Mitigating Attacks in Unstructured Multicast Overlay Networks
Cristina Nita-Rotaru,Aaron Walters, David Zage
Dependable and Secure Distributed Systems Lab ((DS)2)
Department of Computer Science and CERIAS Purdue University
Mitigating Attacks in Unstructured Multicast Overlay Networks - - PowerPoint PPT Presentation
Mitigating Attacks in Unstructured Multicast Overlay Networks Cristina Nita-Rotaru,Aaron Walters, David Zage Dependable and Secure Distributed Systems Lab ((DS) 2 ) Department of Computer Science and CERIAS Purdue University Dependable and
Department of Computer Science and CERIAS Purdue University
Cristina Nita-Rotaru UC Irvine 2
Cristina Nita-Rotaru UC Irvine 3
Cristina Nita-Rotaru UC Irvine 4
INTRODUCTION
Cristina Nita-Rotaru UC Irvine 5
INTRODUCTION
Cristina Nita-Rotaru UC Irvine 6
SplitStream
Nice, Overcast, ALMI, Chainsaw
INTRODUCTION Example of a mesh overlay
Cristina Nita-Rotaru UC Irvine 7
INTRODUCTION
Cristina Nita-Rotaru UC Irvine 8
Explosion of p2p systems Security is critical for these systems
INTRODUCTION
Cristina Nita-Rotaru UC Irvine 9
Many distributed services rely on adaptivity (for good reasons) Security threats are increasing as everything is connected to Internet
INTRODUCTION
Cristina Nita-Rotaru UC Irvine 10
Cristina Nita-Rotaru UC Irvine 11
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Cristina Nita-Rotaru UC Irvine 12
Cristina Nita-Rotaru UC Irvine 13
neighbor selection
MODEL
Cristina Nita-Rotaru UC Irvine 14
MODEL
Cristina Nita-Rotaru UC Irvine 15
MODEL
Cristina Nita-Rotaru UC Irvine 16
MODEL
Cristina Nita-Rotaru UC Irvine 17
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Cristina Nita-Rotaru UC Irvine 18
Cristina Nita-Rotaru UC Irvine 19
ATTACKS
Cristina Nita-Rotaru UC Irvine 20
ATTACKS
Cristina Nita-Rotaru UC Irvine 21
ATTACKS
Cristina Nita-Rotaru UC Irvine 22
ATTACKS
Cristina Nita-Rotaru UC Irvine 23
100 nodes, PlanetLab, 60 minutes, malicious nodes lie about bandwidth, latency, saturation
Lying increases the chance of a node being selected as parent almost 5 times ATTACKS Impact of 1 malicious node Impact of % of malicious nodes
Cristina Nita-Rotaru UC Irvine 24
10% 50% 30% Tree is not resilient to malicious behavior, several malicious nodes can cause significant disturbance! Nodes were randomly selected ATTRACTION ATTACKS
Cristina Nita-Rotaru UC Irvine 25
C is now 3 hops away from the source D exploits the physical topology to make C disconnect from the source ATTACKS
Cristina Nita-Rotaru UC Irvine 26
ATTACKS System is destabilized
Cristina Nita-Rotaru UC Irvine 27
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Cristina Nita-Rotaru UC Irvine 28
Primary source of information Make decision to adapt New parent Secondary source of information Response Detection Prevent bad adaptations
Cristina Nita-Rotaru UC Irvine 29
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
DEFENSE
Cristina Nita-Rotaru UC Irvine 30
DEFENSE
Cristina Nita-Rotaru UC Irvine 31
DEFENSE
Cristina Nita-Rotaru UC Irvine 32
DEFENSE
Cristina Nita-Rotaru UC Irvine 33
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Cristina Nita-Rotaru UC Irvine 34
PREVENTION
Cristina Nita-Rotaru UC Irvine 35
PREVENTION
Cristina Nita-Rotaru UC Irvine 36
PREVENTION
Cristina Nita-Rotaru UC Irvine 37
PREVENTION
Cristina Nita-Rotaru UC Irvine 38
PREVENTION
Cristina Nita-Rotaru UC Irvine 39
PREVENTION
Cristina Nita-Rotaru UC Irvine 40
PREVENTION
Cristina Nita-Rotaru UC Irvine 41
PREVENTION
Cristina Nita-Rotaru UC Irvine 42
PREVENTION
Cristina Nita-Rotaru UC Irvine 43
Improves stability and reduces the number of malicious changes (bandwidth did not change, with less changes)
Cristina Nita-Rotaru UC Irvine 44
PREVENTION
Cristina Nita-Rotaru UC Irvine 45
PREVENTION
Cristina Nita-Rotaru UC Irvine 46
RESPONSE
Cristina Nita-Rotaru UC Irvine 47
RESPONSE
Cristina Nita-Rotaru UC Irvine 48
RESPONSE
Cristina Nita-Rotaru UC Irvine 49
Bandwidth returns to value before attack RESPONSE Local response only Local and Global response
Cristina Nita-Rotaru UC Irvine 50
RESPONSE
Cristina Nita-Rotaru UC Irvine 51
QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture.
Cristina Nita-Rotaru UC Irvine 52
11 W/defense 70 Deflation 60 Inflation 10 None
Attack
Oscillation Attack Coordinate distribution
chosen by Vivaldi
Cristina Nita-Rotaru UC Irvine 53
9%, 36ms 10%, 33ms 11%,22ms 27%, 20ms 30% 6%, 26ms 7%, 23ms 15%, 21ms 21%, 18ms 20% 5%, 20ms 10%,19ms 13%,18ms 17%, 17ms 10% 13%, 16ms 17%,16ms 21%, 16ms 28%, 16ms 0% 2.00 1.75 1.5 1.25
Outlier Threshold
VIRTUAL COORD. SYSTEMS
Cristina Nita-Rotaru UC Irvine 54
Cristina Nita-Rotaru UC Irvine 55
Cristina Nita-Rotaru UC Irvine 56
Adaptation Mechanisms in Unstructured Multicast Overlay
IEEE/ACM Transactions on Networking, 2007 (Feb. 2009).
Mechanisms in Unstructured Multicast Overlay Networks. A. Walters, D. Zage and C. Nita-Rotaru, ICNP 2006.
in Adversarial Networks. D. Zage and C. Nita-Rotaru. CCS 2007.
Based Peer-to-Peer Systems. J. Siebert, D. Zage and C. Nita- Rotaru, Under Submission.