Show simple item record

dc.contributor.author
Meier, Roland
dc.contributor.supervisor
Vanbever, Laurent
dc.contributor.supervisor
Lenders, Vincent
dc.contributor.supervisor
Chen, Ang
dc.contributor.supervisor
Perrig, Adrian
dc.date.accessioned
2022-12-05T06:56:35Z
dc.date.available
2022-12-02T20:02:10Z
dc.date.available
2022-12-05T06:56:35Z
dc.date.issued
2022
dc.identifier.uri
http://hdl.handle.net/20.500.11850/584627
dc.identifier.doi
10.3929/ethz-b-000584627
dc.description.abstract
While it is impressive that many of the prevalent protocols and algorithms in today's networks and the Internet have remained essentially unchanged since the very first computer networks in the Sixties, they were not designed for today's security environment. Only thanks to protocol extensions and new technologies, today's network users are protected against many threats. For example, most hosts are behind firewalls that prevent some malicious traffic from reaching them, and most traffic is encrypted to prevent eavesdropping. However, today's protections are not enough. For example, denial-of-service attacks can cut a host's connection even if their traffic does not reach it, and encrypted traffic still leaks information about its contents. In this dissertation, we explore how obfuscation can help to prevent such weak points. To this end, we present two solutions: First, we present NetHide, a system that mitigates denial-of-service attacks against the network infrastructure by obfuscating the network topology. The key idea behind NetHide is to formulate topology obfuscation as a multi-objective optimization problem that allows for a flexible trade-off between the security of the topology and the usability of network debugging tools. NetHide then intercepts and modifies path-tracing probes in the data plane to ensure that attackers can only learn the obfuscated topology. Second, we present ditto, a system that prevents traffic-analysis attacks by obfuscating the timing and size of packets. The key idea behind ditto is to add padding to packets and to introduce chaff packets such that the resulting traffic is independent of production traffic with respect to packet sizes and timing. ditto provides high throughput without requiring changes at hosts, which makes it ideal for protecting wide area networks. Both systems leverage recent advances in network programmability. They show that programmable switches can increase the security of high-throughput networks without degrading their performance. However, programmable switches do not only provide high performance for obfuscation, but they also allow analyzing traffic at scale. We complete this dissertation with a discussion of four use cases where programmable switches analyze traffic – for both benign and malicious purposes.
en_US
dc.format
application/pdf
en_US
dc.language.iso
en
en_US
dc.publisher
ETH Zurich
en_US
dc.rights.uri
http://rightsstatements.org/page/InC-NC/1.0/
dc.subject
Computer networks
en_US
dc.subject
Computer network security
en_US
dc.subject
Obfuscation
en_US
dc.subject
programmable data plane
en_US
dc.title
Improving Network Security through Obfuscation
en_US
dc.type
Doctoral Thesis
dc.rights.license
In Copyright - Non-Commercial Use Permitted
dc.date.published
2022-12-05
ethz.size
165 p.
en_US
ethz.code.ddc
DDC - DDC::0 - Computer science, information & general works::004 - Data processing, computer science
en_US
ethz.identifier.diss
28635
en_US
ethz.publication.place
Zurich
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02140 - Dep. Inf.technologie und Elektrotechnik / Dep. of Inform.Technol. Electrical Eng.::02640 - Inst. f. Technische Informatik und Komm. / Computer Eng. and Networks Lab.::09477 - Vanbever, Laurent / Vanbever, Laurent
en_US
ethz.date.deposited
2022-12-02T20:02:10Z
ethz.source
FORM
ethz.eth
yes
en_US
ethz.identifier.internal
TIK-Schriftenreihe-Nr. 203
en_US
ethz.availability
Open access
en_US
ethz.rosetta.installDate
2022-12-05T06:56:36Z
ethz.rosetta.lastUpdated
2022-12-05T06:56:36Z
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Improving%20Network%20Security%20through%20Obfuscation&rft.date=2022&rft.au=Meier,%20Roland&rft.genre=unknown&rft.btitle=Improving%20Network%20Security%20through%20Obfuscation
 Search print copy at ETH Library

Files in this item

Thumbnail

Publication type

Show simple item record