The paper proposes an improved flow-based routing model taking into account information security risks using basic vulnerability criticality metrics. The model is based on the conditions for the implementation of single- and multipath routing, flow conservation, and prevention of overload of communication links of the telecommunications network (TCN). Within the proposed model, the problem of secure routing is formulated in an optimization form. The novelty of the developed model is that expressions are used to calculate routing metrics, which characterize the risk of information security in communication links of the TCN and in accordance with the NIST recommendations, take into account damages from the violation of confidentiality and integrity of information, availability of network resources in case of use of existing vulnerabilities; indicators of the complexity of exploiting vulnerabilities at network nodes and gaining access to network elements and the network as a whole due to the use of these vulnerabilities. As shown by the results of the study, the use of the proposed model of secure routing allows ensuring the calculation and use of routes with minimal risk of information security, thereby ensuring the maximum level of network security for packets transmitted in the TCN. The proposed approach to the formation of routing metrics can also be used to ensure comprehensive consideration in the process of solving routing problems of both network security indicators and quality of service indicators. The prospects for the development of the obtained solutions include the synthesis of models and methods of secure routing by which it would be possible to provide (guarantee) a given level of network security based on the calculation and use of appropriate routes in TCN.
A practical approach to load balancing in a telecommunication network (TCN) is implementing Traffic Engineering (TE) technology principles to reduce link utilization and improve QoS level. In order to adapt TE solutions with network security requirements, this paper proposes a mathematical model for secure routing, which belongs to the class of flow-based optimization solutions. The model is based on the conditions of multi-flow routing implementation, flow conservation, and TCN link overload prevention. Due to this, the problem of secure routing is formulated in an optimization form. The model’s novelty is the modified conditions of load balancing in TCN. Along with the indicators of link capacity with the help of weighting coefficients, the network security (NS) indicators of TCN elements are also taken into account. The network security (NS) indicators in the TCN modeling process include information security risks of routers and communication links, losses from breach of confidentiality and integrity of information, probability of existing vulnerabilities exploitation, etc. The study confirmed the effectiveness of the proposed solution. On the test TCN topology, it is demonstrated that the use of a secure routing model allows to calculate the routes and provide such an order of load balancing, which compromises meeting the requirements of both QoS and NS. In the routing process, information security risk reduction in packet transmission by about 11.3% was accompanied by an increase (on average by 26%) in the upper bound of the network link utilization
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.