A Covert Communication Scheme based on DNA Microdots for Port Hopping
Volume 13, Number 5, September 2017 - Paper 5 - pp. 598-609 DOI: 10.23940/ijpe.17.05.p5.598609
Leyi Shia,b,*, Yuwen Cuia, Xiaotong Liua, Hui Suna, Zhiyu Xuea, Shufen Zhangb,c
aCollege of Computer and Communication Engineering, China University of Petroleum (East China), Qingdao, 266580, ChinabHebei Key Laboratory of Data Science and Application, Tangshan, 063210, ChinacNorth China University of Science and Technology, Tangshan, 063210, China
(Submitted on March 16, 2017; Revised on June 2, 2017; Accepted on August 15, 2017)
Abstract:
Port hopping is an effective solution for Moving Target Defense (MTD), which randomly changes the server’s service port number to provide a robust communication against malicious Denial of Service (DoS) and Distributed DoS (DDoS) attack. Although a series of novel and feasible port hopping mechanisms have been proposed and implemented, most of them cannot prevent the messages transmitted in the network from being intercepted by an attacker. This paper addresses the problem of defending the eavesdropping attack with the port hopping process. We propose a new module that combines the properties of port hopping and the encryption of DNA microdots to resist the eavesdropping attacks in the network. The proposed port hopping process is compatible with the UDP and TCP protocols, in which the four IP addresses equipped in the server stand for the different nucleotides of DNA strands. We implement the proposed scheme and conduct the theoretical analysis on it. The theoretical analysis and experimental results illustrate that the proposed scheme can effectively defend against the DoS/DDoS and eavesdropping attacks.
References: 24
- L. M. Adleman, "Molecular Computation of Solution to Combinatorial Problems," Science, New Series, vol. 266, No. 5187, pp.1021-1024, Nov. 1994
- G. Badishi, A. Herzberg, and I. Keidar, "Keeping Denial-of-Service Attackers in the Dark," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 3, pp. 191-204, 2007
- G. Badishi, A. Herzberg, I. Keidar, O. Romanov, and A. Yachin, "Denial of Service? Leave it to Beaver," Working Paper, TR CCIT, vol. 595, 2006
- G. Badishi, I. Keidar, A. Herzberg, O. Romanov and A. Yachin, "Denial of Service Protection with Beaver," From Security to Dependability Proceedings of Dagstuhl Seminar, pp.1-6, 2007
- M. Carvalho and R. Ford, "Moving-Target Defenses for Computer Networks," IEEE symposium on security and privacy, vol. 12, no. 2, pp. 73-76, 2014
- C. T. Clelland, V. Risca, and C. Bancroft, "Hiding Messages in DNA Microdots," Nature, vol. 399, pp.533-534, 1999
- G. Z. Cui, L. M. Qin, Y. F. Wang, and X. C. Zhang, "Information Security Technology Based on DNA Computing," IEEE International Workshop on Anti-Counterfeiting, Security, Identification IEEE, pp.288-291, Xiamen, China, 2007
- Z. Fu, M. Papatriantafilou, and P. Tsigas, "Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 401-413, 2008
- R. Guesmi, M. A. B. Farah, A. Kachouri, and Samet, "A novel Chaos-Based Image Encryption Using DNA Sequence Operation and Secure Hash Algorithm SHA-2," Nonlinear Dynamics, vol. 83, no. 3, pp.1123-1136, 2016
- K. Hari and T. Dohi, "Dependability Modeling and Analysis of Random Port Hopping," Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and trusted Computing, pp.586-593, Fukuoka, Japan, 2012
- K. Hari and T. Dohi, "Sensitivity Analysis of Random Port Hopping," Proceedings of the 2nd International Symposium on Multidisciplinary Emerging Networks and Systems (MENS-2010), IEEE CS Press, pp.316-321, Xi’an, China, 2010
- M. I. Khalil, "Real-Time Encryption/Decryption of Audio Signal," International Journal of Computer Network and Information Security, vol. 8, no. 2, pp.25-31, 2016
- D. Kumar and S. Singh, "Secret Data Writing Using DNA Sequences," In Emerging Trends in Networks and computer Communications (ETNCC), IEEE International Conference on, pp.402-405, Udaipur, Rajasthan, India, 2011
- R. P. Kumar, J. Babu, T. Gunasekhar, and S. B. Bhushan, "Mitigating Application DDoS Attacks using Random Port Hopping Technique," International Journal of Emerging Research in Management and Technology, vol. 4, pp.1-4, 2015
- H. C. J. Lee and V. L. Thing, "Port Hopping for Resilient Networks," vehicular technology conference, VTC2004-Fall. 2004 IEEE 60th, vol.5, pp. 3291-3295, 2004
- Y. B. Luo, B. S. Wang, G. L. Cai, Luo, Yue Bin, B. S. Wang, and G. L. Cai. "Analysis of Port Hopping for Proactive Cyber Defense," International Journal of Security and Its Applications, vol. 9, no. 2, pp. 123-134, 2015
- G. Madhulika, and C. S. Rao, "Generating Digital Signature Using DNA Coding," In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), Springer International Publishing, pp. 21-28, Bhubaneswar, India, 2014
- Mousa and M. Hamdy, "DNA-Genetic Encryption Technique," International Journal of Computer Network and Information Security, vol. 8, 2016
- E. Sitnikova and M. Asgarkhani, "A Strategic Framework for Managing Internet Security," 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 947-955, Xiamen, China, Aug 2014
- L. Y. Shi, C. F. Jia, S. L, and Z. Liu, "Port and Address Hopping for Active Cyber-Defense," Lecture Notes in Computer Science, Springer, vol. 4430, pp.295-300, Berlin Heidelberg, 2007
- A. K. Verma, M. Dave, and R. C. Joshi, “Securing Ad hoc Networks Using DNA Cryptography," IEEE International Conference on Computers and Devices for Communication (CODEC06), pp.781-786, Swissotel Kolkata, Indiak, December 2006
- X. Wang and Q. Zhang, "DNA Computing-Based Cryptography," Fourth International Conference on Bio-Inspired Computing, Beijing, China, 2009
- J. D. Waston and F. H. C. Crick, "A Structure for Deoxy Ribose Nucleic Acid," Nature, vol. 25, pp.737-738, 1953
- Y. P. Zhang, Z. Yu, W. Zhong, and R. O. Sinnott, "Index-Based Symmetric DNA Encryption Algorithm," 4th International Congress on Image and Signal Processing IEEE, vol. 5, pp. 2290-2294, Shanghai, China, 2011
Click here to download the paper.
Please note : You will need Adobe Acrobat viewer to view the full articles. |