IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2015-03-03 13:50
Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router -- A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow --
Ken Eguchi, Shota Nagatomo, Yuji Yokoyama, Kaoru Sano, Hirofumi Yamaki, Yoichiro Ueno (Tokyo Denki Univ.), Hiroshi Kobayashi (Tokyo Denki Univ) ICSS2014-65
Abstract (in Japanese) (See Japanese page) 
(in English) There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems, and cooperation among Internet operators and users over the world is required. As a potential solution, the multi-layer-binding (MLB) router aims at preventing outflow and inflow of cyber-attack packets to the Internet has been proposed. It has the following key features; (1) The MLB router registers the pair of the IP and the MAC addresses into an MLB table, using the connection requested port as the key of the entry. When the router receives a packet, it searches the MLB table using the port that received the packet as the key. If the pair of source the IP and the MAC addresses does not exist, the router discards the packet regarding it as a spoofed IP packet. (2) After receiving dropping requests from other nodes, the MLB router discards the corresponding non-IP spoofed attack packets or anonymous address packets. This paper pertains to dropping request. First, we propose a protocol to discover the MLB routers that should send out dropping requests, from all MLB routers scattering around the world, and to send valid dropping request messages to the corresponding MLB routers. Next, we build a test-bed installed with a framework of the dropping request protocol by using OpenFlow, and conduct a cyber-attack experiment that mimics a targeted attack. The results show that 230 milliseconds after the attack is detected, the inflow of the attack packets into the Internet as well as the outflow of an information-leaking packets from the victim’s node was prevented.
Keyword (in Japanese) (See Japanese page) 
(in English) measure for cyber-attack / multi-layer-binding router / MLB router / dropping request protocol / OpenFlow / / /  
Reference Info. IEICE Tech. Rep., vol. 114, no. 489, ICSS2014-65, pp. 13-18, March 2015.
Paper # ICSS2014-65 
Date of Issue 2015-02-24 (ICSS) 
ISSN Print edition: ISSN 0913-5685  Online edition: ISSN 2432-6380
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Download PDF ICSS2014-65

Conference Information
Committee ICSS  
Conference Date 2015-03-03 - 2015-03-04 
Place (in Japanese) (See Japanese page) 
Place (in English) Meio Univiersity 
Topics (in Japanese) (See Japanese page) 
Topics (in English) Communication Security, etc. 
Paper Information
Registration To ICSS 
Conference Code 2015-03-ICSS 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) Measures to Prevent Cyber-Attack Using Multi-Layer-Binding (MLB) Router 
Sub Title (in English) A Proposal of Dropping Request Protocol, and its Implementation and Evaluation Using OpenFlow 
Keyword(1) measure for cyber-attack  
Keyword(2) multi-layer-binding router  
Keyword(3) MLB router  
Keyword(4) dropping request protocol  
Keyword(5) OpenFlow  
Keyword(6)  
Keyword(7)  
Keyword(8)  
1st Author's Name Ken Eguchi  
1st Author's Affiliation Tokyo Denki University (Tokyo Denki Univ.)
2nd Author's Name Shota Nagatomo  
2nd Author's Affiliation Tokyo Denki University (Tokyo Denki Univ.)
3rd Author's Name Yuji Yokoyama  
3rd Author's Affiliation Tokyo Denki University (Tokyo Denki Univ.)
4th Author's Name Kaoru Sano  
4th Author's Affiliation Tokyo Denki University (Tokyo Denki Univ.)
5th Author's Name Hirofumi Yamaki  
5th Author's Affiliation Tokyo Denki University (Tokyo Denki Univ.)
6th Author's Name Yoichiro Ueno  
6th Author's Affiliation Tokyo Denki University (Tokyo Denki Univ.)
7th Author's Name Hiroshi Kobayashi  
7th Author's Affiliation Tokyo Denki University (Tokyo Denki Univ)
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Speaker
Date Time 2015-03-03 13:50:00 
Presentation Time 25 
Registration for ICSS 
Paper # IEICE-ICSS2014-65 
Volume (vol) IEICE-114 
Number (no) no.489 
Page pp.13-18 
#Pages IEICE-6 
Date of Issue IEICE-ICSS-2015-02-24 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan