Fortification Through Topological Dominance: Using Hop Distance and Randomized Topology Strategies to Enhance Network Security

The potential to utilize information that identifies threatening and threatened nodes in a network in order to separate them with greater hop distances by using ring networks was demonstrated by the authors in a previous work. Here these ideas are expanded by generalizing the structures and tactics used to separate threatening and threatened nodes to make them more broadly applicable by using generalized network rings. In addition, the notion of randomization of the network topology is introduced as a dynamic means to increase the technical debt to the attacker, offer real time risk management of the network, and further expand the application of separation techniques in real world networks.