overview
play

Overview Distributed Services for Distributed VPNs Objectives for - PDF document

Michael Rossberg, Rene Golembewski, Guenter Schaefer Ilmenau University of Technology, Germany ICCCN 2012 Attack-Resistant Distributed Time Synchronization for Virtual Private Networks Overview Distributed Services for Distributed VPNs


  1. Michael Rossberg, Rene Golembewski, Guenter Schaefer Ilmenau University of Technology, Germany ICCCN 2012 Attack-Resistant Distributed Time Synchronization for Virtual Private Networks Overview • Distributed Services for Distributed VPNs • Objectives for Robust Time Synchronization • Approach – Offset Estimation – Synchronization • Evaluation • Conclusion & Outlook M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 2

  2. Distributed Services for Distributed VPNs • Large VPNs, >100 end-points Private • For scalable, robust Network operation distributed Private Network configuration Public Private Network Network • But what about the Private Network centralized Private Network management? M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 3 Distributed Services for Distributed VPNs • Secure time information available only in some places Private Network • Must be distributed in � the VPN Public Network � Private Network Private • NTP etc. would Network create exposed points M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 4

  3. Objectives • Operation in global environment (use no broadcast etc.) • Synchronize internally & externally • Integrity (against internal attackers) • Robustness (jitter, asymmetric paths, perhaps DoS attacks) • Scalability M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 5 Approach – Overview • All nodes periodically – Exchange time information – Filter invalid data – Adapt towards measured differences • Note: Also done in some WSN approaches, but do so more robust (as this works in this scenario) M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 6

  4. Approach – Offset Estimation • Measure RTT and time over encrypted tunnel • Problem: T 1 and T 2 A B may be different due to: {NA} T1 – Jitter – Queuing Delays – Asymmetric Paths T2 {NA,Timestamp} → Multiple measure- ments to filter out all invalid data we can M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 7 Approach – Siegel-Estimators • Estimate RTTs and 0.12 time offsets by linear 0.10 functions • Robust estimation by Measured RTT [s] 0.08 using repeated median 0.06 • Resistant against up to 0.04 50% outliers 0.02 • Slopes indicate “confidence” 0.00 0 1000 2000 3000 4000 5000 Time [s] M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 8

  5. Approach – Reducing the History • Longer history → More resistant against short term changes • But – Slower adaptation – More computations required • History thinned out over time using Zipf distribution • Newer values are more emphasized • Old values still have an influence M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 9 Synchronization Step • Offset estimates of different partners are aggregated • Weighted median assures bad estimates and outliers have no influence • Dampening assures over compensation M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 10

  6. Evaluation – Global operation • Uses unicast only → might work globally • But: What about 0.016 asymmetric paths? 0.014 ! of Node Offsets [s] • Experiment: 0.012 0.010 – 32 runs 0.008 – Internet Delays 0.006 – ɣ -distributed Jitter 0.004 → No significant 0.002 0.000 influence! 0.0 0.2 0.4 0.6 Ratio of Asymmetric Links M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 11 Evaluation – Synchronization • Adaptation guaranteed, if and if graph of synchronization partners is – Strongly connected – No sub-graphs exist where all nodes are more connected to the sub-graph than to the outside • Fortunately: This is the case for expander graphs and thus most peer-to- peer systems (Short proof in the paper) M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 12

  7. Evaluation – Integrity • Which influence have 9 10% of attackers (in a VPN with 100 8 nodes)? ! of Node Offsets [s] 7 • Attackers try to 6 circumvent filter by gradually increasing 5 reported offsets 4 • Measured ! after 500 3 synchronization steps 2 → Some nodes are 1 pulled away, but as offset increases filter 0 0 5 10 15 20 25 works Attacker Drift [ms/s] M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 13 Evaluation – Scalability (I) • How does VPN 0.016 size affect 0.014 synchronization ! of Node Offsets [s] 0.012 precision? 0.010 • Measured ! in 0.008 steady state for 0.006 growing VPN 0.004 size 0.002 → No significant 0.000 25 50 100 200 400 impact! VPN Size M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 14

  8. Evaluation – Scalability (II) • How does VPN Required Time Synchronization Steps 400 size affect time 350 to stabilization? 300 • Measured steps 250 until error < 0.1s 200 for growing VPN 150 size 100 → Sub-linear 50 impact despite 0 25 50 100 200 400 logarithmic scale! VPN Size M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 15 Conclusion & Outlook • Scalable & robust approach to synchronize clocks in distributed systems • Can be applied always if network graph has expansion properties • Optimizations still possible, e.g.: – Weighting of confidence factors – Blacklisting to avoid adaptive attackers M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 16

  9. Thank you for your attention! Michael Rossberg michael.rossberg@tu-ilmenau.de Ilmenau University of Technology Germany M. Rossberg - Attack-Resistant Distributed Time Synchronization for Virtual Private Networks 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend