Sciweavers

CN
2006

Understanding when location-hiding using overlay networks is feasible

13 years 11 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy networks are used to enhance application security; including protecting applications from direct attacks and infrastructure Denial-of-Service attacks. However, the conditions under which such approaches can hide application location are not well understood. To shed light on this question, we develop a formal framework for proxy network approach to location-hiding which encompasses most of the proposed approaches. It is used to characterize how attacks, defenses, and correlated host vulnerabilities affect the feasibility of location-hiding. We find that existing approaches employing static structures (e.g. SOS and I3) cannot hide application location because attackers gain information monotonically and quickly penetrate the proxy network. However, adding defenses, such as proxy network reconfiguration or migr...
Ju Wang, Andrew A. Chien
Added 11 Dec 2010
Updated 11 Dec 2010
Type Journal
Year 2006
Where CN
Authors Ju Wang, Andrew A. Chien
Comments (0)