Navigating Internet Neighborhoods: Reputation, Its Impact on Security, and How to Crowd-source It
Mingyan Liu
Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, MI
Navigating Internet Neighborhoods: Reputation, Its Impact on - - PowerPoint PPT Presentation
Navigating Internet Neighborhoods: Reputation, Its Impact on Security, and How to Crowd-source It Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, MI November 6, 2013 Intro Motivation
Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, MI
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 2 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 3 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 4 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
2e+11 4e+11 6e+11 8e+11 1e+12 1.2e+12 1.4e+12 20 40 60 80 100 120 140 160 20 40 60 80 100 Traffic volume per hour (Bytes) % of the traffic are blocked by size Time (hour) Total NetFlow Tainted Traffic % of traffic are tainted by volume
1e+07 2e+07 3e+07 4e+07 5e+07 6e+07 20 40 60 80 100 120 140 160 20 40 60 80 100 Number of NetFlow per hour % of the Netflow are blocked Time (hour) Number of total Netflow Number of tainted traffic Netflow % of NetFlow are tainted
Liu (Michigan) Network Reputation November 6, 2013 5 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 6 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 7 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 8 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
20 40 60 80 100 1 10 100 1000 10000 Fraction of IPs that are blacklisted (%) ASes BAD GOOD ?
Liu (Michigan) Network Reputation November 6, 2013 9 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 10 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 11 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 12 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 13 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
1 + xo 2 ) + 1 = 0.
1 + x∗ 2 ) + 1 = 0.
1 + xo 2 ≤ x∗ 1 + x∗ 2 ⇒ under-investment.
Liu (Michigan) Network Reputation November 6, 2013 14 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
0.5 1 1.5 2 2.5
y: = x1+x2
− f’(y) −2 f’(y)
2(1−R’)
Liu (Michigan) Network Reputation November 6, 2013 15 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 16 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
1 + xR 2 ) + 1 − R′ i (xR i ) = 0.
1(xR 1 ) = R′ 2(xR 2 ) and thus xR 1 > xR 2 ⇒ The one who values
1 + xo 2 ≤ xR 1 + xR 2 ⇒ Collectively invest
Liu (Michigan) Network Reputation November 6, 2013 17 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
0.5 1 1.5 2 2.5
y: = x1+x2
− f’(y) −2 f’(y)
2(1−R’)
Liu (Michigan) Network Reputation November 6, 2013 18 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 19 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 20 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 21 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 22 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 23 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
ij).
Liu (Michigan) Network Reputation November 6, 2013 24 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 25 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
i : an estimate of rii.
i : given true qualities rii, ˆ
i = rii
i − rii|
i −
i = rii
i =
Liu (Michigan) Network Reputation November 6, 2013 26 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j − rjj|)
j −
i )
i ).
Liu (Michigan) Network Reputation November 6, 2013 27 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j − rjj|) + (1 − λ)gi(ˆ
i )
Liu (Michigan) Network Reputation November 6, 2013 28 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 29 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j − rjj|)
i = xii.
Liu (Michigan) Network Reputation November 6, 2013 30 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
i ti = 0
Liu (Michigan) Network Reputation November 6, 2013 31 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j − rjj|)]
0i), thus optimal choice
Liu (Michigan) Network Reputation November 6, 2013 32 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j=i E(fi(|Rij − rjj|)).
j=i fi(0) at equilibrium.
πσij) > fi(0), ∀j = i.
Liu (Michigan) Network Reputation November 6, 2013 33 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 34 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 35 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j −
i = xii
Liu (Michigan) Network Reputation November 6, 2013 36 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
k=i rkk)( k rkk)|)
Liu (Michigan) Network Reputation November 6, 2013 37 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j −
i )
Liu (Michigan) Network Reputation November 6, 2013 38 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j − rjj|) + gi(ˆ
i )
Liu (Michigan) Network Reputation November 6, 2013 39 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j − rjj|) + gi(ˆ
i )
i
j .
i ∼ N(rii, σ2/K).
i
Liu (Michigan) Network Reputation November 6, 2013 40 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
i
Liu (Michigan) Network Reputation November 6, 2013 41 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
j when submitting Xij,
Liu (Michigan) Network Reputation November 6, 2013 42 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
i (Xii, ¯
X0i+Xii 2
Liu (Michigan) Network Reputation November 6, 2013 43 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
i (xii, ¯
K ) assuming common and known σ. Optimal xii, when
K , is given by:
ii = rii + aσ′y
0.5 1 1.5 2 2.5 3 0.1 0.2 0.3 0.4 0.5 a y
Liu (Michigan) Network Reputation November 6, 2013 44 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
i
i − rii|)
0.5 1 1.5 2 2.5 3 0.15 0.16 0.17 0.18 0.19 0.2 0.21 a Mean Absolute Error Proposed Mechanism Averaging Mechanism
Liu (Michigan) Network Reputation November 6, 2013 45 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
0.5 1 1.5 2 2.5 3 0.15 0.16 0.17 0.18 0.19 0.2 0.21 a Mean Absolute Error Proposed Mechanism Averaging Mechanism 0.5 1 1.5 2 2.5 3 0.5 0.6 0.7 0.8 0.9 a Final Estimated Reputation Proposed Mechanism Averaging Mechanism Liu (Michigan) Network Reputation November 6, 2013 46 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 47 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 48 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 49 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 50 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
Liu (Michigan) Network Reputation November 6, 2013 51 / 52
Intro Motivation Security investment Crowd sourcing Environments Discussion Conclusion
N
(x,t) N
N
Liu (Michigan) Network Reputation November 6, 2013 52 / 52