Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping
Abstract
:1. Background
- (1)
- Non-interactivity: since network parameters are spontaneously and randomly changed, it is difficult to connect and communicate data with other nodes without exchanging one’s own network parameters with those of other nodes.
- (2)
- Randomness: Because chaotic algorithms and linear shift registers have randomness over small sets and may have mapping degeneracy problems over infinitely large sets, it may be hard to satisfy the requirement that random graph whose length is approximately infinite in theory also have randomness.
- (3)
- Uncorrelatedness: As the attacker is likely to have the ability to infer the previous or next network parameters by the change pattern of the current network parameters, and may also have the ability to infer the change rule of the network parameters of other nodes, the random graph has to satisfy the requirement that each column element and each row element are uncorrelated with each other when it is dynamically generated.
- (4)
- Distributivity: Since the network hopping is generally carried out in a multi-node network environment, the requirement of dynamically generating the same random map on multiple hosts in different locations needs to be satisfied.
- (1)
- We propose the idea of mapping chaos to cryptography and mathematically show that cryptographic ciphertexts have very good randomness and security.
- (2)
- We present a random graph scheme (CandCRM) based on chaos and cryptographic mapping. the random graph generated by CandCRM is effective against network attacks due to its excellent randomness and non-correlation.
- (3)
- The CandCRM scheme has good application. In a hopping network, it is suitable for deployment on multiple hopping hosts operating independently with little interaction between hosts.
2. Solution Design
2.1. Chaos and Cryptographic Random Mapping (CandCRM) Algorithm
- (1)
- Improved non-interactivity capability in a network environment. The traditional random mapping algorithm is more commonly used in the case of interaction, while the improved algorithm requires almost no interaction, and it satisfies the randomness of random mapping in both space and time.
- (2)
- It has improved the resistance to network attacks, such as resistance to known plaintext and cipher text attacks, key attacks, etc. Since the chaotic sequence generated by the chaotic algorithm itself has randomness, when the terms of the chaotic sequence are used as plaintext and cipher text, the probability distribution of the cipher text generated by encrypting the plaintext and the key multiple times is uniform and random, so it can effectively defend against network assault.
2.1.1. CandCRM Algorithm Implementation
Algorithm 1 CandCRM algorithm |
Input: array A = {a1, a2,…, an}, i, j, X, V, ki; else then let i = i + 1.; |
Output: R; |
Initialization, j = 1, A = 0, ci = 0; |
1: Compute the cipher text ci = Enck(X[j]), ai = Mod(ci,V); |
2: If j = = 1, then execute step 6. |
else then execute step 3. |
3: i = 1; |
4: If (ai = A[i]) = = 1, then compute ci = Enck(X[j]), ai = Mod(ci,V) and return to perform step 3. |
5: if (i < j + 1) = = 1, execute step 6. |
else then execute step 4: |
6: j = ai, R = V[A[j]], j = j + 1; |
7: if (j = N + 1) = = 1, then output R |
else return to execution step 1. |
2.1.2. Security Analysis
- (1)
- Irreversibility
- (2)
- Unpredictability
- (3)
- Resistance to external and internal attacks. The hopping network has its own characteristics to actively resist various external attacks such as DoS, DDoS, and traffic analysis, and random graph R can resist both external and internal attacks. In addition, assuming that the algorithm operates in a TrustZone environment with secure hardware and the initial values of the algorithm are passed in a secure channel, the internal attack is mainly on the random graph itself, and according to Theorems 3 and 4 above, the attacker cannot infer the value of the previous period from the current value of the random graph, nor can he predict the value of the next period, so the random graph can defend against the internal attack in this case. The random graph is thus resistant to internal attacks in this case.
3. Experimental Analysis
3.1. Data set and Environment Description
3.2. Parameter Setting and Evaluation Index
- (1)
- Balance check: the balance reflects the uniform distribution of the random sequence, so it is necessary to check whether the balance of the random sequence is reasonable, that is, to check the difference between the “maximum” and “minimum” values in the sequence, the formula is:
- (2)
- The variance checks, as an indicator of the equilibrium check of the random series, is given by:
- (3)
- The autocorrelation checks, which can be expressed as an autocorrelation function, is given by:
- (4)
- The cross-correlation check, which can be expressed as an autocorrelation function, is given by:
3.2.1. Balance Check
3.2.2. Variance Check
3.2.3. Autocorrelation Check
3.2.4. Cross-Correlation Check
4. Discussion
Equilibrium Check in Extreme Cases
5. Conclusions and Future Research
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Jajodia, S.; Ghosh, A.K.; Swarup, V.; Wang, C.; Wang, X.S. (Eds.) Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats; Springer Publishing Company: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
- Carvalho, M.; Ford, R. Moving-target defenses for computer networks. IEEE Secur. Priv. 2014, 12, 73–76. [Google Scholar] [CrossRef]
- Gao, C.; Wang, Y.; Xiong, X.; Fysarakis, K. A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion. Secur. Commun. Netw. 2022, 2020, 3949292. [Google Scholar] [CrossRef]
- Cai, G.L.; Wang, B.S.; Wang, T.Z.; Luo, Y.; Wang, X.; Cui, X. Research and development of moving target defense technology. J. Comput. Res. Dev. 2016, 53, 968. [Google Scholar]
- Maleki, H.; Valizadeh, S.; Koch, W.; Bestavros, A.; van Dijk, M. Markov modeling of moving target defense games. In Proceedings of the 2016 ACM Workshop on Moving Target Defense, Vienna, Austria, 24 October 2016; pp. 81–92. [Google Scholar]
- Zhang, L.; Guo, Y.; Yuwen, H.; Wang, Y. A port hopping based dos mitigation scheme in sdn network. In Proceedings of the 2016 12th International Conference on Computational Intelligence and Security (CIS), Wuxi, China, 16–19 December 2016; pp. 314–317. [Google Scholar]
- Chang, S.-Y.; Park, Y.; Babu, B.B.A. Fast IP hopping randomization to secure hop-by-hop access in SDN. IEEE Trans. Netw. Serv. Manag. 2018, 16, 308–320. [Google Scholar] [CrossRef]
- Luo, Y.-B.; Wang, B.-S.; Wang, X.-F.; Hu, X.-F.; Cai, G.-L.; Sun, H. Rpah: Random port and address hopping for thwarting internal and external adversaries. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; Volume 1, pp. 263–270. [Google Scholar]
- Fenske, E.; Brown, D.; Martin, J.; Mayberry, T.; Ryan, P.; Rye, E. Three years later: A study of mac address randomization in mobile devices and when it succeeds. Proc. Priv. Enhancing Technol. 2021, 2021, 164–181. [Google Scholar] [CrossRef]
- Hong, S.; Xu, L.; Wang, H.; Gu, G. Poisoning network visibility in software-defined networks: New attacks and countermeasures. In Proceedings of the NDSS, San Diego, CA, USA, 8–11 February 2015; Volume 15, pp. 8–11. [Google Scholar]
- Albanese, M.; Benedictis, A.D.; Jajodia, S.; Sun, K. A moving target defense mechanism for manets based on identity virtualization. In Proceedings of the Communications & Network Security, Berlin, Germany, 4–8 November 2013. [Google Scholar]
- Xu, J.; Kalbarczyk, Z.; Iyer, R.K. Transparent runtime randomization for security. In Proceedings of the 22nd International Symposium on Reliable Distributed Systems, Florence, Italy, 6–8 October 2003. [Google Scholar]
- Park, Y.; Chang, S.-Y.; Krishnamurthy, L.M. Watermarking for detecting freeloader misbehavior in software-defined network. In Proceedings of the International Conference on Computing, Greater Noida, India, 29–30 April 2016. [Google Scholar]
- Chang, S.-Y.; Hu, Y.-C.; Liu, Z. Securing wireless medium access control against insider denial-of-service attackers. In Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS), Florence, Italy, 28–30 September 2015; pp. 370–378. [Google Scholar]
- Al-Shaer, E.; Duan, Q.; Jafarian, J.H. Random host mutation for moving target defense. In Proceedings of the International Conference on Security and Privacy in Communication Systems, Padua, Italy, 3–5 September 2012; pp. 310–327. [Google Scholar]
- Antonatos, S.; Akritidis, P.; Markatos, E.P.; Anagnostakis, K.G. Defending against hitlist worms using network address space randomization. Comput. Netw. 2007, 51, 3471–3490. [Google Scholar] [CrossRef]
- Dunlop, M.; Groat, S.; Urbanski, W.; Marchany, R.; Tront, J. Mt6d: A moving target ipv6 defense. In Proceedings of the 2011-MILCOM 2011 Military Communications Conference, Baltimore, MD, USA, 7–10 November 2011; pp. 1321–1326. [Google Scholar]
- Qiao, L.; Nahrstedt, K. Comparison of MPEG encryption algorithms. Comput. Graph. 1998, 22, 437–448. [Google Scholar] [CrossRef]
- Ellis, S.R. A Cryptography Primer. In Computer and Information Security Handbook; Morgan Kaufmann: Burlington, MA, USA, 2013; pp. 25–46. [Google Scholar]
- Tyagi, A.; Pandey, N.; Gupta, K. PFSCL based Linear Feedback Shift Register. In Proceedings of the International Conference on Computational Techniques in Information & Communication Technologies, New Delhi, India, 11–13 March 2016. [Google Scholar]
- Wang, L.T.; McCluskey, E.J. Linear feedback shift register design using cyclic codes. IEEE Trans. Comput. 1988, 37, 1302–1306. [Google Scholar] [CrossRef]
- Jetzek, U. Galois Fields, Linear Feedback Shift Registers and Their Applications; Carl Hanser Verlag: Munich, Germany, 2018; pp. 59–80. [Google Scholar]
- Marinet, F. Pseudo-Random Number Generator. U.S. Patent US20010023423A1, 13 March 2001. Publication number: EP1143616A1. [Google Scholar]
- Lee, H.C.J.; Thinh, V.L.L. Port hopping for resilient networks. In Proceedings of the IEEE 60th Vehicular Technology Conference, 2004, VTC2004-Fall, Los Angeles, CA, USA, 26–29 September 2004. [Google Scholar]
- Chen, D.; Qing, D.; Wang, D. AES Key Expansion Algorithm Based on 2D Logistic Mapping. In Proceedings of the 2012 Fifth International Workshop on Chaos-Fractals Theories and Applications (IWCFTA), Dalian, China, 18–21 October 2012. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Fang, Z.; Xu, Z. Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping. Information 2022, 13, 537. https://doi.org/10.3390/info13110537
Fang Z, Xu Z. Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping. Information. 2022; 13(11):537. https://doi.org/10.3390/info13110537
Chicago/Turabian StyleFang, Zhu, and Zhengquan Xu. 2022. "Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping" Information 13, no. 11: 537. https://doi.org/10.3390/info13110537
APA StyleFang, Z., & Xu, Z. (2022). Dynamic Random Graph Protection Scheme Based on Chaos and Cryptographic Random Mapping. Information, 13(11), 537. https://doi.org/10.3390/info13110537