Defensive Resource Allocations with Security Chokepoints in IPv6 Networks
Securely configured Internet Protocol version 6 networks can be made resistant to network scanning, forcing attackers to propagate following existing benign communication paths. We exploit this attacker limitation in a defensive approach in which heightened security measures are deployed onto a sele...
        Saved in:
      
    
          | Published in | Data and Applications Security and Privacy XXIX Vol. 9149; pp. 261 - 276 | 
|---|---|
| Main Authors | , , , | 
| Format | Book Chapter | 
| Language | English | 
| Published | 
        Switzerland
          Springer International Publishing AG
    
        2015
     Springer International Publishing  | 
| Series | Lecture Notes in Computer Science | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 3319208098 9783319208091  | 
| ISSN | 0302-9743 1611-3349 1611-3349  | 
| DOI | 10.1007/978-3-319-20810-7_19 | 
Cover
| Abstract | Securely configured Internet Protocol version 6 networks can be made resistant to network scanning, forcing attackers to propagate following existing benign communication paths. We exploit this attacker limitation in a defensive approach in which heightened security measures are deployed onto a select group of chokepoint hosts to enhance detection or deter penetration. Chokepoints are chosen such that, together, they connect small isolated clusters of the communication graph. Hence, attackers attempting to propagate are limited to a small set of targets or have to penetrate one or more chokepoints. Optimal placement of chokepoints requires solving an NP-hard problem and, hence, we approximate optimal solutions via a suite of heuristics. We test our algorithms on data from a large operational network and discover that heightened security measures are only needed on 0.65 % of the nodes to restrict unimpeded attacker propagation to no more than 15 % of the network. | 
    
|---|---|
| AbstractList | Securely configured Internet Protocol version 6 networks can be made resistant to network scanning, forcing attackers to propagate following existing benign communication paths. We exploit this attacker limitation in a defensive approach in which heightened security measures are deployed onto a select group of chokepoint hosts to enhance detection or deter penetration. Chokepoints are chosen such that, together, they connect small isolated clusters of the communication graph. Hence, attackers attempting to propagate are limited to a small set of targets or have to penetrate one or more chokepoints. Optimal placement of chokepoints requires solving an NP-hard problem and, hence, we approximate optimal solutions via a suite of heuristics. We test our algorithms on data from a large operational network and discover that heightened security measures are only needed on 0.65 % of the nodes to restrict unimpeded attacker propagation to no more than 15 % of the network. | 
    
| Author | Harang, Richard La, Richard J. Mell, Peter Gueye, Assane  | 
    
| Author_xml | – sequence: 1 givenname: Assane surname: Gueye fullname: Gueye, Assane email: agueye@umd.edu organization: University of Maryland, College Park, USA – sequence: 2 givenname: Peter surname: Mell fullname: Mell, Peter email: peter.mell@nist.gov organization: National Institute of Standards and Technology, Gaithersburg, USA – sequence: 3 givenname: Richard surname: Harang fullname: Harang, Richard email: richard.e.harang.civ@mail.mil organization: U.S. Army Research Laboratory, Adelphi, USA – sequence: 4 givenname: Richard J. surname: La fullname: La, Richard J. email: hyongla@umd.edu organization: University of Maryland, College Park, USA  | 
    
| BookMark | eNqNkcluGzEMQNUmKeqk-YMe5gfUUMtoOQbuZiBoijY5C_KYU089kaaSHMN_XzkOcm1PBEg-gnw8J6chBiTkPYMPDEBfWW2ooIJZysEwoNox-4qci5p5SrDXZMYUY1QIaU9eCmDNKZmBAE6tluINmVnGjRKqhbfkMuffAMDa1kgjZmTxEXsMeXjE5gfmuE0dNtfjGDtfhhhysxvKuvmJ3TYNZd_M13GDUxxCyc0QmsX3R9V8w7KLaZPfkbPejxkvn-MFuf_86W7-ld7cflnMr2_oWihTqOYgFXDT8xZ7AZ6zuog31mhcyVXLUUsLK6E7U3uMXS2ZwmXPDCilsR4rLkh7nLsNk9_v_Di6KQ0PPu0dA3cQ56o4J1y14Z48uYO4yvEjl2t7-IXJLWPc5H9B8ghNKf7ZYi4OD1SHoSQ_dms_FUzZKW60sK3jEhxX8n-x-gRdbbxgfwHA0Y66 | 
    
| ContentType | Book Chapter | 
    
| Copyright | IFIP International Federation for Information Processing 2015 | 
    
| Copyright_xml | – notice: IFIP International Federation for Information Processing 2015 | 
    
| DBID | FFUUA ABOKW UNPAY  | 
    
| DEWEY | 005.8 | 
    
| DOI | 10.1007/978-3-319-20810-7_19 | 
    
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only Unpaywall for CDI: Monographs and Miscellaneous Content Unpaywall  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Computer Science | 
    
| EISBN | 3319208101 9783319208107  | 
    
| EISSN | 1611-3349 | 
    
| Editor | Samarati, Pierangela | 
    
| Editor_xml | – sequence: 1 fullname: Samarati, Pierangela  | 
    
| EndPage | 276 | 
    
| ExternalDocumentID | oai:HAL:hal-01745826v1 EBC6287395_240_264 EBC5587046_240_264  | 
    
| GroupedDBID | 0D6 0DA 38. AABBV AAGZE AAZAK AAZUS ABBVZ ABFTD ABMNI ACKNT ACRRC AEDXK AEJLV AEKFX AETDV AEZAY ALMA_UNASSIGNED_HOLDINGS APFYR AZZ BBABE CZZ FFUUA I4C IEZ IY- LDH SBO SFQCF TMQGW TPJZQ TSXQS TWXRB Z7R Z7S Z7U Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS P2P RNI RSU SVGTG VI1 ~02 ABOKW UNPAY  | 
    
| ID | FETCH-LOGICAL-h368t-72046028f25ef30a21848a8987ed4d52e7490d37c828f89db16ebf180667e6113 | 
    
| IEDL.DBID | UNPAY | 
    
| ISBN | 3319208098 9783319208091  | 
    
| ISSN | 0302-9743 1611-3349  | 
    
| IngestDate | Sun Oct 26 02:18:23 EDT 2025 Wed Sep 17 04:00:57 EDT 2025 Thu May 29 01:00:16 EDT 2025 Wed May 28 23:42:57 EDT 2025  | 
    
| IsDoiOpenAccess | true | 
    
| IsOpenAccess | true | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| LCCallNum | QA76.9.A25QA76.9.D3Q | 
    
| Language | English | 
    
| License | cc-by | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-h368t-72046028f25ef30a21848a8987ed4d52e7490d37c828f89db16ebf180667e6113 | 
    
| OCLC | 912863650 | 
    
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://inria.hal.science/hal-01745826 | 
    
| PQID | EBC5587046_240_264 | 
    
| PageCount | 16 | 
    
| ParticipantIDs | unpaywall_primary_10_1007_978_3_319_20810_7_19 springer_books_10_1007_978_3_319_20810_7_19 proquest_ebookcentralchapters_6287395_240_264 proquest_ebookcentralchapters_5587046_240_264  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2015 | 
    
| PublicationDateYYYYMMDD | 2015-01-01 | 
    
| PublicationDate_xml | – year: 2015 text: 2015  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Switzerland | 
    
| PublicationPlace_xml | – name: Switzerland – name: Cham  | 
    
| PublicationSeriesSubtitle | Information Systems and Applications, incl. Internet/Web, and HCI | 
    
| PublicationSeriesTitle | Lecture Notes in Computer Science | 
    
| PublicationSeriesTitleAlternate | Lect.Notes Computer | 
    
| PublicationSubtitle | 29th Annual IFIP WG 11. 3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings | 
    
| PublicationTitle | Data and Applications Security and Privacy XXIX | 
    
| PublicationYear | 2015 | 
    
| Publisher | Springer International Publishing AG Springer International Publishing  | 
    
| Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing  | 
    
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug  | 
    
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Dept. Computer Sciences, Lancaster University, Lancaster, United Kingdom – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Robotics Institute, Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: Fac. Engineering & Physical Sciences, University of Surrey, Guildford, United Kingdom – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zürich, Zürich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University Dept. Computer Science, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Computer Science, Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology Madras, Chennai, India – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: Technical University of Dortmund, Dortmund, Germany – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles Dept. Computer Science, Los Angeles, USA – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: Management & Systems (SIMS), University of California, Berkeley Dept. Computer Science & Informatio, Berkeley, USA – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max Planck Institute for Informatics, Saarbrücken, Germany  | 
    
| SSID | ssj0001558483 ssj0002792  | 
    
| Score | 1.7559453 | 
    
| Snippet | Securely configured Internet Protocol version 6 networks can be made resistant to network scanning, forcing attackers to propagate following existing benign... | 
    
| SourceID | unpaywall springer proquest  | 
    
| SourceType | Open Access Repository Publisher  | 
    
| StartPage | 261 | 
    
| SubjectTerms | Chokepoints Computer security Information architecture IPv6 Moving target Security Vertex partitioning  | 
    
| Title | Defensive Resource Allocations with Security Chokepoints in IPv6 Networks | 
    
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5587046&ppg=264 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6287395&ppg=264 http://link.springer.com/10.1007/978-3-319-20810-7_19 https://inria.hal.science/hal-01745826  | 
    
| UnpaywallVersion | submittedVersion | 
    
| Volume | 9149 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwED5BOyAYylMUAfLAhhzaOPFjrKClIFQhQRFMVh6OqKhCRVMQ_HrOeUBhoGLL4CTWnRN_n--7O4AjoZSRfsujCdI2iiskojIObT9il7GwLUIR5CrfAe8Pvct7_74UyOa5MCna3XlE3FnuACd4jXxX2PgOX4Y69xFz16A-HFx3HooQgUtVqaTntiYf89RcjlwR_repOi7ufi0qdPsnmvwKgK7CyiydBO9vwXg8t8f0GnBeza6Qljw5syx0oo9fhRsXT38d1mwGA7GpBWi1DVgy6SY0qv4NpPyct-DizCSFfp1Up_ikM7a7W74YiT2jJTdlgzt83PMTovVRmk3JKCUX16-cDAoR-XQbhr3u7Wmflq0V6CPjMqO2NQ1HaJG4vklYK7BETwZSSWFiL_ZdIzzVipmIkJAlUqH3uAmTtrSSWINWZjtQS59TswskYAoph4c8RklbP0x5kTBIfI3hIVcsbgKtjK3zAHCpOo0KI0y17-M_w-MasYVGeLZwPEeSh-_8Hn9ceVDb4VNdVWJG12um0fU6d722rm-C8-VkPSkKevx5w95_b9iHWvYyMweIVbLwEOqd7uXV3WG5YD8BHtvjwQ | 
    
| linkProvider | Unpaywall | 
    
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELagHRAM5SmKAHlgQw5pnPgxVkBpGapKUKlMVh6OWrVKK5KC4NdzzqMUBiq2DE5i3Tnx9_m-u0PoikuphWe7JAbaRmCFhEREgelH7FAatHjA_Vzl22fdofs48kalQDbPhUnA7tYYcGe5A9zANfBdbuI7bBvVmQeYu4bqw_6g_VKECBwiSyU9MzX5qCvXcuSK8L9J1XFg97MJV62faHIVAN1FO8tk4X-8-7PZ2h7TaaCHanaFtGRqLbPACj9_FW7cPP19tGcyGLBJLQCrHaAtnRyiRtW_AZef8xHq3em40K_j6hQft2dmd8sXIzZntPipbHAHj5tPAa1PkizFkwT3Bm8M9wsReXqMhp3759suKVsrkDFlIiOmNQ0DaBE7no6p7RuiJ3whBdeRG3mO5q60I8pDIGSxkOA9poO4JYwkVoOV6QmqJfNEnyLsUwmUwwUeI4WpHybdkGsgvlqzgEkaNRGpjK3yAHCpOg0LI6TK8-Cf4TIF2EIBPNs4ngHJg3d-j7-uPKjM8FRVlZjB9YoqcL3KXa-M65vIWjlZLYqCHn_ecPbfG85RLXtd6gvAKllwWS7ULwi34iw | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Data+and+Applications+Security+and+Privacy+XXIX&rft.atitle=Defensive+Resource+Allocations+with+Security+Chokepoints+in+IPv6+Networks&rft.date=2015-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783319208091&rft.volume=9149&rft_id=info:doi/10.1007%2F978-3-319-20810-7_19&rft.externalDBID=264&rft.externalDocID=EBC5587046_240_264 | 
    
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5587046-l.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6287395-l.jpg  |