on ndn and lack of measurement
play

On NDN and (lack of ) Measurement Thomas Silverston National - PowerPoint PPT Presentation

On NDN and (lack of ) Measurement Thomas Silverston National Institute of Information and Communications Technology (NICT) ICT Testbed Research, Development and Operation Lab P2P-TV Measurement Experiments and Traffic Analysis


  1. On NDN and (“lack of” ) Measurement Thomas Silverston National Institute of Information and Communications Technology (NICT) ICT Testbed Research, Development and Operation Lab

  2. P2P-TV Measurement Experiments and Traffic Analysis • Experiment Testbed Japan X France A • Traffic Analysis • Novel Mechanisms Internet France B [Measuring P2P IPTV Systems], ACM NOSSDAV 2007 France C Japan Y [Traffic Analysis of P2P IPTV Communities], Elsevier Computer Networks 2009 Data set (Anonymized) with A. Dainotti (Caida) http://content.lip6.fr 100% 100% Countries Legend Other 90% 90% USA 80% 80% CAN % of Download Traffic % of Upload Traffic AUS 70% 70% RUS 60% 60% SWE POL 50% 50% ITA ESP 40% 40% GBR 30% 30% DEU FRA 20% 20% VNM 10% 10% KOR THA SGP France A France B France C Japan X Japan Y France A France B France C Japan X Japan Y TWN 1 HKG JPN CHN Controlled Peers Controlled Peers

  3. Motivation • Internet is mostly used to access content – Video: 90% of global consumer traffic by 2018 • [Cisco VNI 2015] • Users are interested with content, not location – TCP/IP (host-to-host communication) • Information Centric Networking – Named-Data Networking [CoNext 2009] – Host-to-content communication • Packet address refers to content and not location – In-Network Caching • New “network layer” for Future Internet – Data at the core of the communication 2

  4. NDN Overview Router A after receiving Data FIB Name Forward to /doctor Router B Publisher /doctor/obj Router C Router A after receiving Interest 3 PIT FIB Name Coming from Name Forward to -- -- /doctor Router B Router B Cached copies in CS /doctor/obj Router C 4 /doctor/index.htm PIT Name Coming from Router A FIB PIT 2 /doctor/index.htm User 1 Cached copies in CS -- Router B after receiving Data FIB PIT FIB Content Name Forward to Store 5 /doctor Router B Content /doctor/obj Router C Router B after receiving Interest Store PIT FIB 7 Name Coming from Name Forward to -- -- /doctor Router B 1 Cached copies in CS /doctor/obj Router C /doctor/index.htm PIT Name Coming from 6 8 /doctor/index.htm Router A Cached copies in CS Open Issues -- 1. Caching at each Nodes 2. Routing/Forwarding toward Content 3. Security issues (information-leakage) User 1 User 2 3

  5. Caching Strategies in NDN • Popularity-based strategies – MPC: Most-Popular Content Caching Strategy [IEEE ICC 2013] • Cache only popular Content – SACS: Socially-Aware Caching Strategy [IFIP Networking 2014] • Cache Content from popular users (Planet Lab experiments) • Infer User Traffic from Social Network dump (IEEE ICC 2014) 1 1 CCN (LRU+Always) CCNx MPC SACS/PageRank 0.8 Cache Hit Ratio Cache Hit Ratio 0.6 0.8 0.4 0.2 0.6 0 Tree Abilene Tiger2 GeantDTelekomLevel3 1 5 10 15 20 Topologies Cache Size 4

  6. NDN Performances Evaluation • Architecture evaluation – How many Cache Nodes in NDN to be efficient?’ – Comparison with Client/Server, CDN architecture • Trade-off 50% of cache nodes for higher performances – Deployment at reduced infrastructure cost for ISPs 5

  7. Routing in ICN/NDN • Routing scheme for NDN – Flooding (i.e.: wasting resources) – NLSR: in-path caching • SRSC: SDN-based Routing Scheme for NDN [IEEE Netsoft 2015] Controller-based (anycast routing) 6

  8. Routing in ICN/NDN • Implementation on NDNx (NFD) • Deployment on virtual Testbed with Docker • Request: Zipf, etc. Geant Abilene 7

  9. Security in NDN Information-leakage • One of the main security threat in Internet – IT Security Risks Survey 2014: A Business Approach to Managing http://media.kaspersky.com/en/IT_Security_Risks_Survey_2014_Glob al_report.pdf • Cyber Espionage – Targeted Attacks (phishing, malware, website, external memory device) • Examples: Sony, Target – $100 M upgrading systems – 46% drop in benefits [ Understanding Targeted Attacks: The Impact of Targeted Attacks ] 8

  10. Targeted Attacks • Infects PC via emails • Probes network • Steals Information Countermeasures Train employees? Human errors Source: IT Security Center IPA: IT Promotion Agency http://www.ipa.go.jp/security/english/newattack_en.html 9

  11. Information-leakage through NDN packets • Interest/Data packets are “Request/Reply” - Content name, etc. • Data can be filtered out out by network admin. - White/Black lists of (un)authorized content names • CustomerList , BankingInfo , etc. • Interest packets are sent out the network to external publishers as requests (“free” names) - Malwares can use Interest to leak Information through Targeted Attacks 10

  12. Information-leakage Countermeasure with Data Normal Agent Rules to Publish Content The Internet 1) Gatekeeper has white list of public Attacker contents 2) Every new content is checked by gatekeeper to register it into white list 3) Any content cannot be accessed unless it is listed in white list Comp1/ Pub /Info1 Firewall Gatekeeper Enterprise Network (Network Administrator) Comp1/ Priv /Info1 Employee A Gatekeeper can prevent information leakage 11 Malware through Data packet (reply messages)

  13. Targeted Attacks in NDN Preparation for Attack Enterprise Network 1. C&C server (Control malware via bots) Malware 2. Bot 3. Malware Firewall Data Packet Interest Packet Outside Network Bot Interest Name can be used to leak information C&C Server Interest/Data Packet through Targeted Attacks (request messages)

  14. URLs Dataset • Web Crawling of 7 main organizations – Amazon, Ask, Stackoverflow, BBC, CNN, Google, Yahoo – Common Crawl Data Set repository • 1.73B URLs -> 7M for each organization Directory Part File Part /(Organization)/(Directory 1 )/ … /(Directory n )/(File)?(Query)#(Fragment) <net_loc> <path> <query> <fragment> URLs Parameters (RFC 1808) Length of <PATH> Number of ‘/’ in <path> Length of <QUERY> Similarity of characters in <PATH> Length of <FRAGMENT> Similarity of characters in <QUERY> Length of Directory Similarity of characters in <FRAGMENT> Length of File

  15. Average Frequencies in Path, Query, and Fragment § Calculated average frequencies of characters in path, query and fragment of the URLs in all the organizations 14

  16. URLs Similarity Legitimate names exceed average similarity

  17. Anomaly Detection in NDN • Prevent Information-leakage – Internet security threat through Targeted Attacks • Web Organizations Crawling (Google, CNN, etc.) – Statistics on URLs (names) and HTTP traffic • Malicious Names filtering in NDN ( 15% misdetection names) – [IEEE Lanman 2016] with D. Kondo (UL), Prof. Asami (U. Tokyo) , Prof. Tode (U. Pref. Osaka) and Prof. O. Perrin (UL) – [ NOM WS – Infocom 2017 ] D. Kondo (UL), Prof. Asami (U. Tokyo) , Prof. Tode (U. Pref. Osaka) and Prof. O. Perrin (UL) – One–Class SVM 16

  18. Project ANR Doctor (2014-2017) http://www.doctor-project.org/ • Deployment of new network functions and protocols (e.g.: NDN) in a virtualized networking environment (e.g.: NFV) – Monitoring, managing and securing (using SDN for reconfiguration) • Partners: Orange, Thlaes, Montimage, UTT, LORIA/CNRS (900k € ) • NDN/HTTP proxy designed in the project 17

  19. Conclusion • NDN Architecture – Caching: popularity-based – Routing: Controller-based – Security: Name-Anomaly Detection in NDN ���������� thomas@nict.go.jp 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend