US20080151865A1 - Security Through Manipulation of Virtual Topography - Google Patents
Security Through Manipulation of Virtual Topography Download PDFInfo
- Publication number
- US20080151865A1 US20080151865A1 US12/045,358 US4535808A US2008151865A1 US 20080151865 A1 US20080151865 A1 US 20080151865A1 US 4535808 A US4535808 A US 4535808A US 2008151865 A1 US2008151865 A1 US 2008151865A1
- Authority
- US
- United States
- Prior art keywords
- packets
- node
- packet
- ordered
- identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Definitions
- the field of the invention is network security.
- Such a packet typically also includes a header that contains an identifier identifying a destination node and often an identifier identifying the sending/source node as well.
- a node using IP packets to send a data object to another node will often break the data object up into an ordered set of packets where each packet comprises a data block portion containing a piece of the data object, and a header portion the contains both a source IP address and a destination IP address.
- ordered set of packets is used herein to denote any set of packets used to transmit a data object between nodes such that the contents of all of the data packets is necessary to reconstruct the data object at a receiving node. It is a set in the sense that all the packets are necessary to recreate the data object, and ordered in the sense that the contents of the packets must be ordered in a particular way to recreate the data object. In some instances multiple data objects may be transmitted via a single ordered set of packets.
- source and destination identifiers in packet headers provides a mechanism by which an entity that monitors the flow of packets across a network can identify nodes and possibly reconstruct the topology of the network. Having their identifiers known raises security concerns for the nodes as the identifier can be used to send packets to the node and possibly to gain access to the node.
- the present invention is directed to methods and apparatus for improving security securing networks through manipulation of virtual topography.
- identifiers used by nodes to receive packets and the identifiers that nodes use in packet headers of packets being sent.
- ID identifier
- focus will be given primarily to three particular identifiers that will be referred to as the node identifier, the source identifier, and the destination identifiers.
- the node identifier is an identifier that a particular node looks for when observing packets being transmitted on a network to determine if a particular packet is being sent to the node.
- the source (SID) identifier is an identifier that the node uses when sending packets having a header that contains a source identifier
- the destination identifier (DID) is an identifier that the node uses when specifying the destination of a packet.
- SID source
- DID destination identifier
- each node will be assigned a set of NIDs, a set of SIDs, and a set of DIDs for use in sending and receiving packets, and will also be provided with a set of rules, a table, or some other ID determination mechanism (IDDM) by which the node can determine which IDs are to be used at a particular time.
- IDDM ID determination mechanism
- the node will then proceed to use the IDDM to vary the SIDs and DIDs of packets it sends and the NID or NIDs it uses in filtering received packets.
- NIDs, SIDs, and DIDs are IP addresses used to send and receive IP packets.
- IDDMs may employ various methods, but that in some instances it will be advantageous to utilize tables specifying sequences of NIDs and sequences of pairs of SIDs and DIDs.
- FIG. 1A is a schematic view of a network.
- FIG. 1B is a schematic view of the apparent topology of the network of FIG. 1A .
- FIG. 1C is a schematic view of the apparent topology of a network having a node assigned multiple identifiers.
- FIG. 1D is a schematic view of a network having the apparent topology of FIG. 1C .
- FIG. 1E is a schematic view of a first possible apparent topology of a network having multiple nodes assigned multiple identifiers.
- FIG. 1F is a schematic view of a second possible apparent topology of a network having multiple nodes assigned multiple identifiers.
- FIG. 1G is a schematic view of a network having the apparent topology of FIG. 1E .
- FIG. 1H is an ID relationship table showing the relationships between nodes, NIDs, SIDs, and DIDs for the network and packets of FIG. 1G and the apparent topology of FIG. 1E .
- FIG. 1I is a an ID relationship table corresponding to the apparent topology of FIG. 1F .
- FIG. 1J is a schematic view the apparent topology of the network of FIG. 1A when NN SIDs are in use.
- FIG. 1K is a schematic view of the apparent topology of the network of FIG. 1A when all nodes use NN SIDs.
- FIG. 1L is a schematic of an apparent topology achievable by combining the assignment of multiple identifiers to nodes and the use of NN SIDs by the nodes.
- FIG. 1M is a schematic of an apparent topology achievable by combining the assignment of multiple identifiers to nodes and the use of NN SIDs by the nodes.
- FIG. 1N is an ID relationship table corresponding to FIG. 1L .
- FIG. 2A is a schematic view of a network comprising an intermediary routing node acting as a hub for communications between end routing nodes.
- FIG. 2B is a table illustrating a possible set of SD Pairs used to transmit a packet across multiple segments of a network using encapsulation, NN SIDs, and nodes assigned multiple NIDs.
- FIG. 3A is a table illustrating a possible acceptable sequence of SD Pairs that may be required to be used for packets to be accepted at a destination node.
- FIG. 3B illustrates the use of a source key with a sequence of SD Pairs to validate packets.
- FIG. 3C illustrates the use of a possible acceptable sequence of SD Pair/Key combination that may be required to be used for packets to be accepted at a destination node.
- network 100 comprises node 110 sending a copy of data object 111 (a file containing the text of the Declaration of Independence) as an ordered set of packets 120 (some of which have already been received by node 130 ) to node 130 where the packets are being reassembled as data object 131 .
- the node ID (NID) of node 110 in FIG. 1 is “1” and the NID of node 130 in FIG. 1 is “3”.
- Each packet ( 121 - 123 ) of the set of packets 120 comprises a header having both a source ID (SID) and a destination ID (DID) which are equivalent to the NIDs of nodes 110 and 130 .
- Nodes 110 and 130 are coupled together via transmission medium 140 .
- the topology of network 100 can be determined by monitoring packets transmitted via medium 140 from the SIDs and DIDs of the transmitted packets.
- FIG. 1B is an illustration of what that topology would look like where a circle is assigned to each SID and DID seen, and lines are drawn between circles to indicate that SID/DID pairs seen in monitored packets. Thus, in FIG. 1B , the circles indicated that SID/DID values of “1” and “3” are visible, while the line indicates the SID/DID pair that is visible.
- security could be improved by assigning a plurality of NIDs to a node such that the packets addressed with any of the currently assigned NIDs will be routed to and received by the node.
- the phrase “received by the node” is used herein to mean that not only will the packet physically reach the node but that the node will be programmed or otherwise adapted to recognize that it should perform further processing on any packets having a DID equivalent to a currently assigned NID.
- FIG. 1C illustrates the apparent topology of network 100 if node 130 is assigned a plurality of NIDs ( 3 A, 3 B, and 3 C), and node 110 uses all of the assigned NIDs to send packets to node 130 as illustrated in FIG. 1D .
- the elements of FIG. 1D correspond to those of FIG. 1A with the primary changes being in the SID and DID pairs (SD Pairs) of packets 121 - 123 and the NIDs of node 130 .
- Elements 111 and 131 and the data block contents of packets 121 - 123 were left out of FIG. 1D to simplify the presentation.
- FIG. 1E illustrates a possible apparent topology of network 100 if both node 110 and node 130 are assigned a plurality of NIDs ( 1 A, 1 B, 1 C, 3 A, 3 B, 3 C), and node 110 uses all of the assigned NIDs to send packets to node 130 as illustrated in FIG. 1G .
- FIG. 1G provides a simplified view of the network of FIG. 1A wherein the only difference is in regard to the NIDs assigned to the nodes and the SD Pairs used by packets 121 - 123 .
- FIG. 1F shows an alternate apparent topology if all possible SD Pairs are used.
- FIGS. 1H and 1I are ID relationship tables that illustrate the relationships between the nodes and various IDs for each of the packets sent across the network where table 1 H corresponds to the topology of FIG. 1E and table 1 I to the topology of FIG. 1F . It is important to note that someone observing packets being transmitted be able to recreate, at most, the SID and DID columns of the packets.
- security could also be improved by having a node use SIDs in packets it sends that do not correspond to any NIDs assigned to the node.
- node 110 of FIG. 1A used “2” as the SID in any sent packets
- the apparent topology of network 100 would be that shown in FIG. 1J rather than that of FIG. 1B .
- SIDs that aren't NIDs the actual NIDs of the source node of the packets will not be visible to anyone seeing the SIDs and DIDs of the packets.
- security could be further improved by having all nodes that send packets use SIDs that do not correspond to any assigned NIDs.
- node 110 of FIG. 1A had a NID of “1” and used “2” as the SID of any sent packets
- node 130 of FIG. 1A had a NID of “3” and used a “4” as the SID of any sent packets
- the apparent topology of network 100 would be that shown in FIG. 1K rather than that of FIG. 1B or 1 J.
- FIG. 1N provides an ID relationship table corresponding to FIG. 1L . Once again, the only portion of the table of FIG. 1L that is visible to someone examining packets are the SID and DID columns showing the SD Pairs of the packets.
- FIG. 2A illustrates the physical/actual topology of a network comprising two end routing nodes, 210 and 230 , and one intermediary routing node 220 .
- End routing nodes 210 and 230 act to couple sub-networks N 1 and N 3 to each other via network N 2 .
- networks N 1 and N 3 will be private sub-networks while network N 2 is a public network such as the Internet. If node 211 sends a packet to node 234 , routing node 210 will encapsulate it an send it to intermediate routing node 220 .
- Intermediate routing node 220 will then strip the encapsulating packet off, and re-encapsulate and send the original pack sent by node 211 on to routing node 230 .
- Routing node 230 will then strip off the encapsulating packet and send it on to node 234 .
- the original packet from node 211 would comprise the SD Pair ( 211 , 234 ) in its header as it traverses segment 241 .
- the packet encapsulating the original packet would have an SD Pair of ( 210 , 220 ) if NN SIDs aren't used, and only a single NID is assigned to each routing node as it traverses segment 242 .
- the packet encapsulating the original packet would have the SD Pair ( 220 , 230 ) as it traverses segment 243 . Finally the original packet with the SD Pair ( 211 , 234 ) would traverse segment 244 to reach node 234 .
- node 220 Simply forcing all traffic passing between nodes 210 and 230 to pass through node 220 provides a security enhancement (assuming the headers of any encapsulated packets are encrypted in some fashion) as anyone viewing packets traversing segment 242 or segment 243 will only have visibility to the SD Pairs used on those segments. If nodes 210 , 220 , and 230 are assigned multiple NIDs and if NN SIDs are used, the benefits described above come in to play as well. As an example, if node 210 were pictured as being in the position of node 110 of network 100 , and node 220 is the position of node 130 , then the SD Pairs of encapsulating packets traversing segment 242 could be manipulated to give the apparent topology of FIGS. 1L , 1 M, or some other desired topology.
- an ordered set of packets may comprise all the packets sent through a particular “tunnel” during a given time period and thus may comprise packets that when reassembled make up a plurality of data objects.
- FIG. 2B is a table showing a possible set of SD Pairs used to transmit packets from node 211 to node 234 across network 200 if: node 210 is assigned NIDs 1 A, 1 B, and 1 C but uses SIDs 2 A, 2 B, and 2 C when communicating with node 220 ; node 220 is assigned NIDs 3 A, 3 B, and 3 C for use on segment 242 but uses SIDs 4 A, 4 B, and 4 C when communicating with node 210 ; node 220 is assigned NIDs 5 A, 5 B, and 5 C for use on segment 243 but uses SIDs 6 A, 6 B, and 6 C when communicating with node 230 ; and node 230 is assigned NIDs 7 A, 7 B, and 7 C but uses SIDs 8 A, 8 B, and 8 C when communicating with node 220 .
- a set of ordered packets will comprise IP packets being transmitted between private sub-networks across the internet.
- nodes 210 , 220 , and 230 could be routers coupled to the Internet via one or more network interface (NIC) cards.
- NIC network interface
- Each NIC card of the routers could be programmed to accept packets addressed with any one of a set of DID/IP addresses.
- a sending router could utilize any one of the IP Addresses currently assigned to the destination router. It is contemplated that there may be some intermediate routers located between nodes 210 and 220 and/or between nodes 220 and 230 . In some instances it may be feasible to dynamically update the routing table of such routers to properly route packets using the IP addresses currently assigned to the nodes.
- FIG. 3A provides a table that might be provided to each of two nodes with one node using the table to set SD Pairs on outgoing packets and the other node to determine whether incoming packets should be accepted or discarded.
- packets sent during first time block may be assigned SD Pairs in the following sequence: ( 1 A, 2 B), ( 1 C, 2 A), ( 1 A, 2 C), ( 1 B, 2 B), ( 1 C, 2 C), ( 1 A, 2 A), ( 1 E, 2 E), ( 1 F, 2 F), ( 1 G, 2 G), ( 1 G, 2 F), ( 1 F, 2 E), ( 1 E, 2 G). It is contemplated that assigning SD Pairs in a particular order eliminates the need for a separate sequence number such that a set of ordered pairs used to transmit a file or other data object can be sent and reassembled using only the SD Pairs of the packets. Alternatively, the inclusion of a sequence number or other order identifier would permit the reuse of SD Pairs within a time block.
- FIGS. 3B and 3C Two of the many possible key assignment schemes possible are illustrated in FIGS. 3B and 3C .
- a key is assigned to a particular node such that every packet sent by that node comprises its key (which may also be changed over time and/or in accordance with a key maintenance scheme).
- a receiving node will not only verify that any received packet comprises a valid SD Pair, but that it also comprises a key from a known source
- a separate key is assigned to each packet such that packet validation requires the packet comprise an acceptable combination of SD Pair and key.
- no other nodes are shown in the figures, in reality one observing a segment of a public network would likely see packets from a large number of sub-networks traversing the segment with the extra traffic across the segment making it even more difficult to identify packets of interest and to determine how such packets have to be grouped to reassemble the file or other data object being sent.
- further security can be provided by having a node send dummy packets, i.e. packets that do not comprise information being protected, and/or packets that do not comprise a valid SD Pairs or SD Pair/Key combination.
- the packets of an ordered set of packets comprising the contents of a data object may be split among multiple segments.
- a sub-network might comprise multiple links to a public network in which case the packets of the ordered set could be divided among the links for transmission.
- the methods and systems described herein are not limited to a particular type of network, the use of a particular type of protocol, or the use of a particular transmission medium. As such, they are equally applicable to wired and wireless regardless of the physical topology or protocols used. However, it is contemplated that the methods and systems herein are particularly well adapted for use on TCP/IP networks. In such instances, assigning multiple IP addresses to NIC cards, manipulating the source and destination IP addresses used in the IP header of any packets sent, and/or validating incoming packets based on the source and destination IP addresses and possibly a key included in the packet provide a method of transmitting data order sets of packets that is more secure than transmission when such steps are not taken.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- The field of the invention is network security.
- When sending a data object from one node on a network to another it is common practice to break the data object up into smaller pieces at a sending node and to have the sending node send each piece across the network in a data block portion of a packet. Such a packet typically also includes a header that contains an identifier identifying a destination node and often an identifier identifying the sending/source node as well. As an example, a node using IP packets to send a data object to another node will often break the data object up into an ordered set of packets where each packet comprises a data block portion containing a piece of the data object, and a header portion the contains both a source IP address and a destination IP address. The phrase “ordered set of packets” is used herein to denote any set of packets used to transmit a data object between nodes such that the contents of all of the data packets is necessary to reconstruct the data object at a receiving node. It is a set in the sense that all the packets are necessary to recreate the data object, and ordered in the sense that the contents of the packets must be ordered in a particular way to recreate the data object. In some instances multiple data objects may be transmitted via a single ordered set of packets.
- Unfortunately, the inclusion of source and destination identifiers in packet headers provides a mechanism by which an entity that monitors the flow of packets across a network can identify nodes and possibly reconstruct the topology of the network. Having their identifiers known raises security concerns for the nodes as the identifier can be used to send packets to the node and possibly to gain access to the node.
- The present invention is directed to methods and apparatus for improving security securing networks through manipulation of virtual topography.
- It is contemplated that security can be enhanced by manipulating the identifiers used by nodes to receive packets and the identifiers that nodes use in packet headers of packets being sent. Although applicable anywhere an identifier (ID) is used, focus will be given primarily to three particular identifiers that will be referred to as the node identifier, the source identifier, and the destination identifiers. The node identifier (NID) is an identifier that a particular node looks for when observing packets being transmitted on a network to determine if a particular packet is being sent to the node. The source (SID) identifier is an identifier that the node uses when sending packets having a header that contains a source identifier, and the destination identifier (DID) is an identifier that the node uses when specifying the destination of a packet. In previously known networks a node will often be assigned a single identifier and will use that identifier as both the node identifier and the source identifier.
- It is contemplated that each node will be assigned a set of NIDs, a set of SIDs, and a set of DIDs for use in sending and receiving packets, and will also be provided with a set of rules, a table, or some other ID determination mechanism (IDDM) by which the node can determine which IDs are to be used at a particular time. The node will then proceed to use the IDDM to vary the SIDs and DIDs of packets it sends and the NID or NIDs it uses in filtering received packets.
- It is contemplated that the methods and apparatus described herein may be advantageously applied to IP networks where the NIDs, SIDs, and DIDs are IP addresses used to send and receive IP packets.
- It is contemplated that IDDMs may employ various methods, but that in some instances it will be advantageous to utilize tables specifying sequences of NIDs and sequences of pairs of SIDs and DIDs.
- Various objects, features, aspects and advantages of the present invention will become more apparent from the following detailed description of preferred embodiments of the invention, along with the accompanying drawings in which like numerals represent like components.
-
FIG. 1A is a schematic view of a network. -
FIG. 1B is a schematic view of the apparent topology of the network ofFIG. 1A . -
FIG. 1C is a schematic view of the apparent topology of a network having a node assigned multiple identifiers. -
FIG. 1D is a schematic view of a network having the apparent topology ofFIG. 1C . -
FIG. 1E is a schematic view of a first possible apparent topology of a network having multiple nodes assigned multiple identifiers. -
FIG. 1F is a schematic view of a second possible apparent topology of a network having multiple nodes assigned multiple identifiers. -
FIG. 1G is a schematic view of a network having the apparent topology ofFIG. 1E . -
FIG. 1H is an ID relationship table showing the relationships between nodes, NIDs, SIDs, and DIDs for the network and packets ofFIG. 1G and the apparent topology ofFIG. 1E . -
FIG. 1I is a an ID relationship table corresponding to the apparent topology ofFIG. 1F . -
FIG. 1J is a schematic view the apparent topology of the network ofFIG. 1A when NN SIDs are in use. -
FIG. 1K is a schematic view of the apparent topology of the network ofFIG. 1A when all nodes use NN SIDs. -
FIG. 1L is a schematic of an apparent topology achievable by combining the assignment of multiple identifiers to nodes and the use of NN SIDs by the nodes. -
FIG. 1M is a schematic of an apparent topology achievable by combining the assignment of multiple identifiers to nodes and the use of NN SIDs by the nodes. -
FIG. 1N is an ID relationship table corresponding toFIG. 1L . -
FIG. 2A is a schematic view of a network comprising an intermediary routing node acting as a hub for communications between end routing nodes. -
FIG. 2B is a table illustrating a possible set of SD Pairs used to transmit a packet across multiple segments of a network using encapsulation, NN SIDs, and nodes assigned multiple NIDs. -
FIG. 3A is a table illustrating a possible acceptable sequence of SD Pairs that may be required to be used for packets to be accepted at a destination node. -
FIG. 3B illustrates the use of a source key with a sequence of SD Pairs to validate packets. -
FIG. 3C illustrates the use of a possible acceptable sequence of SD Pair/Key combination that may be required to be used for packets to be accepted at a destination node. - Referring to
FIG. 1A ,network 100 comprisesnode 110 sending a copy of data object 111 (a file containing the text of the Declaration of Independence) as an ordered set of packets 120 (some of which have already been received by node 130) tonode 130 where the packets are being reassembled as data object 131. The node ID (NID) ofnode 110 inFIG. 1 is “1” and the NID ofnode 130 inFIG. 1 is “3”. Each packet (121-123) of the set ofpackets 120 comprises a header having both a source ID (SID) and a destination ID (DID) which are equivalent to the NIDs ofnodes Nodes transmission medium 140. - The topology of
network 100 can be determined by monitoring packets transmitted viamedium 140 from the SIDs and DIDs of the transmitted packets.FIG. 1B is an illustration of what that topology would look like where a circle is assigned to each SID and DID seen, and lines are drawn between circles to indicate that SID/DID pairs seen in monitored packets. Thus, inFIG. 1B , the circles indicated that SID/DID values of “1” and “3” are visible, while the line indicates the SID/DID pair that is visible. - It is contemplated that security could be improved by assigning a plurality of NIDs to a node such that the packets addressed with any of the currently assigned NIDs will be routed to and received by the node. The phrase “received by the node” is used herein to mean that not only will the packet physically reach the node but that the node will be programmed or otherwise adapted to recognize that it should perform further processing on any packets having a DID equivalent to a currently assigned NID.
-
FIG. 1C illustrates the apparent topology ofnetwork 100 ifnode 130 is assigned a plurality of NIDs (3A, 3B, and 3C), andnode 110 uses all of the assigned NIDs to send packets tonode 130 as illustrated inFIG. 1D . The elements ofFIG. 1D correspond to those ofFIG. 1A with the primary changes being in the SID and DID pairs (SD Pairs) of packets 121-123 and the NIDs ofnode 130.Elements 111 and 131 and the data block contents of packets 121-123 were left out ofFIG. 1D to simplify the presentation. - It is contemplated that security could be further improved by assigning a plurality of NIDs to all the nodes.
FIG. 1E illustrates a possible apparent topology ofnetwork 100 if bothnode 110 andnode 130 are assigned a plurality of NIDs (1A, 1B, 1C, 3A, 3B, 3C), andnode 110 uses all of the assigned NIDs to send packets tonode 130 as illustrated inFIG. 1G . As withFIG. 1D ,FIG. 1G provides a simplified view of the network ofFIG. 1A wherein the only difference is in regard to the NIDs assigned to the nodes and the SD Pairs used by packets 121-123.FIG. 1F shows an alternate apparent topology if all possible SD Pairs are used. -
FIGS. 1H and 1I are ID relationship tables that illustrate the relationships between the nodes and various IDs for each of the packets sent across the network where table 1H corresponds to the topology ofFIG. 1E and table 1I to the topology ofFIG. 1F . It is important to note that someone observing packets being transmitted be able to recreate, at most, the SID and DID columns of the packets. - It is contemplated that security could also be improved by having a node use SIDs in packets it sends that do not correspond to any NIDs assigned to the node. As an example, if
node 110 ofFIG. 1A used “2” as the SID in any sent packets, the apparent topology ofnetwork 100 would be that shown inFIG. 1J rather than that ofFIG. 1B . By using SIDs that aren't NIDs, the actual NIDs of the source node of the packets will not be visible to anyone seeing the SIDs and DIDs of the packets. - It is contemplated that security could be further improved by having all nodes that send packets use SIDs that do not correspond to any assigned NIDs. As an example, if
node 110 ofFIG. 1A had a NID of “1” and used “2” as the SID of any sent packets, andnode 130 ofFIG. 1A had a NID of “3” and used a “4” as the SID of any sent packets, the apparent topology ofnetwork 100 would be that shown inFIG. 1K rather than that ofFIG. 1B or 1J. By having all nodes use SIDs that aren't NIDs, the fact that any two nodes are exchanging packets is hidden. - It is contemplated that security could be further improved by both using non-NID SIDs (NN SIDs), and assigning and using multiple NIDs to nodes to be used as DIDs on any packets sent to those nodes. Such use would allow one to create the appearance of any topology desired with
FIGS. 1L and 1M illustrating two of the many possible topologies.FIG. 1N provides an ID relationship table corresponding toFIG. 1L . Once again, the only portion of the table ofFIG. 1L that is visible to someone examining packets are the SID and DID columns showing the SD Pairs of the packets. - It is contemplated that further security improvements can be obtained by utilizing an intermediary routing node and encapsulation to exchange packets between end routing nodes.
FIG. 2A illustrates the physical/actual topology of a network comprising two end routing nodes, 210 and 230, and oneintermediary routing node 220.End routing nodes 210 and 230 act to couple sub-networks N1 and N3 to each other via network N2. In a preferred embodiment networks N1 and N3 will be private sub-networks while network N2 is a public network such as the Internet. Ifnode 211 sends a packet tonode 234, routingnode 210 will encapsulate it an send it tointermediate routing node 220.Intermediate routing node 220 will then strip the encapsulating packet off, and re-encapsulate and send the original pack sent bynode 211 on to routing node 230. Routing node 230 will then strip off the encapsulating packet and send it on tonode 234. As such, the original packet fromnode 211 would comprise the SD Pair (211,234) in its header as it traversessegment 241. Once encapsulated bynode 210, the packet encapsulating the original packet would have an SD Pair of (210, 220) if NN SIDs aren't used, and only a single NID is assigned to each routing node as it traversessegment 242. Once re-encapsulated, the packet encapsulating the original packet would have the SD Pair (220, 230) as it traversessegment 243. Finally the original packet with the SD Pair (211, 234) would traversesegment 244 to reachnode 234. - Simply forcing all traffic passing between
nodes 210 and 230 to pass throughnode 220 provides a security enhancement (assuming the headers of any encapsulated packets are encrypted in some fashion) as anyone viewingpackets traversing segment 242 orsegment 243 will only have visibility to the SD Pairs used on those segments. Ifnodes node 210 were pictured as being in the position ofnode 110 ofnetwork 100, andnode 220 is the position ofnode 130, then the SD Pairs of encapsulatingpackets traversing segment 242 could be manipulated to give the apparent topology ofFIGS. 1L , 1M, or some other desired topology. - When using routing nodes and encapsulation, an ordered set of packets may comprise all the packets sent through a particular “tunnel” during a given time period and thus may comprise packets that when reassembled make up a plurality of data objects.
-
FIG. 2B is a table showing a possible set of SD Pairs used to transmit packets fromnode 211 tonode 234 acrossnetwork 200 if:node 210 is assignedNIDs SIDs node 220;node 220 is assignedNIDs segment 242 but usesSIDs node 210;node 220 is assignedNIDs segment 243 but usesSIDs 6A, 6B, and 6C when communicating with node 230; and node 230 is assignedNIDs 7A, 7B, and 7C but usesSIDs node 220. - In preferred embodiments a set of ordered packets will comprise IP packets being transmitted between private sub-networks across the internet. Using
network 200 as an example,nodes nodes nodes 220 and 230. In some instances it may be feasible to dynamically update the routing table of such routers to properly route packets using the IP addresses currently assigned to the nodes. However, it is contemplated that it may be better to simply set up the routing tables of such routers such that any one of a large set of IP addresses will be properly routed to a node and then to simply allow the node to determine which packets it will pay attention to at any particular time as will be described below. - It is contemplated that further security improvements can be obtained by adapting nodes to only accept packets that have particular SD Pairs, and to vary the list of acceptable SD Pairs over time. Acceptance of SD Pairs may also be limited in regard to the order they are used. Acceptance may further be conditioned on the packet comprising an additional key value that validates the authenticity of the packet. In instances where packets will traverse a public network and their order of arrival cannot be relied upon it would be advantageous to utilize adapt a particular node to accept any one of an acceptable combination of IDs and/or keys.
FIG. 3A provides a table that might be provided to each of two nodes with one node using the table to set SD Pairs on outgoing packets and the other node to determine whether incoming packets should be accepted or discarded. As such, packets sent during first time block may be assigned SD Pairs in the following sequence: (1A, 2B), (1C, 2A), (1A, 2C), (1B, 2B), (1C, 2C), (1A, 2A), (1E, 2E), (1F, 2F), (1G, 2G), (1G, 2F), (1F, 2E), (1E, 2G). It is contemplated that assigning SD Pairs in a particular order eliminates the need for a separate sequence number such that a set of ordered pairs used to transmit a file or other data object can be sent and reassembled using only the SD Pairs of the packets. Alternatively, the inclusion of a sequence number or other order identifier would permit the reuse of SD Pairs within a time block. - In some instances it may be desirable to include another level of security by including a key in any packets set. Such a key might be part of the data block or the header of such packets and may be assigned in any manner as long as the receiving node is able to determine which packets comprise valid SD Pair and key combinations and which do not. Two of the many possible key assignment schemes possible are illustrated in
FIGS. 3B and 3C . InFIG. 3B , a key is assigned to a particular node such that every packet sent by that node comprises its key (which may also be changed over time and/or in accordance with a key maintenance scheme). In such an instance a receiving node will not only verify that any received packet comprises a valid SD Pair, but that it also comprises a key from a known source InFIG. 3C , a separate key is assigned to each packet such that packet validation requires the packet comprise an acceptable combination of SD Pair and key. - It should be noted that, although no other nodes are shown in the figures, in reality one observing a segment of a public network would likely see packets from a large number of sub-networks traversing the segment with the extra traffic across the segment making it even more difficult to identify packets of interest and to determine how such packets have to be grouped to reassemble the file or other data object being sent. However, it is contemplated that further security can be provided by having a node send dummy packets, i.e. packets that do not comprise information being protected, and/or packets that do not comprise a valid SD Pairs or SD Pair/Key combination.
- It is contemplated that in some instances the packets of an ordered set of packets comprising the contents of a data object may be split among multiple segments. As an example, a sub-network might comprise multiple links to a public network in which case the packets of the ordered set could be divided among the links for transmission.
- It should be readily apparent that the methods and systems described herein are not limited to a particular type of network, the use of a particular type of protocol, or the use of a particular transmission medium. As such, they are equally applicable to wired and wireless regardless of the physical topology or protocols used. However, it is contemplated that the methods and systems herein are particularly well adapted for use on TCP/IP networks. In such instances, assigning multiple IP addresses to NIC cards, manipulating the source and destination IP addresses used in the IP header of any packets sent, and/or validating incoming packets based on the source and destination IP addresses and possibly a key included in the packet provide a method of transmitting data order sets of packets that is more secure than transmission when such steps are not taken.
- Thus, specific embodiments and applications of security methods and systems have been disclosed. It should be apparent, however, to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced.
Claims (13)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/045,358 US20080151865A1 (en) | 2003-07-18 | 2008-03-10 | Security Through Manipulation of Virtual Topography |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/623,210 US7415017B2 (en) | 2003-07-18 | 2003-07-18 | Security through manipulation of virtual topography |
US12/045,358 US20080151865A1 (en) | 2003-07-18 | 2008-03-10 | Security Through Manipulation of Virtual Topography |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/623,210 Division US7415017B2 (en) | 2003-07-18 | 2003-07-18 | Security through manipulation of virtual topography |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080151865A1 true US20080151865A1 (en) | 2008-06-26 |
Family
ID=34063323
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/623,210 Expired - Fee Related US7415017B2 (en) | 2003-07-18 | 2003-07-18 | Security through manipulation of virtual topography |
US12/045,358 Abandoned US20080151865A1 (en) | 2003-07-18 | 2008-03-10 | Security Through Manipulation of Virtual Topography |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/623,210 Expired - Fee Related US7415017B2 (en) | 2003-07-18 | 2003-07-18 | Security through manipulation of virtual topography |
Country Status (3)
Country | Link |
---|---|
US (2) | US7415017B2 (en) |
EP (1) | EP1652331A4 (en) |
WO (1) | WO2005008942A2 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050216758A1 (en) * | 2004-03-24 | 2005-09-29 | Matusz Pawel O | Frame authentication for a wireless network |
US8493871B2 (en) * | 2008-11-26 | 2013-07-23 | Riverbed Technology, Inc. | End-to end analysis of transactions in networks with traffic-altering devices |
KR101062068B1 (en) | 2008-12-01 | 2011-09-02 | 포항공과대학교 산학협력단 | Anti-adhesion Composition |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6209064B1 (en) * | 1998-01-07 | 2001-03-27 | Fujitsu Limited | Cache coherence unit with integrated message passing and memory protection for a distributed, shared memory multiprocessor system |
US20010036189A1 (en) * | 1998-02-05 | 2001-11-01 | Biaodong Cai | Network and method for ATM network operations |
US20020141332A1 (en) * | 2000-12-11 | 2002-10-03 | Jeff Barnard | Failover apparatus and method for an asynchronous data communication network |
US6532477B1 (en) * | 2000-02-23 | 2003-03-11 | Sun Microsystems, Inc. | Method and apparatus for generating an audio signature for a data item |
US20030081600A1 (en) * | 2001-10-30 | 2003-05-01 | Blaker David M. | Methods, systems and computer program products for packet ordering for parallel packet transform processing |
US20040057428A1 (en) * | 2000-09-22 | 2004-03-25 | Jurgen Gerstner | Method for operating an access network for a mobile radio system |
US20040221047A1 (en) * | 2003-04-30 | 2004-11-04 | Grover Rajiv K | System and method for processing fibre channel (FC) layer service requests in an FC network |
US20050108576A1 (en) * | 1999-09-15 | 2005-05-19 | Datawire Communication Networks, Inc. | System and method for secure transactions over a network |
US20050226169A1 (en) * | 2004-02-19 | 2005-10-13 | Kelsey Richard A | Dynamic identification of nodes in a network |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6430183B1 (en) * | 1997-09-18 | 2002-08-06 | International Business Machines Corporation | Data transmission system based upon orthogonal data stream mapping |
US6748452B1 (en) * | 1999-03-26 | 2004-06-08 | International Business Machines Corporation | Flexible interprocess communication via redirection |
US6693878B1 (en) * | 1999-10-15 | 2004-02-17 | Cisco Technology, Inc. | Technique and apparatus for using node ID as virtual private network (VPN) identifiers |
US6570885B1 (en) * | 1999-11-12 | 2003-05-27 | International Business Machines Corporation | Segment-controlled process for controlling castouts from a communication cache in a port in any of multiple nodes in a communications network |
US6721335B1 (en) * | 1999-11-12 | 2004-04-13 | International Business Machines Corporation | Segment-controlled process in a link switch connected between nodes in a multiple node network for maintaining burst characteristics of segments of messages |
EP1250790A1 (en) * | 2000-01-28 | 2002-10-23 | AT & T Corp. | Method and apparatus for firewall with multiple addresses |
JP3994614B2 (en) * | 2000-03-13 | 2007-10-24 | 株式会社日立製作所 | Packet switch, network monitoring system, and network monitoring method |
JP3511978B2 (en) * | 2000-05-18 | 2004-03-29 | 日本電気株式会社 | Router with priority control function and machine-readable recording medium recording program |
US7155494B2 (en) * | 2002-01-09 | 2006-12-26 | Sancastle Technologies Ltd. | Mapping between virtual local area networks and fibre channel zones |
US7836205B2 (en) * | 2002-07-11 | 2010-11-16 | Hewlett-Packard Development Company, L.P. | Method and device for use with a virtual network |
US7127255B2 (en) * | 2002-10-01 | 2006-10-24 | Trango Systems, Inc. | Wireless point to multipoint system |
US7949777B2 (en) * | 2002-11-01 | 2011-05-24 | Avid Technology, Inc. | Communication protocol for controlling transfer of temporal data over a bus between devices in synchronization with a periodic reference signal |
-
2003
- 2003-07-18 US US10/623,210 patent/US7415017B2/en not_active Expired - Fee Related
-
2004
- 2004-07-14 WO PCT/US2004/022858 patent/WO2005008942A2/en active Search and Examination
- 2004-07-14 EP EP04778396A patent/EP1652331A4/en not_active Withdrawn
-
2008
- 2008-03-10 US US12/045,358 patent/US20080151865A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6209064B1 (en) * | 1998-01-07 | 2001-03-27 | Fujitsu Limited | Cache coherence unit with integrated message passing and memory protection for a distributed, shared memory multiprocessor system |
US20010036189A1 (en) * | 1998-02-05 | 2001-11-01 | Biaodong Cai | Network and method for ATM network operations |
US20050108576A1 (en) * | 1999-09-15 | 2005-05-19 | Datawire Communication Networks, Inc. | System and method for secure transactions over a network |
US6532477B1 (en) * | 2000-02-23 | 2003-03-11 | Sun Microsystems, Inc. | Method and apparatus for generating an audio signature for a data item |
US20040057428A1 (en) * | 2000-09-22 | 2004-03-25 | Jurgen Gerstner | Method for operating an access network for a mobile radio system |
US20020141332A1 (en) * | 2000-12-11 | 2002-10-03 | Jeff Barnard | Failover apparatus and method for an asynchronous data communication network |
US20030081600A1 (en) * | 2001-10-30 | 2003-05-01 | Blaker David M. | Methods, systems and computer program products for packet ordering for parallel packet transform processing |
US20040221047A1 (en) * | 2003-04-30 | 2004-11-04 | Grover Rajiv K | System and method for processing fibre channel (FC) layer service requests in an FC network |
US20050226169A1 (en) * | 2004-02-19 | 2005-10-13 | Kelsey Richard A | Dynamic identification of nodes in a network |
Also Published As
Publication number | Publication date |
---|---|
US7415017B2 (en) | 2008-08-19 |
WO2005008942A2 (en) | 2005-01-27 |
WO2005008942B1 (en) | 2006-06-01 |
EP1652331A2 (en) | 2006-05-03 |
WO2005008942A3 (en) | 2006-04-20 |
EP1652331A4 (en) | 2010-11-03 |
US20050013324A1 (en) | 2005-01-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112189323B (en) | Segment routing using secure segment identifiers | |
USRE39360E1 (en) | System for signatureless transmission and reception of data packets between computer networks | |
TWI410088B (en) | Method and system for tunneling macsec packets through non-macsec nodes as well as machine-readable storage medium | |
CN100508480C (en) | Apparatus and method relating to Ethernet access system | |
US6438612B1 (en) | Method and arrangement for secure tunneling of data between virtual routers | |
EP2595357B1 (en) | Method performed in a network device and system for packet handling | |
CN1748401B (en) | Method and apparatus for enforcing security groups for vlans | |
EP2345212B1 (en) | Method and apparatus for forwarding data packets using aggregating router keys | |
US8127349B2 (en) | Point-to-multi-point/non-broadcasting multi-access VPN tunnels | |
JP5449543B2 (en) | Packet routing in the network | |
CN102461089B (en) | For the method and apparatus using label to carry out strategy execution | |
EP1284076B1 (en) | Ipsec processing | |
US20070258462A1 (en) | Network Node Unit And Method For Forwarding Data Packets | |
US7000120B1 (en) | Scheme for determining transport level information in the presence of IP security encryption | |
US7248589B2 (en) | Apparatus for enabling multi-tuple TCP sockets within a computer network | |
US20030037235A1 (en) | System for signatureless transmission and reception of data packets between computer networks | |
CN101133625A (en) | Preventing duplicate sources from clients served by a network address port translator | |
US20230059348A1 (en) | Blockchain enhanced route authorization | |
US20080151865A1 (en) | Security Through Manipulation of Virtual Topography | |
CN100438477C (en) | Filter for traffic separation | |
Morton | Understanding IPv6 | |
JP4088179B2 (en) | Network device connection management device | |
US20070050516A1 (en) | Method for transmitting electronic data via a dual network in order to increase internet security | |
EP1645071B1 (en) | Secure indirect addressing | |
EP1686756B1 (en) | Communication system, method and apparatus for providing mirroring service in the communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GLOBAL AREA NETWORK, INC., DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LEAHY, LIAM;COLEY, ERIC GIRARD;REEL/FRAME:022950/0273 Effective date: 20030825 |
|
AS | Assignment |
Owner name: LEAHY, LIAM, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GLOBAL AREA NETWORK, INC.;REEL/FRAME:022951/0821 Effective date: 20051115 |
|
AS | Assignment |
Owner name: LEAHY, LIAM, CALIFORNIA Free format text: LETTER DISPUTING OWNERSHIP;ASSIGNOR:GLOBAL AREA NETWORK;REEL/FRAME:023119/0643 Effective date: 20051115 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |