Username   Password       Forgot your password?  Forgot your username? 

A Covert Communication Scheme based on DNA Microdots for Port Hopping

Volume 13, Number 5, September 2017 - Paper 5  - pp. 598-609
DOI: 10.23940/ijpe.17.05.p5.598609

Leyi Shia,b,*, Yuwen Cuia, Xiaotong Liua, Hui Suna, Zhiyu Xuea, Shufen Zhangb,c

aCollege of Computer and Communication Engineering, China University of Petroleum (East China), Qingdao, 266580, China
bHebei Key Laboratory of Data Science and Application, Tangshan, 063210, China
cNorth China University of Science and Technology, Tangshan, 063210, China

(Submitted on March 16, 2017; Revised on June 2, 2017; Accepted on August 15, 2017)

Abstract:

Port hopping is an effective solution for Moving Target Defense (MTD), which randomly changes the server’s service port number to provide a robust communication against malicious Denial of Service (DoS) and Distributed DoS (DDoS) attack. Although a series of novel and feasible port hopping mechanisms have been proposed and implemented, most of them cannot prevent the messages transmitted in the network from being intercepted by an attacker. This paper addresses the problem of defending the eavesdropping attack with the port hopping process. We propose a new module that combines the properties of port hopping and the encryption of DNA microdots to resist the eavesdropping attacks in the network. The proposed port hopping process is compatible with the UDP and TCP protocols, in which the four IP addresses equipped in the server stand for the different nucleotides of DNA strands. We implement the proposed scheme and conduct the theoretical analysis on it. The theoretical analysis and experimental results illustrate that the proposed scheme can effectively defend against the DoS/DDoS and eavesdropping attacks.

 

References: 24

    1. L. M. Adleman, "Molecular Computation of Solution to Combinatorial Problems," Science, New Series, vol. 266, No. 5187, pp.1021-1024, Nov. 1994
    2. G. Badishi, A. Herzberg, and I. Keidar, "Keeping Denial-of-Service Attackers in the Dark," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 3, pp. 191-204, 2007
    3. G. Badishi, A. Herzberg, I. Keidar, O. Romanov, and A. Yachin, "Denial of Service? Leave it to Beaver," Working Paper, TR CCIT, vol. 595, 2006
    4. G. Badishi, I. Keidar, A. Herzberg, O. Romanov and A. Yachin, "Denial of Service Protection with Beaver," From Security to Dependability Proceedings of Dagstuhl Seminar, pp.1-6, 2007
    5. M. Carvalho and R. Ford, "Moving-Target Defenses for Computer Networks," IEEE symposium on security and privacy, vol. 12, no. 2, pp. 73-76, 2014
    6. C. T. Clelland, V. Risca, and C. Bancroft, "Hiding Messages in DNA Microdots," Nature, vol. 399, pp.533-534, 1999
    7. G. Z. Cui, L. M. Qin, Y. F. Wang, and X. C. Zhang, "Information Security Technology Based on DNA Computing," IEEE International Workshop on Anti-Counterfeiting, Security, Identification IEEE, pp.288-291, Xiamen, China, 2007
    8. Z. Fu, M. Papatriantafilou, and P. Tsigas, "Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 401-413, 2008
    9. R. Guesmi, M. A. B. Farah, A. Kachouri, and Samet, "A novel Chaos-Based Image Encryption Using DNA Sequence Operation and Secure Hash Algorithm SHA-2," Nonlinear Dynamics, vol. 83, no. 3, pp.1123-1136, 2016
    10. K. Hari and T. Dohi, "Dependability Modeling and Analysis of Random Port Hopping," Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and trusted Computing, pp.586-593, Fukuoka, Japan, 2012
    11. K. Hari and T. Dohi, "Sensitivity Analysis of Random Port Hopping," Proceedings of the 2nd International Symposium on Multidisciplinary Emerging Networks and Systems (MENS-2010), IEEE CS Press, pp.316-321, Xi’an, China, 2010
    12. M. I. Khalil, "Real-Time Encryption/Decryption of Audio Signal," International Journal of Computer Network and Information Security, vol. 8, no. 2, pp.25-31, 2016
    13. D. Kumar and S. Singh, "Secret Data Writing Using DNA Sequences," In Emerging Trends in Networks and computer Communications (ETNCC), IEEE International Conference on, pp.402-405, Udaipur, Rajasthan, India, 2011
    14. R. P. Kumar, J. Babu, T. Gunasekhar, and S. B. Bhushan, "Mitigating Application DDoS Attacks using Random Port Hopping Technique," International Journal of Emerging Research in Management and Technology, vol. 4, pp.1-4, 2015
    15. H. C. J. Lee and V. L. Thing, "Port Hopping for Resilient Networks," vehicular technology conference, VTC2004-Fall. 2004 IEEE 60th, vol.5, pp. 3291-3295, 2004
    16. Y. B. Luo, B. S. Wang, G. L. Cai, Luo, Yue Bin, B. S. Wang, and G. L. Cai. "Analysis of Port Hopping for Proactive Cyber Defense," International Journal of Security and Its Applications, vol. 9, no. 2, pp. 123-134, 2015
    17. G. Madhulika, and C. S. Rao, "Generating Digital Signature Using DNA Coding," In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA), Springer International Publishing, pp. 21-28, Bhubaneswar, India, 2014
    18. Mousa and M. Hamdy, "DNA-Genetic Encryption Technique," International Journal of Computer Network and Information Security, vol. 8, 2016
    19. E. Sitnikova and M. Asgarkhani, "A Strategic Framework for Managing Internet Security," 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 947-955, Xiamen, China, Aug 2014
    20. L. Y. Shi, C. F. Jia, S. L, and Z. Liu, "Port and Address Hopping for Active Cyber-Defense," Lecture Notes in Computer Science, Springer, vol. 4430, pp.295-300, Berlin Heidelberg, 2007
    21. A. K. Verma, M. Dave, and R. C. Joshi, “Securing Ad hoc Networks Using DNA Cryptography," IEEE International Conference on Computers and Devices for Communication (CODEC06), pp.781-786, Swissotel Kolkata, Indiak, December 2006
    22. X. Wang and Q. Zhang, "DNA Computing-Based Cryptography," Fourth International Conference on Bio-Inspired Computing, Beijing, China, 2009
    23. J. D. Waston and F. H. C. Crick, "A Structure for Deoxy Ribose Nucleic Acid," Nature, vol. 25, pp.737-738, 1953
    24. Y. P. Zhang, Z. Yu, W. Zhong, and R. O. Sinnott, "Index-Based Symmetric DNA Encryption Algorithm," 4th International Congress on Image and Signal Processing IEEE, vol. 5, pp. 2290-2294, Shanghai, China, 2011

     

       

      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

       
      This site uses encryption for transmitting your passwords. ratmilwebsolutions.com