Communications and Network, 2010, 2, 187-192
doi:10.4236/cn.2010.23027 Published Online August 2010 (http://www.SciRP.org/journal/cn)
Copyright © 2010 SciRes. CN
A Security Transfer Model Based on Active Defense
Strategy
Zheng Ying
Wuhan Maritime Communication Research Institute, China
E-mail: phoolcee2004@yahoo.com.cn
Received June 13, 2010; revised July 18, 2010; accepted July 25, 2010
Abstract
This paper proposes a security transfer model founded on the active defense strategy. In the unit of security
domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network
element together with the self-similar, hierarchical and distributed management structure. Furthermore, we
use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according
to the digested information from data packets, this model is capable of detecting attacks and tracing back to
the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically
administered. In summary, this model not only improves the security of data transfer on the web, but also
enhances the effectiveness of the network management and switching efficiency of routers as well.
Keywords: Active Defense, Digested Information, Routing Control, Deceptive Packets, Hierarchical
Management
1. Introduction
To enhance the network security, transfer protocols, such
as L2TP, IPSec, TLS/SSL, SOCKSv5 are widely used in
the design of terminal system. However, the network
attacks are not only aiming at terminal systems: when
transferred on line, the data can also be easily sophisticated
or disturbed by attackers, which makes the receiver
unable to get the accurate packets; fixed transfer ports
and addresses are more vulnerable when the communica-
tion is going on between the sender and the receiver.
Thereby, the security of network entity in the process of
transferring data must be taken into consideration [1-22].
At present, there are mainly two kinds of the safety pre-
cautions together with corresponding network security
productions: open model (as data encryption); passive
defense model (as firewall). As the network attack is no
bordered, pervasive and secluded, the above-mentioned
technologies can not completely solve the network secu-
rity problems. Hence, further improvements, like proto-
cols of IntServ/RSVP, DiffServ and MPLS, are proposed
on purpose of satisfying security requirements. However,
disappointingly, people are still searching for absolute
solution to the network security problem concerning data
transfer up to the present.
Therefore, we would like to bring forward a security
transfer model on base of active defense strategy (as
shown in Figure 1). In this model, we define the intelli-
gent agent /management of network element together
with its self-similar, hierarchical and distributed manage-
ment structure and the protocols of IP data packets and
hierarchical routing management. Besides, it constructs
the dynamic security management mechanism in the unit
of security domain of dynamic overlaying routers,
accordingly realize the active defense against network
attacks. In conclusion, this model not only strengthens
the network security on the data transfer, but also ad-
vances the network management and packets switching
efficiency of routers as well.
2. Topological Structure of the Security
Transfer Model
As shown in Figure 1, the network is divided into several
adjacent virtual autonomous communities, namely security
communities, each with a particular number to represent
them (the parts surrounded by curve in Figure 1). The
diameter of every community is set from 4 to 7 hops.
Each autonomous community possesses edge routers,
overlaying routers, spare overlaying routers, and manage-
ment nodes which administer malfunction, configuration,
Z. YING
188
ER
ER
ER
ER
ER
ER
ER
ER
ER
ER
ER ER
ER
ER
OR
.
SOR
.
..
MN
MN MN
MN
MN
MN MN
.
.
MS
i,1 MS
i ,2MS
i,j
. . .
MS
i+ 1 ,1
TS
Figure 1. Topological structure of network.
performance and security of routers within this network
area. 4 to 7 neighboring communities make up one vir-
tual security clustering domains equipped with particular
clustering numbers. The management nodes in clustering
domains are administered by the management server in
the upper layer, making the agent processes capable of
governing the agent processes in the lower layer, viz.
intelligent agent and management of network element.
Moreover, we would like to define 4 to 7 neighboring
virtual security clustering domains as one virtual security
group domain holding unique group number. The manage-
ment server in the upper layer administers the servers
within the group domain, while enabling its agent processes
to run the processes in the lower layer. In this way, ana-
logously, we can construct the structure layer by layer.
Considering the similarity, we would like to focus on
only four layers of the management structure [4].
Besides, information exchange can be carried out in
the way of SNMPv3 between network nodes. Due to
dispersive management method adopted in this protocol,
the network traffic is obviously reduced. In the meantime,
the security is enhanced in that exchanging information
is encrypted and only authorized personnel can execute
the network management function and access encrypted
information.
Edge routers (ER) locate on the borderline of auto-
nomous communities. Their functions include:
1) identification of the category of data packets entering
and exiting communities, including ordinary packets,
encrypted packets and deceptive packets, data packets
switch;
2) digesting the information of security packets and
checking the integral security of the local community
and detection of the service quality parameters of the
whole community according to the requirements of
managements nodes in the local community;
3) submitting the detected state information to the
management nodes in the local community.
Overlaying routers (OR) are capable of :
1) identification of the category of the packets, data
packets switch;
2) checking the integrality or security performance of
the security packets via information digest according to
the requirements of managements nodes together with
further examination of the service quality parameters of
the community ;
3) submitting the state information to the management
servers in the local community.
Spare overlaying routers (SOR) are responsible for :
1) switching only ordinary data packets and deceptive
data packets;
2) checking the integrality or security performance of
the security packets via information digest according to
the requirements of management nodes together with the
examination of the service quality parameters of the
community;
3) submitting the detected and monitored state infor-
mation to the management servers in the local commu-
nity.
Management nodes (MN) function in the following
aspects:
1) punctually or randomly sending detection instruc-
tion to ER, OR or SOR, and recording the state informa-
tion about the security performance and service quality
submitted by routers into table Le, Lo and Ls ;
2) dynamically administering all kinds of routers in
the community, starting up SOR to replace the damaged
OR and make necessary modification to table Lo and Ls
according to the selective principle of overlaying routers
when OR are possibly attacked;
3) synthetically scheduling the security packets which
C
opyright © 2010 SciRes. CN
Z. YING189
k
enter the community through routers, namely designating
the transfer path of the packet within the community,
evaluation of the service quality and security performance
of the whole autonomous community ;
4) submitting the evaluation of state information to the
management server in the upper layer.
The selective principles of overlaying routers are:
Security: the router is not attacked after checking the
security;
Connectivity: packets entering the community via any
ER can be switched to any other ER passing through OR
in the community;
Least cost: use overlaying routers as few as possible
which should meet the service requirements on the con-
dition of accomplishing the connectivity, and the service
requirements include parameters such as the throughput,
bandwidth and utilization rate.
Management servers (MS), based on the information
of the service quality and security performance of the
whole autonomous communities submitted by MN in the
lower layer, administers the management nodes in the
clustering domain or the management servers in the low-
er layer, synthetically schedule the security packets in the
clustering domain in the meantime, namely specifying
the community way within the domain. Besides, MS
would evaluate the service quality and security perform-
ance of the whole clustering domain and submit the state
information to the management servers in the top layer.
Top server (TS), based on the information of the ser-
vice quality and security performance of the whole clus-
tering domain submitted by MN in the lower layer, syn-
thetically schedule the security packets, namely specify-
ing the way made up of cluster domains within the
group.
In the 4-layer management structure, the router node
can be denoted as :
,,,
..
iijij
M
SMN R
irepresents the label of MSi, denotes the label of MN
in the clustering domain administered by MSi, k represents
the label of routers in the community administered by
MNi,j. For example, in the clustering domain administered
by the third MS, the No.5 router administered by the
second MN can be symbolized as: .
j
33,23,2
..MS MNR,5
3. Protocols of IP Data Packets
In the terminal system based on active defense model [5],
data on transferring is distributed to several different ISP
connections. For each data stream, certain amounts of
fake deceptive packets (deceptive packets for short), on
purpose of active defense and offering security services
of different degrees, are appended into the transfer queue
where they are mixed with the original encrypted packets
(encrypted packets for short) proportionally and stochas-
tically. The deceptive packets are capable of beguiling
the attacks in that attackers can not tell the original packets
from the fake ones. Besides, the methods proposed in
literary [6] can be adopted to evaluate the security per-
formance and quality of service of autonomous commu-
nities and routers according to the state parameters, e.g.
throughput, bandwidth and utilization rate. Therefore,
data packets on the net can be divided into three categories:
ordinary packets, encrypted packets and deceptive packets,
of which the latter two are defined as security packets.
To identify the type of data packets and guarantee
their integrality, we propose a new format of IP packets
as shown in Figure 2. Provided the “protocol” field val-
ue in the IP header is 60 (according to RFC1700, 55~60
is unused), this format is employed in the packet, other-
wise this packet is of ordinary kind. Moreover, the class
field further indicates the type of the data packet: it is a
encrypted packet if the field value turns out to be zero
after decoded; in case the value changes to 1 after de-
coded, it would be a deceptive packet. The access server
initially figures out the abstract MD via hash functioning,
then encrypts the class field TI, the abstract field MD and
user info field M with the public key to this network
community. Finally the encrypted data is encased into
the user info section of the packet as Figure 2 shows.
When the security packets enter into the community, the
border router firstly decodes the encrypted parts with the
secret key shared among local users, secondly calculates
the outcome of hash functioning the user info security M,
H(M). Thereby, we can see whether the packet has been
attacked or not through comparing H(M) with MD, viz.
checking out the integrality and authenticity of the pack-
et. When the packet leaves the community, the border
router encrypts the class field TI, the abstract field MD
and user info field M with the public key to this network
community, and then encases the encrypted data into the
user info section which is displayed in Figure 2. Besides,
the routers switch ordinary packets without special
treatment.
The idea of data flow proposed by IPv6 is widely
adopted in our security transfer model: the packets flow-
ing from a given beginning node to a given end node are
of the same traffic; routers on the track which corre-
sponds with a specific traffic, are required to designate
the security grade and quality of service for the packets
of this traffic and process effective management towards
Class fieldAbstract fieldIP headerUser info field
Figure 2. Format of data packets.
Copyright © 2010 SciRes. CN
Z. YING
190
security packets. Considering the facts that the probability
of IP packets being separated is less than 0.25% [7] and
the MTU discovery implemented by Network tries to
avoid fragmenting data packets, we would like to rede-
fine the fragment identifier field together with a
neighboring unused bit as the flow identifier field and the
offset field in the IP header as the security service field.
The access server will choose a stochastic figure from 217
1 numbers as the unique flow label for one packet with
encasing it into the flow identifier field subsequently and
put the service quality requirements into the security
service field as well.
In the security transfer model, routing methods of dif-
ferent strategies are adopted: for the original packets, the
routing process is strictly executed by levels and grades
and the security control over their transfer courses would
be achieved; for the deceptive packets, relaxed routing
by levels and grades is employed so that we can not only
beguile the attacks, but also measure the network states
using the packets. Similar to the means of routing using
extensible header proposed in IPv6, we introduce the
concept of mask and define several fields in the extensible
section of the header as the descriptions of route way (as
show in Figure 3)
The unused number 10001000 is chosen as the identifier,
and this solution, similar to IPv6, however, is not always
definite source routing. The length field, counted in
4-bytes, shows clearly the overall extent of the Options
section. Concerning the pointer, it denotes the next
address to search. This field is set 0 initially, and in-
creases by 1 once the data flow passes one router until
the number reaches Len-1(Len represents the value of
length field). Lastly, as for the mask, which is generated
by the management server on the community borderline,
the eight bits correspond with 8 addresses in the direc-
tory respectively. Nonzero bits denote that the corre-
sponding addresses must follow the previous ones.
Whereas, 0 bits suggest that the corresponding addresses
do not always obey that rule.
Due to the fact that the network diameter of each
autonomous community is set from 4 to 7 hops, the
maximal length of the field of routing description is less
than 40 bytes, viz. the maximal length of the extensible
section of IP header.
4. Security Routing Control Protocol
In the security transfer model, we define the intelligent
0
Identifier Length Pointer Mask
The first IP address
The second IP address
...
816 24
agent/ management of network element and management
architect of hierarchy and distributed structure. The
active defense of the data packets transferring on the net
is implemented through hierarchical and distributed
dynamic routing control of security packets. Therefore,
we would like to discuss the security routing manage-
ment protocol on dynamic routing on hierarchical and
distributed structure.
The source label, destination label and flow label are
respectively denoted as: ,,,
..
s
sh shp
MS MNR,
,,,
..
ddede
MS MNRq
and F.
1) routing control protocol in the TS layer
Founded on the service quality and security state
information of the whole clustering domain, we establish
a dynamic routing maintenance table (as shown in
Table 1). In this table, current routing state of this group
domain are recorded, including the security state, desti-
nation clustering domain ( destination management serv-
er node ), the clustering domain of next hop ( the man-
agement server node of next hop) and its cost value. TS
designates the security transferring paths for security
packets according to the router table in the unit of
clustering domain.
TS
L
TS
L
When the security packet, of which the flow label is F,
is transferred to the destination address which belongs to
a clustering domain administered by a different manage-
ment server from the source, the transferring path is:
12
TS
Route(F,L ),,,
sl ld
M
SMS MSMS
 
In the formula,
s
S and d
M
S denotes source la-
bel and destination label respectively; (1,2,)
i
l
MS i
i
l
represents the clustering domains on the transferring path
administered by the management server MS. TS will
broadcast the routing information to correlative manage-
ment server MS .
i
l
When the source and destination addresses belong to
clustering domains administered by the same MSi,, routing
management for the packet is left to the MSi.
2) routing control protocol in the MS layer
On the foundation of the whole service quality and security
state parameters of the autonomous communities submitted
by the administering MNi,j, a dynamic maintenance rout-
ing table is set up (as shown in Table 2). In that
table, current routing states of the clustering do mains
MS
Li
Table 1. Route table of management server nodes MSi.
31
Figure 3. Format of routing description.
Destination Next hop Cost Security state
1
M
S 1
k
M
S 1
k
C 1
k
S
2
M
S 2
k
M
S 2
k
C 2
k
S
C
opyright © 2010 SciRes. CN
Z. YING191
Table 2. Route table of management nodes MNij.
Destination Next hop Cost Security state
,1
.
ii
M
SMN 1
,
.
iik
MS MN
1
,ik
C 1
,ik
S
,2
.
ii
M
SMN 2
,
.
iik
MS MN
2
,ik
C 2
,ik
S
j
M
S ,
.
p
iik
MS MN ,
p
ik
C ,
P
ik
S
administered by MSi , including security state of MNi,j,
destination community, the next community and its cost
as well.
When the security packet, of which the flow label is F,
is transferred to the destination address which belongs to
a autonomous community administered by a different
management node from the source, the transferring path
is:
12
MS
,,
Route(F,L ).,.,.
i
m
iil iiliil
MS MNMS MNMS MN

,
.
i
M
S,(1,2,,
j
il )
M
Nj mdenote the label of autono-
mous communities administered by MNi,
j
lon the trans-
ferring path. MSi will broadcast routing information to
correlative management nodes.
If the source and the destination addresses are belonging
to communities administered by the same management
nodes, MNi,j will handle the routing management.
3) route control protocol of the MN layer
On the foundation of the state info table
and , we can establish and dynamically maintain
the router table (as shown in Table 3) of the au-
tonomous communities administered by MNi,j. In this
table, current security state of the router Ri,j,k , the desti-
nation router, the next overlaying router (including the
edge router of the neighboring community) and its cost
are recorded. Thereby, according to the route table ,
MNi,j will appoint the transfer path in the unit of routers
within the administered community for security packets.
MN ,
e
Lij MN,
o
Lij
MN ,
Lij
MN ,
s
Lij
MN ,
Lij
For the security packets, of which the flow label is F,
the transfer path designated on base of route table
is :
MN ,
Lij
,
1
MN
,,,,,, ,,,
Route(F,L )
,, ,
.... ..
ij
n
i ijijli ijijliiil
MS MNRMS MNRMS MNR


1
)
In the formula, ,,,
(1,2,,..
iijijl
M
SMN Rn
de-
notes the overlaying router labels administered by MNi,j
on the appointed transfer path. 1
,,,
..
iiil
MS MNR
, repre-
senting the entrance router label of the next community
Table 3. Route table of the nodes Ri,j,k in communities ad-
ministered by MNij.
Destination Next hop Cost Security state
,,,
..
iijij
MS MNR11
,,,
..
iijijk
MS MNR 1
,,ijk
C
1
,,ijk
S
,,,
..
iijij
MS MNR22
,,,
..
iijijk
MS MNR
2
,,ijk
C
2
,,ijk
S
,
.
ii
M
SMN
1
,,,
..
iiil
MS MNR
1
,,il
C
1
,,il
S
adjacent to the one governed by MNi,j, will not be in-
cluded when the source and destination addresses are
within communities administered by the same MNi,j.
MNi,j will send the routing information and mask generated
based on quantity of addresses to the entrance router.
Subsequently, this router will orderly write the IP ad-
dresses, corresponding with items of ,
into the routing address list of the security packet F , and
the mask into the mask district.
,
MN
Route(F,L )
ij
Founded on the above mentioned protocols, we would
like to propose the process of routing control of security
packets:
1) If the destination label and the source label of the
security packets are within the autonomous communities
administered by the same management node, routing
management are enforced directly by the management
node, otherwise go to 2);
2) The management node will submit the source label,
destination label and flow label of the packet to the manage-
ment server in the upper layer. When the source label
and the destination label of the security packets are with-
in clustering domains governed by the same management
server, then the server will handle the routing management,
send the routing information to the management node in
the lower layer, and finally the routing information is
sent to the entrance router by the management node; or
else administer 3);
3) Management servers submit the source label, desti-
nation label and flow label of the packets to the Top
management server which will administer the routing
management. Moreover, the routing information is
passed from the top server to management servers in the
lower layer, then to the management nodes in the layer
below, and reaches the entrance routers at last.
To sum up, the active defense characteristics of the
security transfer model proposed in our article are mainly
demonstrated in the following aspects: firstly, we define
the intelligent agent /management of network element
together with the self-similar, hierarchical and distributed
management structure and the protocols of IP data packets
and hierarchical routing management. In addition, this
paper puts forward the dynamic security management
Copyright © 2010 SciRes. CN
Z. YING
Copyright © 2010 SciRes. CN
192
mechanism in the unit of security domain of dynamic
overlaying routers. Secondly, the encrypted packets are
mixed with the fake ones before they are transferred,
which makes the attackers incapable of tracing back to
the encrypted packets sender. Thirdly, information
digested from security packets is used to detect and
localize the attacks duly and effectively in the unit of
autonomous communities. Besides, due to the manage-
ment mode of hierarchy and distribution adopted in the
our proposal, routing management of each layer can
adapt itself to different requirements, which not only
mobilizes the management, but also greatly reduces the
items recorded in router tables, thereby enhances the
switching efficiency of routers.
5. References
[1] Nagswara S. V Rao, et al. “NetLets: Measurement-based
Routing Daemons for Low End-to-end Delays Over Net-
works,” Computer Communications Vol. 26, No. 8, 2003,
pp. 834-844.
[2] D. Nesset, “Factors Affecting Distributed System Secu-
rity,” IEEE Transactions on Software Engineering, Vol.
SE-13, No. 2, 1987, pp. 233-248.
[3] Haixin Duan and Jianping Wu, “Entity Security Architect
Structure in Computer Network,” Transactions on Com-
puter, Vol. 24, No. 8, August 2001, pp. 147-155.
[4] V Paxsion1 “End2to2end routing behavior in the Inter-
net1 IEEE/ACM Transaction on Networking,” Vol. 5, No.
5, 1997, pp. 601-615.
[5] Liotine Matthew, “Mission-critical Network Planning,”
Artech House Inc., London, 2003.
[6] S Muftic and M. Sloman, “Security Architecture for Dis-
tributed Systems,” Computer Communications, Vol. 17,
No. 7, 1994, pp. 492-500.
[7] D. Nesset. “Factors Affecting Distributed System Secu-
rity,” IEEE Transaction on Software Engineering, Vol. 13,
No. 2, 1987, pp. 233-247.
[8] Joe “Touch Dynamic Internet Overlay Deployment and
Management Using the X-Bone,” Computer Networks,
Vol. 57, No. 5, 2001, PP. 117-135.
[9] R Forder, The Future of Defense Analysis,” Journal of
Defense Science, Vol. 2, No. 1, 2000, pp. 215-226.
[10] Kimberly Holloman, “The Network Centric Operations
Conceptual Framework,” Proceeding of Network Centric
Warfare 2004 Conference, Washington, D. C., 2004, pp.
3-12.
[11] A. S. Tannenbaum, “Computer Networks,” 4th Edition,
Machine Press, Beijing, 2004.
[12] D. Comer and D. Stevens, “Internetworking with TCP/IP,
Volume II: Design Implementation and Internals,” 2nd
Edition, Prentice Hall, New Jersey, 1994.
[13] S. Giordano, M. Potts and M. Smirnov. “Advances in
QoS,” IEEE Communications Magazine, Vol. 41, No. 1,
2003, pp. 137-141.
[14] S. Kent and R. Atkinson, “IP Security for the Internet
Protocol,” 1998. http://www.ietf.org/rfc/ rfc24011.txt
[15] M. Leech, M. Ganis, Y. Lee, et al. “SOCKS protocol,”
1996. http://www.ietf.org/rfc/ rfc1928.txt
[16] T. Dierks and C. Allen. “The TLS Protocol,” 1999,
http://www.ietf.org/rfc/ rfc2246.txt
[17] F. Chung, “Reliable Software and Communication I: an
Overview,” IEEE Journal on Selected Areas in Commu-
nications, Vol. 12, No. 1, 1994, pp. 23-32.
[18] B. Coan and D. Heyman. “Reliable Software and Com-
munication III: Congestion Control and Network Reli-
ability,” IEEE Journal on Selected Areas in Communica-
tions, Vol. 12, No. 1, 2002, pp. 40-45.
[19] Elham Ghashghai and Ronald L. Rardin, Using a Hybrid
of Exact and Genetic Algorithms to Design Survivable
Networks, Computers and Operations Research, Vol. 29,
No. 1, 2002, pp. 53-66.