efficient content verification in nam ed data netw orking
play

Efficient Content Verification in Nam ed Data Netw orking 2015. 10. - PowerPoint PPT Presentation

Efficient Content Verification in Nam ed Data Netw orking 2015. 10. 2. Dohyung Kim 1 , Sunwook Nam 2 , Jun Bi 3 , Ikjun Yeom 1 mr.dhkim@gmail.com 1 Sungkyunkwan University 2 Korea Financial Telecommunications and Clearing Institute 3 singhua


  1. Efficient Content Verification in Nam ed Data Netw orking 2015. 10. 2. Dohyung Kim 1 , Sunwook Nam 2 , Jun Bi 3 , Ikjun Yeom 1 mr.dhkim@gmail.com 1 Sungkyunkwan University 2 Korea Financial Telecommunications and Clearing Institute 3 singhua University 2nd ACM Conference on Information-Centric Networking in San Francisco

  2. Nam ed Data Netw orking ( NDN)  Name-based consumer-driven content delivery Request to Where  Request for What I nternet R2 R1 2nd ACM Conference on Information-Centric Networking in San Francisco

  3. Nam ed Data Netw orking ( NDN)  Name-based consumer-driven content delivery Request to Where  Request for What I nternet PIT entry is created R2 at routers R1 Interest 2nd ACM Conference on Information-Centric Networking in San Francisco

  4. Nam ed Data Netw orking ( NDN)  Name-based consumer-driven content delivery Request to Where  Request for What • PIT-based Content Delivery I nternet • In-network Caching Response R2 R1 2nd ACM Conference on Information-Centric Networking in San Francisco

  5. Nam ed Data Netw orking ( NDN)  Name-based consumer-driven content delivery Request to Where  Request for What Content is served from I nternet in-network cache R2 R1 Interest 2nd ACM Conference on Information-Centric Networking in San Francisco

  6. Secure Com m unication  In IP networks R2 R1 2nd ACM Conference on Information-Centric Networking in San Francisco

  7. Secure Com m unication  In IP networks R2 R1 End-to-end secure channel 2nd ACM Conference on Information-Centric Networking in San Francisco

  8. Secure Com m unication  In IP networks R2 R1 End-to-end secure channel  In NDN R2 R1 2nd ACM Conference on Information-Centric Networking in San Francisco

  9. Secure Com m unication  In IP networks R2 R1 End-to-end secure channel  In NDN R2 R1 Content itself should be secure 2nd ACM Conference on Information-Centric Networking in San Francisco

  10. Content Poisoning Attack  Fabricated content is placed in the content store  Router compromise 2nd ACM Conference on Information-Centric Networking in San Francisco

  11. Content Poisoning Attack  Fabricated content is placed in the content store  Router compromise  Injection from attackers’ server 2nd ACM Conference on Information-Centric Networking in San Francisco

  12. Content Poisoning Attack  Fabricated content is placed in the content store  Router compromise  Injection from attackers’ server 2nd ACM Conference on Information-Centric Networking in San Francisco

  13. Content Poisoning Attack  Distribution of the fabricated content Poisoned content I nternet R2 R1 2nd ACM Conference on Information-Centric Networking in San Francisco

  14. Content Poisoning Attack  Distribution of the fabricated content Poisoned content I nternet R2 R1 Interest 2nd ACM Conference on Information-Centric Networking in San Francisco

  15. Content Poisoning Attack  Distribution of the fabricated content • Poisoned content is distributed by the system itself I ntenet R2 R1 2nd ACM Conference on Information-Centric Networking in San Francisco

  16. Content Poisoning Attack  Distribution of the fabricated content • Poisoned content is distributed by the system itself I ntenet • Users are separated from valid content sources R2 R1 Not forwarded Poisoned response Interest 2nd ACM Conference on Information-Centric Networking in San Francisco

  17. NDN Content Verification Signature verification 2nd ACM Conference on Information-Centric Networking in San Francisco

  18. NDN Content Verification Signature verification incurs huge computational overhead 2nd ACM Conference on Information-Centric Networking in San Francisco

  19. Related W ork  Probabilistic caching - Bianchi, Giuseppe, et al. "Check before storing: What is the performance price of content integrity verification in LRU caching?." ACM SIGCOMM Computer Communication Review 43.3 (2013): 59-67. - Verification overhead is controlled by caching probability 2nd ACM Conference on Information-Centric Networking in San Francisco

  20. Related W ork  Probabilistic caching - Bianchi, Giuseppe, et al. "Check before storing: What is the performance price of content integrity verification in LRU caching?." ACM SIGCOMM Computer Communication Review 43.3 (2013): 59-67. - Verification overhead is controlled by caching probability  Limitation - Recency problem under dynamic content popularity - Limited application  Strongly bounded with random caching policy 2nd ACM Conference on Information-Centric Networking in San Francisco

  21. Motivations  Why do we verify even the content that is not actually served ? 2nd ACM Conference on Information-Centric Networking in San Francisco

  22. Motivations  Why do we verify even the content that is not actually served ?  ns-3 simulation for estimating the amount of serving contents Proportion of serving Cache hit rate content in the CS 2nd ACM Conference on Information-Centric Networking in San Francisco

  23. Objective  Reduce verification overhead while preserving functionality of the built-in signature verification 2nd ACM Conference on Information-Centric Networking in San Francisco

  24. The Proposed Schem e  Verify serving contents only 2nd ACM Conference on Information-Centric Networking in San Francisco

  25. The Proposed Scheme - Verify Serving Contents Only 2nd ACM Conference on Information-Centric Networking in San Francisco

  26. The Proposed Scheme - Verify Serving Contents Only 2nd ACM Conference on Information-Centric Networking in San Francisco

  27. The Proposed Scheme - Verify Serving Contents Only Signature verification 2nd ACM Conference on Information-Centric Networking in San Francisco

  28. The Proposed Scheme - Verify Serving Contents Only  In the proposed scheme, poisoned content is either - Evicted from the content store without any damages to the network - Discarded by the verification mechanism before being brought out to the network 2nd ACM Conference on Information-Centric Networking in San Francisco

  29. The Proposed Schem e  Flag for the already verified content verify name data Content store False C1Name … structure … C2Name True 2nd ACM Conference on Information-Centric Networking in San Francisco

  30. The Proposed Schem e  Favor the already-verified content in the content store - Segmented LRU prevents serving content from being evicted by by-passing content in the content store 2nd ACM Conference on Information-Centric Networking in San Francisco

  31. Efficiency Analysis  Efficiency metric - : the number of examined poisoned contents - : the number of verifications 2nd ACM Conference on Information-Centric Networking in San Francisco

  32. Efficiency Analysis  In the basic scheme, corresponds to the proportion of the requests for the poisoned contents, 2nd ACM Conference on Information-Centric Networking in San Francisco

  33. Efficiency Analysis  In the basic scheme, corresponds to the proportion of the requests for the poisoned contents,  In the proposed scheme, - is the request arriving rate - is the hit ratio for the unverified contents in the CS 2nd ACM Conference on Information-Centric Networking in San Francisco

  34. Efficiency Analysis  Hit ratio for the unverified contents Proportion of requests for content i 2nd ACM Conference on Information-Centric Networking in San Francisco

  35. Efficiency Analysis  Hit ratio for the unverified contents Cache-miss probability for the content i 2nd ACM Conference on Information-Centric Networking in San Francisco

  36. Efficiency Analysis  Hit ratio for the unverified contents Cache-hit probability for the content i 2nd ACM Conference on Information-Centric Networking in San Francisco

  37. Efficiency Analysis  Hit ratio for the unverified contents Cache-hit probability for the content i - According to Che approximation  is the size of CS, and t is the residing time in the CS 2nd ACM Conference on Information-Centric Networking in San Francisco

  38. Analytic Results  without SLRU 2nd ACM Conference on Information-Centric Networking in San Francisco

  39. Analytic Results  with SLRU 2nd ACM Conference on Information-Centric Networking in San Francisco

  40. Analytic Results  In the proposed scheme without SLRU  In the proposed scheme with SLRU  When is close to 0, the proposed scheme achieve a 10 or 20 time larger value of  The value of is changed according to the amount of poisoned content, 2nd ACM Conference on Information-Centric Networking in San Francisco

  41. Evaluation  Ns-3 simulation with - 10 6 Contents whose popularity follows Zipf-Mandelbrot distribution function - youTube trace from UMASS Campus during Mar. 11-17 in 2008 2nd ACM Conference on Information-Centric Networking in San Francisco

  42. Results - Poisoned contents 2nd ACM Conference on Information-Centric Networking in San Francisco

  43. Results - Effect of Segm ented LRU 2nd ACM Conference on Information-Centric Networking in San Francisco

  44. Results - youTube Trace 2nd ACM Conference on Information-Centric Networking in San Francisco

  45. Results - youTube Trace 2nd ACM Conference on Information-Centric Networking in San Francisco

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend