2B is a table showing a possible set of SD Pairs used to transmit packets from node 211 to node 234 across network 200 if: node 210 is assigned NIDs 1 A, 1 B, and 1 C but uses SIDs 2 A, 2 B, and 2 C when communicating with node 220 ; node 220 is assigned NIDs 3 A, 3 B, and 3 C for use on segment 242 but uses SIDs 4 A, 4 B, and 4 C when communicating with node 210 ; node 220 is assigned NIDs 5 A, 5 B, and 5 C for use on segment 243 but uses SIDs 6 A, 6 B, and 6 C when communicating with node 230 ; and node 230 is assigned NIDs 7 A, 7 B, and 7 C but uses SIDs 8 A, 8 B, and 8 C when communicating with node 220 .
  • a set of ordered packets will comprise IP packets being transmitted between private sub-networks across the internet.
  • nodes 210 , 220 , and 230 could be routers coupled to the Internet via one or more network interface (NIC) cards.
  • NIC network interface
  • Each NIC card of the routers could be programmed to accept packets addressed with any one of a set of DID/IP addresses.
  • a sending router could utilize any one of the IP Addresses currently assigned to the destination router. It is contemplated that there may be some intermediate routers located between nodes 210 and 220 and/or between nodes 220 and 230 . In some instances it may be feasible to dynamically update the routing table of such routers to properly route packets using the IP addresses currently assigned to the nodes.
  • FIG. 3A provides a table that might be provided to each of two nodes with one node using the table to set SD Pairs on outgoing packets and the other node to determine whether incoming packets should be accepted or discarded.
  • packets sent during first time block may be assigned SD Pairs in the following sequence: ( 1 A, 2 B), ( 1 C, 2 A), ( 1 A, 2 C), ( 1 B, 2 B), ( 1 C, 2 C), ( 1 A, 2 A), ( 1 E, 2 E), ( 1 F, 2 F), ( 1 G, 2 G), ( 1 G, 2 F), ( 1 F, 2 E), ( 1 E, 2 G). It is contemplated that assigning SD Pairs in a particular order eliminates the need for a separate sequence number such that a set of ordered pairs used to transmit a file or other data object can be sent and reassembled using only the SD Pairs of the packets. Alternatively, the inclusion of a sequence number or other order identifier would permit the reuse of SD Pairs within a time block.
  • FIGS. 3B and 3C Two of the many possible key assignment schemes possible are illustrated in FIGS. 3B and 3C .
  • a key is assigned to a particular node such that every packet sent by that node comprises its key (which may also be changed over time and/or in accordance with a key maintenance scheme).
  • a receiving node will not only verify that any received packet comprises a valid SD Pair, but that it also comprises a key from a known source
  • a separate key is assigned to each packet such that packet validation requires the packet comprise an acceptable combination of SD Pair and key.
  • no other nodes are shown in the figures, in reality one observing a segment of a public network would likely see packets from a large number of sub-networks traversing the segment with the extra traffic across the segment making it even more difficult to identify packets of interest and to determine how such packets have to be grouped to reassemble the file or other data object being sent.
  • further security can be provided by having a node send dummy packets, i.e. packets that do not comprise information being protected, and/or packets that do not comprise a valid SD Pairs or SD Pair/Key combination.
  • the packets of an ordered set of packets comprising the contents of a data object may be split among multiple segments.
  • a sub-network might comprise multiple links to a public network in which case the packets of the ordered set could be divided among the links for transmission.
  • the methods and systems described herein are not limited to a particular type of network, the use of a particular type of protocol, or the use of a particular transmission medium. As such, they are equally applicable to wired and wireless regardless of the physical topology or protocols used. However, it is contemplated that the methods and systems herein are particularly well adapted for use on TCP/IP networks. In such instances, assigning multiple IP addresses to NIC cards, manipulating the source and destination IP addresses used in the IP header of any packets sent, and/or validating incoming packets based on the source and destination IP addresses and possibly a key included in the packet provide a method of transmitting data order sets of packets that is more secure than transmission when such steps are not taken.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Methods and apparatus are disclosed for improving network security through the manipulation of the apparent topology of the network. Such manipulation is accomplished by assigning multiple identifiers to nodes, using different destination identifiers for packets being sent to the same destination, and using source identifiers that do not correspond to the identifiers of the node sending the packets.

Description

    FIELD OF THE INVENTION
  • The field of the invention is network security.
  • BACKGROUND OF THE INVENTION
  • When sending a data object from one node on a network to another it is common practice to break the data object up into smaller pieces at a sending node and to have the sending node send each piece across the network in a data block portion of a packet. Such a packet typically also includes a header that contains an identifier identifying a destination node and often an identifier identifying the sending/source node as well. As an example, a node using IP packets to send a data object to another node will often break the data object up into an ordered set of packets where each packet comprises a data block portion containing a piece of the data object, and a header portion the contains both a source IP address and a destination IP address. The phrase “ordered set of packets” is used herein to denote any set of packets used to transmit a data object between nodes such that the contents of all of the data packets is necessary to reconstruct the data object at a receiving node. It is a set in the sense that all the packets are necessary to recreate the data object, and ordered in the sense that the contents of the packets must be ordered in a particular way to recreate the data object. In some instances multiple data objects may be transmitted via a single ordered set of packets.
  • Unfortunately, the inclusion of source and destination identifiers in packet headers provides a mechanism by which an entity that monitors the flow of packets across a network can identify nodes and possibly reconstruct the topology of the network. Having their identifiers known raises security concerns for the nodes as the identifier can be used to send packets to the node and possibly to gain access to the node.
  • SUMMARY OF THE INVENTION
  • The present invention is directed to methods and apparatus for improving security securing networks through manipulation of virtual topography.
  • It is contemplated that security can be enhanced by manipulating the identifiers used by nodes to receive packets and the identifiers that nodes use in packet headers of packets being sent. Although applicable anywhere an identifier (ID) is used, focus will be given primarily to three particular identifiers that will be referred to as the node identifier, the source identifier, and the destination identifiers. The node identifier (NID) is an identifier that a particular node looks for when observing packets being transmitted on a network to determine if a particular packet is being sent to the node. The source (SID) identifier is an identifier that the node uses when sending packets having a header that contains a source identifier, and the destination identifier (DID) is an identifier that the node uses when specifying the destination of a packet. In previously known networks a node will often be assigned a single identifier and will use that identifier as both the node identifier and the source identifier.
  • It is contemplated that each node will be assigned a set of NIDs, a set of SIDs, and a set of DIDs for use in sending and receiving packets, and will also be provided with a set of rules, a table, or some other ID determination mechanism (IDDM) by which the node can determine which IDs are to be used at a particular time. The node will then proceed to use the IDDM to vary the SIDs and DIDs of packets it sends and the NID or NIDs it uses in filtering received packets.
  • It is contemplated that the methods and apparatus described herein may be advantageously applied to IP networks where the NIDs, SIDs, and DIDs are IP addresses used to send and receive IP packets.
  • It is contemplated that IDDMs may employ various methods, but that in some instances it will be advantageous to utilize tables specifying sequences of NIDs and sequences of pairs of SIDs and DIDs.
  • Various objects, features, aspects and advantages of the present invention will become more apparent from the following detailed description of preferred embodiments of the invention, along with the accompanying drawings in which like numerals represent like components.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1A is a schematic view of a network.
  • FIG. 1B is a schematic view of the apparent topology of the network of FIG. 1A.
  • FIG. 1C is a schematic view of the apparent topology of a network having a node assigned multiple identifiers.
  • FIG. 1D is a schematic view of a network having the apparent topology of FIG. 1C.
  • FIG. 1E is a schematic view of a first possible apparent topology of a network having multiple nodes assigned multiple identifiers.
  • FIG. 1F is a schematic view of a second possible apparent topology of a network having multiple nodes assigned multiple identifiers.
  • FIG. 1G is a schematic view of a network having the apparent topology of FIG. 1E.
  • FIG. 1H is an ID relationship table showing the relationships between nodes, NIDs, SIDs, and DIDs for the network and packets of FIG. 1G and the apparent topology of FIG. 1E.
  • FIG. 1I is a an ID relationship table corresponding to the apparent topology of FIG. 1F.
  • FIG. 1J is a schematic view the apparent topology of the network of FIG. 1A when NN SIDs are in use.
  • FIG. 1K is a schematic view of the apparent topology of the network of FIG. 1A when all nodes use NN SIDs.
  • FIG. 1L is a schematic of an apparent topology achievable by combining the assignment of multiple identifiers to nodes and the use of NN SIDs by the nodes.
  • FIG. 1M is a schematic of an apparent topology achievable by combining the assignment of multiple identifiers to nodes and the use of NN SIDs by the nodes.
  • FIG. 1N is an ID relationship table corresponding to FIG. 1L.
  • FIG. 2A is a schematic view of a network comprising an intermediary routing node acting as a hub for communications between end routing nodes.
  • FIG. 2B is a table illustrating a possible set of SD Pairs used to transmit a packet across multiple segments of a network using encapsulation, NN SIDs, and nodes assigned multiple NIDs.
  • FIG. 3A is a table illustrating a possible acceptable sequence of SD Pairs that may be required to be used for packets to be accepted at a destination node.
  • FIG. 3B illustrates the use of a source key with a sequence of SD Pairs to validate packets.
  • FIG. 3C illustrates the use of a possible acceptable sequence of SD Pair/Key combination that may be required to be used for packets to be accepted at a destination node.
  • DETAILED DESCRIPTION
  • Referring to FIG. 1A, network 100 comprises node 110 sending a copy of data object 111 (a file containing the text of the Declaration of Independence) as an ordered set of packets 120 (some of which have already been received by node 130) to node 130 where the packets are being reassembled as data object 131. The node ID (NID) of node 110 in FIG. 1 is “1” and the NID of node 130 in FIG. 1 is “3”. Each packet (121-123) of the set of packets 120 comprises a header having both a source ID (SID) and a destination ID (DID) which are equivalent to the NIDs of nodes 110 and 130. Nodes 110 and 130 are coupled together via transmission medium 140.
  • The topology of network 100 can be determined by monitoring packets transmitted via medium 140 from the SIDs and DIDs of the transmitted packets. FIG. 1B is an illustration of what that topology would look like where a circle is assigned to each SID and DID seen, and lines are drawn between circles to indicate that SID/DID pairs seen in monitored packets. Thus, in FIG. 1B, the circles indicated that SID/DID values of “1” and “3” are visible, while the line indicates the SID/DID pair that is visible.
  • It is contemplated that security could be improved by assigning a plurality of NIDs to a node such that the packets addressed with any of the currently assigned NIDs will be routed to and received by the node. The phrase “received by the node” is used herein to mean that not only will the packet physically reach the node but that the node will be programmed or otherwise adapted to recognize that it should perform further processing on any packets having a DID equivalent to a currently assigned NID.
  • FIG. 1C illustrates the apparent topology of network 100 if node 130 is assigned a plurality of NIDs (3A, 3B, and 3C), and node 110 uses all of the assigned NIDs to send packets to node 130 as illustrated in FIG. 1D. The elements of FIG. 1D correspond to those of FIG. 1A with the primary changes being in the SID and DID pairs (SD Pairs) of packets 121-123 and the NIDs of node 130. Elements 111 and 131 and the data block contents of packets 121-123 were left out of FIG. 1D to simplify the presentation.
  • It is contemplated that security could be further improved by assigning a plurality of NIDs to all the nodes. FIG. 1E illustrates a possible apparent topology of network 100 if both node 110 and node 130 are assigned a plurality of NIDs (1A, 1B, 1C, 3A, 3B, 3C), and node 110 uses all of the assigned NIDs to send packets to node 130 as illustrated in FIG. 1G. As with FIG. 1D, FIG. 1G provides a simplified view of the network of FIG. 1A wherein the only difference is in regard to the NIDs assigned to the nodes and the SD Pairs used by packets 121-123. FIG. 1F shows an alternate apparent topology if all possible SD Pairs are used.
  • FIGS. 1H and 1I are ID relationship tables that illustrate the relationships between the nodes and various IDs for each of the packets sent across the network where table 1H corresponds to the topology of FIG. 1E and table 1I to the topology of FIG. 1F. It is important to note that someone observing packets being transmitted be able to recreate, at most, the SID and DID columns of the packets.
  • It is contemplated that security could also be improved by having a node use SIDs in packets it sends that do not correspond to any NIDs assigned to the node. As an example, if node 110 of FIG. 1A used “2” as the SID in any sent packets, the apparent topology of network 100 would be that shown in FIG. 1J rather than that of FIG. 1B. By using SIDs that aren't NIDs, the actual NIDs of the source node of the packets will not be visible to anyone seeing the SIDs and DIDs of the packets.
  • It is contemplated that security could be further improved by having all nodes that send packets use SIDs that do not correspond to any assigned NIDs. As an example, if node 110 of FIG. 1A had a NID of “1” and used “2” as the SID of any sent packets, and node 130 of FIG. 1A had a NID of “3” and used a “4” as the SID of any sent packets, the apparent topology of network 100 would be that shown in FIG. 1K rather than that of FIG. 1B or 1J. By having all nodes use SIDs that aren't NIDs, the fact that any two nodes are exchanging packets is hidden.
  • It is contemplated that security could be further improved by both using non-NID SIDs (NN SIDs), and assigning and using multiple NIDs to nodes to be used as DIDs on any packets sent to those nodes. Such use would allow one to create the appearance of any topology desired with FIGS. 1L and 1M illustrating two of the many possible topologies. FIG. 1N provides an ID relationship table corresponding to FIG. 1L. Once again, the only portion of the table of FIG. 1L that is visible to someone examining packets are the SID and DID columns showing the SD Pairs of the packets.
  • It is contemplated that further security improvements can be obtained by utilizing an intermediary routing node and encapsulation to exchange packets between end routing nodes. FIG. 2A illustrates the physical/actual topology of a network comprising two end routing nodes, 210 and 230, and one intermediary routing node 220. End routing nodes 210 and 230 act to couple sub-networks N1 and N3 to each other via network N2. In a preferred embodiment networks N1 and N3 will be private sub-networks while network N2 is a public network such as the Internet. If node 211 sends a packet to node 234, routing node 210 will encapsulate it an send it to intermediate routing node 220. Intermediate routing node 220 will then strip the encapsulating packet off, and re-encapsulate and send the original pack sent by node 211 on to routing node 230. Routing node 230 will then strip off the encapsulating packet and send it on to node 234. As such, the original packet from node 211 would comprise the SD Pair (211,234) in its header as it traverses segment 241. Once encapsulated by node 210, the packet encapsulating the original packet would have an SD Pair of (210, 220) if NN SIDs aren't used, and only a single NID is assigned to each routing node as it traverses segment 242. Once re-encapsulated, the packet encapsulating the original packet would have the SD Pair (220, 230) as it traverses segment 243. Finally the original packet with the SD Pair (211, 234) would traverse segment 244 to reach node 234.
  • Simply forcing all traffic passing between nodes 210 and 230 to pass through node 220 provides a security enhancement (assuming the headers of any encapsulated packets are encrypted in some fashion) as anyone viewing packets traversing segment 242 or segment 243 will only have visibility to the SD Pairs used on those segments. If nodes 210, 220, and 230 are assigned multiple NIDs and if NN SIDs are used, the benefits described above come in to play as well. As an example, if node 210 were pictured as being in the position of node 110 of network 100, and node 220 is the position of node 130, then the SD Pairs of encapsulating packets traversing segment 242 could be manipulated to give the apparent topology of FIGS. 1L, 1M, or some other desired topology.
  • When using routing nodes and encapsulation, an ordered set of packets may comprise all the packets sent through a particular “tunnel” during a given time period and thus may comprise packets that when reassembled make up a plurality of data objects.
  • FIG. 2B is a table showing a possible set of SD Pairs used to transmit packets from node 211 to node 234 across network 200 if: node 210 is assigned NIDs 1A, 1B, and 1C but uses SIDs 2A, 2B, and 2C when communicating with node 220; node 220 is assigned NIDs 3A, 3B, and 3C for use on segment 242 but uses SIDs 4A, 4B, and 4C when communicating with node 210; node 220 is assigned NIDs 5A, 5B, and 5C for use on segment 243 but uses SIDs 6A, 6B, and 6C when communicating with node 230; and node 230 is assigned NIDs 7A, 7B, and 7C but uses SIDs 8A, 8B, and 8C when communicating with node 220.
  • In preferred embodiments a set of ordered packets will comprise IP packets being transmitted between private sub-networks across the internet. Using network 200 as an example, nodes 210, 220, and 230 could be routers coupled to the Internet via one or more network interface (NIC) cards. Each NIC card of the routers could be programmed to accept packets addressed with any one of a set of DID/IP addresses. A sending router could utilize any one of the IP Addresses currently assigned to the destination router. It is contemplated that there may be some intermediate routers located between nodes 210 and 220 and/or between nodes 220 and 230. In some instances it may be feasible to dynamically update the routing table of such routers to properly route packets using the IP addresses currently assigned to the nodes. However, it is contemplated that it may be better to simply set up the routing tables of such routers such that any one of a large set of IP addresses will be properly routed to a node and then to simply allow the node to determine which packets it will pay attention to at any particular time as will be described below.
  • It is contemplated that further security improvements can be obtained by adapting nodes to only accept packets that have particular SD Pairs, and to vary the list of acceptable SD Pairs over time. Acceptance of SD Pairs may also be limited in regard to the order they are used. Acceptance may further be conditioned on the packet comprising an additional key value that validates the authenticity of the packet. In instances where packets will traverse a public network and their order of arrival cannot be relied upon it would be advantageous to utilize adapt a particular node to accept any one of an acceptable combination of IDs and/or keys. FIG. 3A provides a table that might be provided to each of two nodes with one node using the table to set SD Pairs on outgoing packets and the other node to determine whether incoming packets should be accepted or discarded. As such, packets sent during first time block may be assigned SD Pairs in the following sequence: (1A, 2B), (1C, 2A), (1A, 2C), (1B, 2B), (1C, 2C), (1A, 2A), (1E, 2E), (1F, 2F), (1G, 2G), (1G, 2F), (1F, 2E), (1E, 2G). It is contemplated that assigning SD Pairs in a particular order eliminates the need for a separate sequence number such that a set of ordered pairs used to transmit a file or other data object can be sent and reassembled using only the SD Pairs of the packets. Alternatively, the inclusion of a sequence number or other order identifier would permit the reuse of SD Pairs within a time block.
  • In some instances it may be desirable to include another level of security by including a key in any packets set. Such a key might be part of the data block or the header of such packets and may be assigned in any manner as long as the receiving node is able to determine which packets comprise valid SD Pair and key combinations and which do not. Two of the many possible key assignment schemes possible are illustrated in FIGS. 3B and 3C. In FIG. 3B, a key is assigned to a particular node such that every packet sent by that node comprises its key (which may also be changed over time and/or in accordance with a key maintenance scheme). In such an instance a receiving node will not only verify that any received packet comprises a valid SD Pair, but that it also comprises a key from a known source In FIG. 3C, a separate key is assigned to each packet such that packet validation requires the packet comprise an acceptable combination of SD Pair and key.
  • It should be noted that, although no other nodes are shown in the figures, in reality one observing a segment of a public network would likely see packets from a large number of sub-networks traversing the segment with the extra traffic across the segment making it even more difficult to identify packets of interest and to determine how such packets have to be grouped to reassemble the file or other data object being sent. However, it is contemplated that further security can be provided by having a node send dummy packets, i.e. packets that do not comprise information being protected, and/or packets that do not comprise a valid SD Pairs or SD Pair/Key combination.
  • It is contemplated that in some instances the packets of an ordered set of packets comprising the contents of a data object may be split among multiple segments. As an example, a sub-network might comprise multiple links to a public network in which case the packets of the ordered set could be divided among the links for transmission.
  • It should be readily apparent that the methods and systems described herein are not limited to a particular type of network, the use of a particular type of protocol, or the use of a particular transmission medium. As such, they are equally applicable to wired and wireless regardless of the physical topology or protocols used. However, it is contemplated that the methods and systems herein are particularly well adapted for use on TCP/IP networks. In such instances, assigning multiple IP addresses to NIC cards, manipulating the source and destination IP addresses used in the IP header of any packets sent, and/or validating incoming packets based on the source and destination IP addresses and possibly a key included in the packet provide a method of transmitting data order sets of packets that is more secure than transmission when such steps are not taken.
  • Thus, specific embodiments and applications of security methods and systems have been disclosed. It should be apparent, however, to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced.

Claims (13)

1. A method of transmitting a set of ordered packets or a stream from an originating source node to a destination node, the method comprising:
addressing a first packet of the ordered set of packets with a first destination identifier that exclusively identifies the destination node;
addressing a second packet of the ordered set of packets with a second destination identifier—that exclusively identifies the destination node, but is different from the first destination identifier; and to
the source node sending the first and second packets to the destination node, whereby the packets are transmitted in a manner that increases security of the transmission.
2. The method of claim 1 wherein each of the set of ordered packets is an IP packet, and the provided identifiers are IP addresses.
3. The method of claim 2 further comprising:
addressing a first packet of the ordered set of packets with a first source identifier; and
addressing a second packet of the ordered set of packets with a second source identifier exclusively assigned to the source node and that is different from the first source identifier.
4. The method of claim 3 wherein the first source identifiers does not identify the source node.
5. A method of sending a set of ordered packets of a stream from an originating source node to a common destination node, the method comprising:
addressing a first packet of the ordered set of packets with a first source identifier;
addressing a second packet of the ordered set of packets with a second source identifier that is different from the first source identifier; and
sending the first packet and the second packet from the source node to the destination node.
6. The method of claim 5 wherein each of the set of ordered packets is an IP packet, and the provided identifiers are IP addresses.
7. The method of claim 6 wherein at least some of the provided source identifiers do not identify the system.
8. The method of claim 7 wherein none of the provided source identifiers identify the system.
9. The method of claim 8 wherein the set of ordered packets include the contents of a single message or file subdivided for transmission via the set of ordered packets.
10. The method of claim 9 wherein each packet of the ordered set of packets comprises an identifier pair that includes both the source identifier and a destination identifier of the packet, and each packet of the set comprises a unique identifier pair.
11. The method of claim 10 further comprising sending at least some dummy packets which are not part of the set ordered packets while sending the set of ordered packets.
12. The method of claim 11 further comprising sending the dummy packets by providing the dummy packets with destination identifiers that do not identify any system.
13-14. (canceled)
US12/045,358 2003-07-18 2008-03-10 Security Through Manipulation of Virtual Topography Abandoned US20080151865A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/045,358 US20080151865A1 (en) 2003-07-18 2008-03-10 Security Through Manipulation of Virtual Topography

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/623,210 US7415017B2 (en) 2003-07-18 2003-07-18 Security through manipulation of virtual topography
US12/045,358 US20080151865A1 (en) 2003-07-18 2008-03-10 Security Through Manipulation of Virtual Topography

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/623,210 Division US7415017B2 (en) 2003-07-18 2003-07-18 Security through manipulation of virtual topography

Publications (1)

Publication Number Publication Date
US20080151865A1 true US20080151865A1 (en) 2008-06-26

Family

ID=34063323

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/623,210 Expired - Fee Related US7415017B2 (en) 2003-07-18 2003-07-18 Security through manipulation of virtual topography
US12/045,358 Abandoned US20080151865A1 (en) 2003-07-18 2008-03-10 Security Through Manipulation of Virtual Topography

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/623,210 Expired - Fee Related US7415017B2 (en) 2003-07-18 2003-07-18 Security through manipulation of virtual topography

Country Status (3)

Country Link
US (2) US7415017B2 (en)
EP (1) EP1652331A4 (en)
WO (1) WO2005008942A2 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050216758A1 (en) * 2004-03-24 2005-09-29 Matusz Pawel O Frame authentication for a wireless network
US8493871B2 (en) * 2008-11-26 2013-07-23 Riverbed Technology, Inc. End-to end analysis of transactions in networks with traffic-altering devices
KR101062068B1 (en) 2008-12-01 2011-09-02 포항공과대학교 산학협력단 Anti-adhesion Composition

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6209064B1 (en) * 1998-01-07 2001-03-27 Fujitsu Limited Cache coherence unit with integrated message passing and memory protection for a distributed, shared memory multiprocessor system
US20010036189A1 (en) * 1998-02-05 2001-11-01 Biaodong Cai Network and method for ATM network operations
US20020141332A1 (en) * 2000-12-11 2002-10-03 Jeff Barnard Failover apparatus and method for an asynchronous data communication network
US6532477B1 (en) * 2000-02-23 2003-03-11 Sun Microsystems, Inc. Method and apparatus for generating an audio signature for a data item
US20030081600A1 (en) * 2001-10-30 2003-05-01 Blaker David M. Methods, systems and computer program products for packet ordering for parallel packet transform processing
US20040057428A1 (en) * 2000-09-22 2004-03-25 Jurgen Gerstner Method for operating an access network for a mobile radio system
US20040221047A1 (en) * 2003-04-30 2004-11-04 Grover Rajiv K System and method for processing fibre channel (FC) layer service requests in an FC network
US20050108576A1 (en) * 1999-09-15 2005-05-19 Datawire Communication Networks, Inc. System and method for secure transactions over a network
US20050226169A1 (en) * 2004-02-19 2005-10-13 Kelsey Richard A Dynamic identification of nodes in a network

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6430183B1 (en) * 1997-09-18 2002-08-06 International Business Machines Corporation Data transmission system based upon orthogonal data stream mapping
US6748452B1 (en) * 1999-03-26 2004-06-08 International Business Machines Corporation Flexible interprocess communication via redirection
US6693878B1 (en) * 1999-10-15 2004-02-17 Cisco Technology, Inc. Technique and apparatus for using node ID as virtual private network (VPN) identifiers
US6570885B1 (en) * 1999-11-12 2003-05-27 International Business Machines Corporation Segment-controlled process for controlling castouts from a communication cache in a port in any of multiple nodes in a communications network
US6721335B1 (en) * 1999-11-12 2004-04-13 International Business Machines Corporation Segment-controlled process in a link switch connected between nodes in a multiple node network for maintaining burst characteristics of segments of messages
EP1250790A1 (en) * 2000-01-28 2002-10-23 AT & T Corp. Method and apparatus for firewall with multiple addresses
JP3994614B2 (en) * 2000-03-13 2007-10-24 株式会社日立製作所 Packet switch, network monitoring system, and network monitoring method
JP3511978B2 (en) * 2000-05-18 2004-03-29 日本電気株式会社 Router with priority control function and machine-readable recording medium recording program
US7155494B2 (en) * 2002-01-09 2006-12-26 Sancastle Technologies Ltd. Mapping between virtual local area networks and fibre channel zones
US7836205B2 (en) * 2002-07-11 2010-11-16 Hewlett-Packard Development Company, L.P. Method and device for use with a virtual network
US7127255B2 (en) * 2002-10-01 2006-10-24 Trango Systems, Inc. Wireless point to multipoint system
US7949777B2 (en) * 2002-11-01 2011-05-24 Avid Technology, Inc. Communication protocol for controlling transfer of temporal data over a bus between devices in synchronization with a periodic reference signal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6209064B1 (en) * 1998-01-07 2001-03-27 Fujitsu Limited Cache coherence unit with integrated message passing and memory protection for a distributed, shared memory multiprocessor system
US20010036189A1 (en) * 1998-02-05 2001-11-01 Biaodong Cai Network and method for ATM network operations
US20050108576A1 (en) * 1999-09-15 2005-05-19 Datawire Communication Networks, Inc. System and method for secure transactions over a network
US6532477B1 (en) * 2000-02-23 2003-03-11 Sun Microsystems, Inc. Method and apparatus for generating an audio signature for a data item
US20040057428A1 (en) * 2000-09-22 2004-03-25 Jurgen Gerstner Method for operating an access network for a mobile radio system
US20020141332A1 (en) * 2000-12-11 2002-10-03 Jeff Barnard Failover apparatus and method for an asynchronous data communication network
US20030081600A1 (en) * 2001-10-30 2003-05-01 Blaker David M. Methods, systems and computer program products for packet ordering for parallel packet transform processing
US20040221047A1 (en) * 2003-04-30 2004-11-04 Grover Rajiv K System and method for processing fibre channel (FC) layer service requests in an FC network
US20050226169A1 (en) * 2004-02-19 2005-10-13 Kelsey Richard A Dynamic identification of nodes in a network

Also Published As

Publication number Publication date
US7415017B2 (en) 2008-08-19
WO2005008942A2 (en) 2005-01-27
WO2005008942B1 (en) 2006-06-01
EP1652331A2 (en) 2006-05-03
WO2005008942A3 (en) 2006-04-20
EP1652331A4 (en) 2010-11-03
US20050013324A1 (en) 2005-01-20

Similar Documents

Publication Publication Date Title
CN112189323B (en) Segment routing using secure segment identifiers
USRE39360E1 (en) System for signatureless transmission and reception of data packets between computer networks
TWI410088B (en) Method and system for tunneling macsec packets through non-macsec nodes as well as machine-readable storage medium
CN100508480C (en) Apparatus and method relating to Ethernet access system
US6438612B1 (en) Method and arrangement for secure tunneling of data between virtual routers
EP2595357B1 (en) Method performed in a network device and system for packet handling
CN1748401B (en) Method and apparatus for enforcing security groups for vlans
EP2345212B1 (en) Method and apparatus for forwarding data packets using aggregating router keys
US8127349B2 (en) Point-to-multi-point/non-broadcasting multi-access VPN tunnels
JP5449543B2 (en) Packet routing in the network
CN102461089B (en) For the method and apparatus using label to carry out strategy execution
EP1284076B1 (en) Ipsec processing
US20070258462A1 (en) Network Node Unit And Method For Forwarding Data Packets
US7000120B1 (en) Scheme for determining transport level information in the presence of IP security encryption
US7248589B2 (en) Apparatus for enabling multi-tuple TCP sockets within a computer network
US20030037235A1 (en) System for signatureless transmission and reception of data packets between computer networks
CN101133625A (en) Preventing duplicate sources from clients served by a network address port translator
US20230059348A1 (en) Blockchain enhanced route authorization
US20080151865A1 (en) Security Through Manipulation of Virtual Topography
CN100438477C (en) Filter for traffic separation
Morton Understanding IPv6
JP4088179B2 (en) Network device connection management device
US20070050516A1 (en) Method for transmitting electronic data via a dual network in order to increase internet security
EP1645071B1 (en) Secure indirect addressing
EP1686756B1 (en) Communication system, method and apparatus for providing mirroring service in the communication system

Legal Events

Date Code Title Description
AS Assignment

Owner name: GLOBAL AREA NETWORK, INC., DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LEAHY, LIAM;COLEY, ERIC GIRARD;REEL/FRAME:022950/0273

Effective date: 20030825

AS Assignment

Owner name: LEAHY, LIAM, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GLOBAL AREA NETWORK, INC.;REEL/FRAME:022951/0821

Effective date: 20051115

AS Assignment

Owner name: LEAHY, LIAM, CALIFORNIA

Free format text: LETTER DISPUTING OWNERSHIP;ASSIGNOR:GLOBAL AREA NETWORK;REEL/FRAME:023119/0643

Effective date: 20051115

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION