Code Monkey home page Code Monkey logo

tfnr's Introduction

The Triadically Functional Network Redistribution Protocol

The Triadically Functional Network Redistribution Protocol, TFNr for short, is a revolutionary new blackhole routing protocol devised by yours truly.

This protocol builds off of the current capabilities of MANETs, namely GPSR and AODV (2 of the most prominent).

This repo contains the basis for a custom network partitioning schema in which networks are segemented in a need-based orientation. As traffic is being dynamically generated and passed through a central entity (in this case it'll be a Qube which I will get to in a second), a custom structural control flow algorithm will be deployed to sporadically analyze this traffic's entry and exit node calls.

The functionality of this is somewhat dependent on the "Tor way of thinking" in the sense that if an entity has corrupted either an entry node or an exit node to a network then they in fact have administrative control over all middle nodes. In this case, TFNr IS in fact the node with administrative control over the traffic flow.


As detailed in the whitepaper above, all traffic from a source node to a destination node can be tagged as either "forward" or "reverse" in polarity based on the retrospection and request tendencies of the traffic at hand. This traffic, respectively tagged as either FERR or RERR, is inherently stateless and deformed in nature. This means that for each outbound request is at always fragmented to some extent and never expects a return stream.

For each outbound request to each lowest-cost and least-distance node, the request is passed through a custom hierarchical structured control flow algorithm in which it is mathematically evaluated for string distance (SIFT3) tendencies to be either benign or malicious based off of similarities in a wider area malware signature database. This can be visualized in the diagram below:

Diagram

When a malicious node is detected, a specific deformed packet query is crafted and pushed to this said malicious node. The biggest change done in a situation like this is that no inbound traffic is expected on the client (application) side. All incoming connection requests or download requests are inherently logged and dropped. After this node is guaranteed to be malicious, a new path through the network is crafted (via MANET routing protocols) in which this malicious node is considered dead.

While the source node (application or client) continuously looks for the destination node (web server, client) via FERR requests, the destination node simulatenously looks for the source node via RERR requests based on a continuously growing table of pending interests initiation by a client. At some minimal point where the latency of the network is at a low, the source node will be able to successfully securely communicate and exchange information with a benign and legitimate destinaiton node.

This truly allows for a dynamic routing simulation network, in which malicious trafifc is allowed to behave normally all-the while preventing stateful requests and malware to be executed on a live environment, thus preventing unsolicited data leakages and sandbox-escape attacks.

tfnr's People

Contributors

dek1ber avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.