Location-Hiding Technology Via Overlay Networks

By: Er. Harendra Kumar (Special Correspondent ICN Group) & Dr. Ved Prakash Chahal (Asstt. General Director Agri. Extn.) ,ICAR, New Delhi

NEW DELHI: Location-Hiding Technique is an important component of a complete solution to DoS attacks. It gives Application sites the capability to hide their locations and thereby preventing DoS attacks, which depends on the knowledge of their victim’s IP (Internet Protocol) addresses.

Overlay networks have been proposed as a means for location-hiding [5,9,14]. We assume that an application is reachable only via the overlay network. As you can see an overly network is used to mediate to all communication among application sites.

As long as the mediation can be enforced, the overly network is the public interface for reaching an application site, and the application site cannot be directly attacked. In this scheme, application sites do not publish their IP addresses and hide themselves behind an overlay network.

The overlay network is run on a resource pool of internet hosts. The overlay network also hides the IP (Internet Protocol) addresses of their internal nodes and only edge nodes of the overlay publish their IPs to the public.

Overlay nodes communicate via routing algorithm of the overlay protocol that based on a hash function of IP (Internet Protocol) addresses; hence the IP addresses of internal nodes are kept secret.

User can only access the application by contacting these edge proxies. No one can easily disclosed IP (Internet Protocol) addresses of applications and overlay internal nodes, thereby preventing DoS attacks.

If the overlay nodes are attacked, the overlay can reconfigure itself thereby removing the impact of attackers. Reconfiguration we mean that the overlay can dynamically change the location of edge and internals nodes or change its structure because the overlay has enough resource pool of internet hosts.

In this paper we use this generic modal of overlay networks to compare chord, CAN, and pastry and try to understand which topology is the better candidate for location-hiding..

Related posts