Presentation on
Multi Path Transmission Control Protocols as a
Security solution
At
GTU PG School , BISAG Campus, Gandhinagar
CDAC-GTU-BISAG ME Program
By: Nishant Pawar
160930361007
M.E ITSNS
CONTENTS
 Abstract
 Introduction
 MPTCP Technology Features and implement
 Algorithm and concept of MPTCP
 Conclusion
Reference
Abstract
 Use of Multi-Path Transmission Control Protocols for more secure data transfer.
In network,Data transfer could be sniffed and then some decryption process
could be made.
Nowadays lot of network have more than one connection to others.
Multi-Path TCP which could be used in such networks which have more than one
connection to public network. This method is use for special data transfer which
could increase security of data and according to Multi-Path TCP the speed of
transfer will increase.
Introduction
 Data are mostly encrypted before they are transfer over the network.
 Crypto algorithms are used according to amounts of data and time in which data
should be transferred.
 Transmission Control Protocols used for sure that data reach their destination.
 Network consist more than one connection to public network as Internet is.
 More than one network connection could increase transfer speed and security
level of transfer data process.
• When we use one connection in network, hacker could sniff packets in one place
of network and collect data.
• More than one network connection will force hacker to work on more place to
sniff packets.
• It will require knowledge on more than one transfer technology and Without it,
hacker will lost possibility to collect all data packets, so it will not be possible do
decode it.
• here this technology ready to use which could provide such possibility Multi-Path
TCP.
Introduction
TCP overview
• TCP is used to transfer data between processes running on different
machines. TCP can send data in two directions between two hosts.
• Unique identifier of the TCP connection are two pairs of values – IP
and port number.
• TCP using checksums and sequence numbers provides a complete
and orderly data exchange for higher layer applications.
• The header contains all the necessary details to establish a
connection.
TCP overview
TCP header Three-way handshake
TCP overview
 In fig. Host A sends a segment with set SYN flag, then host B confirms that
it received packet and send back SYN and ACK flag. Finally,host A send
empty segment with only ACK flag.
 TCP connections cannot move from one IP address to another. When a PC
switches from Ethernet to Wi-Fi it obtains another IP address. All existing
TCP connections must be shutdown and reconnected.
 MPTCP protocol is a set of extensions to the specification of TCP which
allows the client to make multiple connections using different network
cards with the same destination host. In this way fault-tolerant are formed
and efficient data connections between hosts that are compatible with
existing network infrastructures.
MP TCP features and implement
 Main goal of this solution is that it is possible to use multiple network paths for a
single connection. Another advantage is increases throughput of transport
connections. This approach should significantly improve balance congestion
between network paths.
Fig. N-different TCP connections is represented as
one logical data
MP TCP features and implement
 MPTCP is located at the transport layer
and aims to be transparent to both
higher and lower layers. It is an
additional function of higher layers TCP
standard.
Fig. MPTCP in the stack
MP TCP features and implement
• Connection of MPTCP is established in
the same way as a standard TCP.
Protocol is enhanced by new feature.
MP_CAPABLE option informs both
hosts if MPTCP connection can be
established and if data can be
transmitted.
Fig. Establishing connection
MP TCP features and implement
 Establishment of new connection is
complicated by middle boxes (switches,
routers). Pair (IP, port) of source and
destination hosts is not enough to
identify connection. Therefore MPTCP
extended its functionality with the
additional option – MP_JOIN
Fig. Adding new subflow into
MPTCP
MP TCP features and implement
 Standard TCP ‘subflow sequence number’
provides the reception of single subflow
and ensures if any loss of data is detected.
MPTCP uses "data sequance number" to
sort received before passing it to the
application.
 When host’s source wants to inform host’s
destination that it has no more data to
send it signals this "Data FIN". It has the
same semantics and behavior as a regular
TCP FIN, but at the connection level.Fig. MPTCP header (in short)
MPTCP as A Security Solution..
 MPTCP could increase security level of transmitted data because of
fact that it uses many different links to reach destination unlike
methodology which are only using network protection and securing
possibility of connection into this network.
 Transmitted data are treated as row binary data, which could be
divided into blocks which are passed to transmission layer.
 To protect data from being sniffed via hacker, authors propose
algorithm which consists of such steps…
Algorithm of transfer data in MPTCP
 Step 1 – data are encrypted,
 Step 2 – data are divided into blocks,
 Step 3 – random sequence of blocks to be passed are determined,
 Step 4 – blocks are collected in random sequence determined in
previous step,
 Step 5 – blocks of data are passed to MPTCPsocket which will transmit
it do destination,
 Step 6 – receiver side collect blocks of data,
 Step 7 – receiver side are connecting blocks of data in right order,
 Step 8 – data are decrypted.
MPTCP as A Security Solution..
Fig. Mixing data process Fig. Transmission process
MPTCP as A Security Solution..
 The worst thing is that it will require some additional implementation
on MPTCP layer. It is possible to use some well known protocols used
for establishing secure crypto key for example. Such protocol is used
in IPSec implementation. It is possible also to establish secure
connection and share information about data sequence using shared
key.
CONCLUSIONS
• MPTCP concept was presented in security aspects. MPTCP provides
such functionality which could increase security level of transmitted
data in easy way. Hacker needs to sniff data on many links, and needs
to know possible way of transmission and more than one
transmission technology, which is not so easy.
• Using MPTCP user will get not only faster data transmission but also
more secure.
Referance
• IEEE paper of Multi Path Transmission Control Protocols as a
Security solution
Thank you

Multipath TCP as Security Solution

  • 1.
    Presentation on Multi PathTransmission Control Protocols as a Security solution At GTU PG School , BISAG Campus, Gandhinagar CDAC-GTU-BISAG ME Program By: Nishant Pawar 160930361007 M.E ITSNS
  • 2.
    CONTENTS  Abstract  Introduction MPTCP Technology Features and implement  Algorithm and concept of MPTCP  Conclusion Reference
  • 3.
    Abstract  Use ofMulti-Path Transmission Control Protocols for more secure data transfer. In network,Data transfer could be sniffed and then some decryption process could be made. Nowadays lot of network have more than one connection to others. Multi-Path TCP which could be used in such networks which have more than one connection to public network. This method is use for special data transfer which could increase security of data and according to Multi-Path TCP the speed of transfer will increase.
  • 4.
    Introduction  Data aremostly encrypted before they are transfer over the network.  Crypto algorithms are used according to amounts of data and time in which data should be transferred.  Transmission Control Protocols used for sure that data reach their destination.  Network consist more than one connection to public network as Internet is.  More than one network connection could increase transfer speed and security level of transfer data process.
  • 5.
    • When weuse one connection in network, hacker could sniff packets in one place of network and collect data. • More than one network connection will force hacker to work on more place to sniff packets. • It will require knowledge on more than one transfer technology and Without it, hacker will lost possibility to collect all data packets, so it will not be possible do decode it. • here this technology ready to use which could provide such possibility Multi-Path TCP. Introduction
  • 6.
    TCP overview • TCPis used to transfer data between processes running on different machines. TCP can send data in two directions between two hosts. • Unique identifier of the TCP connection are two pairs of values – IP and port number. • TCP using checksums and sequence numbers provides a complete and orderly data exchange for higher layer applications. • The header contains all the necessary details to establish a connection.
  • 7.
    TCP overview TCP headerThree-way handshake
  • 8.
    TCP overview  Infig. Host A sends a segment with set SYN flag, then host B confirms that it received packet and send back SYN and ACK flag. Finally,host A send empty segment with only ACK flag.  TCP connections cannot move from one IP address to another. When a PC switches from Ethernet to Wi-Fi it obtains another IP address. All existing TCP connections must be shutdown and reconnected.  MPTCP protocol is a set of extensions to the specification of TCP which allows the client to make multiple connections using different network cards with the same destination host. In this way fault-tolerant are formed and efficient data connections between hosts that are compatible with existing network infrastructures.
  • 9.
    MP TCP featuresand implement  Main goal of this solution is that it is possible to use multiple network paths for a single connection. Another advantage is increases throughput of transport connections. This approach should significantly improve balance congestion between network paths. Fig. N-different TCP connections is represented as one logical data
  • 10.
    MP TCP featuresand implement  MPTCP is located at the transport layer and aims to be transparent to both higher and lower layers. It is an additional function of higher layers TCP standard. Fig. MPTCP in the stack
  • 11.
    MP TCP featuresand implement • Connection of MPTCP is established in the same way as a standard TCP. Protocol is enhanced by new feature. MP_CAPABLE option informs both hosts if MPTCP connection can be established and if data can be transmitted. Fig. Establishing connection
  • 12.
    MP TCP featuresand implement  Establishment of new connection is complicated by middle boxes (switches, routers). Pair (IP, port) of source and destination hosts is not enough to identify connection. Therefore MPTCP extended its functionality with the additional option – MP_JOIN Fig. Adding new subflow into MPTCP
  • 13.
    MP TCP featuresand implement  Standard TCP ‘subflow sequence number’ provides the reception of single subflow and ensures if any loss of data is detected. MPTCP uses "data sequance number" to sort received before passing it to the application.  When host’s source wants to inform host’s destination that it has no more data to send it signals this "Data FIN". It has the same semantics and behavior as a regular TCP FIN, but at the connection level.Fig. MPTCP header (in short)
  • 14.
    MPTCP as ASecurity Solution..  MPTCP could increase security level of transmitted data because of fact that it uses many different links to reach destination unlike methodology which are only using network protection and securing possibility of connection into this network.  Transmitted data are treated as row binary data, which could be divided into blocks which are passed to transmission layer.  To protect data from being sniffed via hacker, authors propose algorithm which consists of such steps…
  • 15.
    Algorithm of transferdata in MPTCP  Step 1 – data are encrypted,  Step 2 – data are divided into blocks,  Step 3 – random sequence of blocks to be passed are determined,  Step 4 – blocks are collected in random sequence determined in previous step,  Step 5 – blocks of data are passed to MPTCPsocket which will transmit it do destination,  Step 6 – receiver side collect blocks of data,  Step 7 – receiver side are connecting blocks of data in right order,  Step 8 – data are decrypted.
  • 16.
    MPTCP as ASecurity Solution.. Fig. Mixing data process Fig. Transmission process
  • 17.
    MPTCP as ASecurity Solution..  The worst thing is that it will require some additional implementation on MPTCP layer. It is possible to use some well known protocols used for establishing secure crypto key for example. Such protocol is used in IPSec implementation. It is possible also to establish secure connection and share information about data sequence using shared key.
  • 18.
    CONCLUSIONS • MPTCP conceptwas presented in security aspects. MPTCP provides such functionality which could increase security level of transmitted data in easy way. Hacker needs to sniff data on many links, and needs to know possible way of transmission and more than one transmission technology, which is not so easy. • Using MPTCP user will get not only faster data transmission but also more secure.
  • 19.
    Referance • IEEE paperof Multi Path Transmission Control Protocols as a Security solution
  • 20.