Patrick P. C. Lee, Vishal Misra, Dan Rubenstein

Slides:



Advertisements
Similar presentations
Capacity of wireless ad-hoc networks By Kumar Manvendra October 31,2002.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
The strength of routing Schemes. Main issues Eliminating the buzz: Are there real differences between forwarding schemes: OSPF vs. MPLS? Can we quantify.
MPTCP is not Pareto- Optimal Performance Issues and a possible solution B 吳昇峰.
布林代數的應用--- 全及項(最小項)和全或項(最大項)展開式
Distributed Algorithms for Secure Multipath Routing
全球化環境下的組織管理 本章內容 全球化的趨勢 國際化的階段 國際企業母公司對分支機構的管理取向 國際企業組織的結構設計 Chapter 6
1 Secure Context-sensitive Authorization 2005 Author : Kazuhiro Minami, David Kotz Presented by Shih Yu Chen.
JAVA 程式設計與資料結構 第十四章 Linked List. Introduction Linked List 的結構就是將物件排成一列, 有點像是 Array ,但是我們卻無法直接經 由 index 得到其中的物件 在 Linked List 中,每一個點我們稱之為 node ,第一個 node.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
教學卓越計畫- 卓越線上英語自學中心 日用會話成果報告 By Paul & Christine. 大綱 1. 方法 方法 2. 成果 成果 3. 範例 範例 4. 對學生的建議 對學生的建議.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
: Problem A : MiniMice ★★★★☆ 題組: Contest Archive with Online Judge 題號: 11411: Problem A : MiniMice 解題者:李重儀 解題日期: 2008 年 9 月 3 日 題意:簡單的說,題目中每一隻老鼠有一個編號.
短缺,盈餘與均衡. 遊戲規則  老師想出售一些學生喜歡的小食。  老師首先講出價錢,有興趣買的請舉手。
: Multisets and Sequences ★★★★☆ 題組: Problem Set Archive with Online Judge 題號: 11023: Multisets and Sequences 解題者:葉貫中 解題日期: 2007 年 4 月 24 日 題意:在這個題目中,我們要定義.
In Chapter 1 您將學到什麼 ? 了解 Java 語言的特徵 Java 程式的發展過程關係 Java 程式的基本架構.
Teacher : Ing-Jer Huang TA : Chien-Hung Chen 2015/6/25 Course Embedded Systems : Principles and Implementations Weekly Preview Question CH 2.4~CH 2.6 &
: Expect the Expected ★★★★☆ 題組: Contest Archive with Online Judge 題號: 11427: Expect the Expected 解題者:李重儀 解題日期: 2008 年 9 月 21 日 題意:玩一種遊戲 (a game.
Toward Optimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed Network Analysis (DNA) Lab.
:Commandos ★★★☆☆ 題組: Contest Archive with Online Judge 題號: 11463: Commandos 解題者:李重儀 解題日期: 2008 年 8 月 11 日 題意: 題目會給你一個敵營區內總共的建築物數,以及建築物 之間可以互通的路有哪些,並給你起點的建築物和終點.
: SAM I AM ★★★★☆ 題組: Contest Archive with Online Judge 題號: 11419: SAM I AM 解題者:李重儀 解題日期: 2008 年 9 月 11 日 題意: 簡單的說,就是一個長方形的廟裡面有敵人,然 後可以橫的方向開砲或縱向開砲,每次開砲可以.
: Finding Paths in Grid ★★★★☆ 題組: Contest Archive with Online Judge 題號: 11486: Finding Paths in Grid 解題者:李重儀 解題日期: 2008 年 10 月 14 日 題意:給一個 7 個 column.
:Problem E.Stone Game ★★★☆☆ 題組: Problem Set Archive with Online Judge 題號: 10165: Problem E.Stone Game 解題者:李濟宇 解題日期: 2006 年 3 月 26 日 題意: Jack 與 Jim.
當代華人社會 中國科技大學 當代華人社會課題學習檔 視覺傳達設計系 班別:三 A 學號: 姓名:馮志成 指導老師:包淳亮.
密碼學與網路安全 第7章 對稱式的機密性.
Priority I : A National Cyberspace Security Response System 第一要務:國家網路安全回應系統 資管研一張永昌.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Presented by: Randeep Singh Gakhal CMPT 886, July 2004.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid, et. al. IEEE INFOCOM 2001.
Steady and Fair Rate Allocation for Rechargeable Sensors in Perpetual Sensor Networks Zizhan Zheng Authors: Kai-Wei Fan, Zizhan Zheng and Prasun Sinha.
On the Construction of Data Aggregation Tree with Minimum Energy Cost in Wireless Sensor Networks: NP-Completeness and Approximation Algorithms National.
Interconnect Performance Modeling. Performance modeling Given an interconnect topology, routing, and other parameters, predict the interconnect performance.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
SYSTEM RELIABILITY OPTIMIZATION CONSIDERING UNCERTAINTY: MINIMIZATION OF THE COEFFICIENT OF VARIATION FOR SERIES- PARALLEL SYSTEMS Hatice Tekiner-Mogulkoc,
Optimal Base Station Selection for Anycast Routing in Wireless Sensor Networks 指導教授 : 黃培壝 & 黃鈴玲 學生 : 李京釜.
Optimization Flow Control—I: Basic Algorithm and Convergence Present : Li-der.
Growth Codes: Maximizing Sensor Network Data Persistence abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein Columbia University, Google Inc. (SIGSOMM’06)
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
QoS Routing in Networks with Inaccurate Information: Theory and Algorithms Roch A. Guerin and Ariel Orda Presented by: Tiewei Wang Jun Chen July 10, 2000.
1 Flow and Congestion Control for Reliable Multicast Communication In Wide-Area Networks A Doctoral Dissertation By Supratik Bhattacharyya.
Secure In-Network Aggregation for Wireless Sensor Networks
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Maximization of System Lifetime for Data-Centric Wireless Sensor Networks 指導教授:林永松 博士 具資料集縮能力無線感測網路 系統生命週期之最大化 研究生:郭文政 國立臺灣大學資訊管理學研究所碩士論文審查 民國 95 年 7 月.
LOGO A Cross-Layer Optimization Mechanism for Multimedia Traffic over IEEE Networks 指導老師:童曉儒 教授 報告學生:許益晨.
Resource Allocation Policy to Avoid Interference between Cellular and D2D Links/ and D2D Links in Mobile Networks 報告人:王姿穎 學號:MA4G0202.
GEOCASTING IN MOBILE AD HOC NETWORKS LOCATION- BASED MULTICAST ALGORITHMS 指導教授:許子衡 教授 學生:翁偉傑 1 Young-Bae Ko and Nitin H. Vaidya Department of Computer.
論文進度報告 Advisor: Professor Frank Y.S. Lin Presented by G.W. Chen 陳冠瑋.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Placing Relay Nodes for Intra-Domain Path Diversity Meeyoung Cha Sue Moon Chong-Dae Park Aman Shaikh Proc. of IEEE INFOCOM 2006 Speaker 游鎮鴻.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
The Design and Implementation of a Wireless Healthcare Application for WSN- enabled IMS Environments Author: El Barachi, M.; Alfandi, O. Source: IEEE Consumer.
Puzzle You have 2 glass marbles Building with 100 floors
Impact of Interference on Multi-hop Wireless Network Performance
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Data Center Network Architectures
Presented by Tae-Seok Kim
ECE 544: Traffic engineering (supplement)
A Study of Group-Tree Matching in Large Scale Group Communications
Advisor :Wei-Yeh Chen Student :楊 于 世
Multi-Core Parallel Routing
Frank Yeong-Sung Lin (林永松) Information Management Department
A New Multipath Routing Protocol for Ad Hoc Wireless Networks
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Instructor: Shengyu Zhang
Distributed Channel Assignment in Multi-Radio Mesh Networks
L12. Network optimization
TCP in Wireless Ad-hoc Networks
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Frank Yeong-Sung Lin (林永松) Information Management Department
National Cheng Kung University
Presentation transcript:

Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks Patrick P. C. Lee, Vishal Misra, Dan Rubenstein 授課教授:林永松教授 學生:D96725006 陳霈語    R95725004 楊琇珊    R95725016 王貝瑜

Outline Motivation: Security objectives Distributed algorithms: Why do we use multipath routing to achieve security? Security objectives Distributed algorithms: Bound-Control algorithm Lex-Control algorithm Simulation results

Motivation Problem of single-path routing: source sink An attack/failure shuts down the entire session.

Motivation Protection with multipath routing: source sink An attack/failure causes less damage.

Goals Determine the multipath routes that achieve the “best” security: Minimize the worst-case data loss with/without bandwidth constraints Minimize “severe” data loss with/without bandwidth constraints based on lexicographic optimization Implement a distributed solution: No need to know the global network topology Allow nodes to locally decide link costs Suitable for independently administered networks (e.g., RON)

Previous Work Lexicographic optimization: Minimize a non-increasing link-cost sequence a = (a1, a2, …, an) Find a*, where a* = (a1*, a2*, …, an*) ≤ a = (a1, a2, …, an) for every link-cost sequence a Georgiadis et al.’s solution [ToN ’02]: Recursively solve minimax problems on subgraphs Limitations: Centralized solution Does not consider varied bandwidth constraints

Our Work Develop two distributed algorithms Bound-Control and Lex-Control: Support fixed-rate model and maximal-rate model Fixed rate: a data session sends data at a fixed rate Maximal rate: a data session sends data at the maximal rate across all network links (i.e., equiv. to min-cut) Suitable for overlay networks and ad hoc networks Prove their optimality in response to single-link attacks. Evaluate the algorithms via simulations in response to single-link and multi-link attacks.

Model Assumptions Static network topology Single source-sink pair Easily generalized to networks with multiple customers/providers Infrequent link attacks/failures Optimize solutions for single-link attacks Evaluate performance for both single-link and multi-link attacks

How to Quantify the Cost of a Single-link Attack? Attack cost of link l: al = xl * cl xl – proportion of session data allocated to link l cl - security constant Measure the vulnerability of link l to an attack Possible physical interpretations: Attack success probability Proportion of xl lost during an attack In practice, security constants can be obtained from security monitoring systems or statistical measurements

Example of Setting Security Constants More vulnerable to attacks (e.g., cl = 0.9) Wireless link sink source Wired link Less vulnerable to attacks (e.g., cl = 0.1) In subsequent discussion of objectives, assume cl = 1 for all links, i.e., attack cost = data loss.

One possible data allocation. Objective 1 One possible data allocation. 5 5 Fixed data rate 10Mb/s 5 source sink 5 5 5 Minimize the worst-case data loss under the single-link attack

Another possible data allocation. Objective 1 Another possible data allocation. Fixed data rate 10Mb/s 5 5 5 5 source 5 sink 5

Another possible data allocation. Objective 1 Another possible data allocation. 5 5 Fixed data rate 10Mb/s 5 5 source 5 sink 5 Worst-case data loss cannot be less than 50%

Bandwidth-limited link Objective 2 6 6 Fixed data rate 10Mb/s 6 source sink Bandwidth-limited link (Only 4Mb/s allowed) 4 4 4 Minimize the worst-case data loss subject to bandwidth constraints

Lexicographic Optimization Objective 3 Lexicographic Optimization (6, 6, 6, 4, 4, 4, 0, 0, 0, 0)  (6, 4, 3, 3, 3, 3, 2, 2, 2, 2) 2 sink 3 source 4 6 sink 6 4 source Fixed data rate 10Mb/s Bandwidth-limited link (Only 4Mbs allowed) Minimize the ith worst-case data loss subject to bandwidth constraints, given already minimized attack costs for the worst-case, 2nd worst-case,…, (i-1)th worst-case.

Solving Objective 1: Preflow-Push Map minimax problem to max-flow problem Preflow-push algorithm [Goldberg & Tarjan, 89]: Nodes find the maximum flow from source to sink in a distributed fashion. Basic idea of solving Objective 1 [Ahuja, 86]: Each node sets capacity constraints of its outgoing links: cap(l) = 1/cl Nodes solve max-flow problem under capacity constraints in a distributed fashion. Each node allocates data for its outgoing links: (link flow) / (max flow).

Solving Objective 2: Bound-Control Bandwidth constraint: fraction bound bl bl = (bandwidth of link l) / (session data rate) Capacity constraint: cap(l) = min(1/cl, bl*f) f = flow reaching the sink Upper bound in max-flow problem Basic idea of solving Objective 2: Repeat Distributed execution of Preflow-Push Each node adjusts capacity constraints for its outgoing links Until capacity constraints satisfied

Solving Objective 3: Lex-Control Basic idea – solve lexicographic optimization: Repeat Distributed execution of Bound-Control Each node identifies critical links among its outgoing links Until all critical links spotted Critical Links Links whose data allocation has to be fixed to preserve the optimal attack cost The network will then constitute a set of critical links, defined as the links whose attack costs cannot be further decreased without increasing . In practice, Lex-Control provides the necessary resilience in 3 or 4 lexicographic iterations. Lexicographic iteration

Recap of Algorithms Lex-Control algorithm Bound-Control algorithm Preflow-Push algorithm Hierarchical solution to the three security objectives

Experimental Setup Consider three random networks generated by BRITE: 200 nodes, 600 links 200 nodes, 800 links 200 nodes, 1000 links Randomly assign security constants (0 to 1) and bandwidths (1 to 5 Mb/s) for all links Metrics: Attack cost represents the actual proportion of data loss for the data session Number of executions of Preflow-push Routing overhead The total number of routing packets transmitted during the simulation. Routing overhead: The total number of routing packets transmitted during the simulation.

Experiment 1 – Bound-Control Minimized worst-case attack cost vs. different session throughputs

Experiment 1 – Bound-Control Number of executions of the Preflow-Push algorithm

Experiment 1 – Bound-Control Routing overhead

Experiment 1 – Bound-Control Network setting Attack cost 200 nodes, 600 links 0.73 200 nodes, 800 links 0.72 200 nodes, 1000 links 0.78 Single shortest path approach Network setting Attack cost 200 nodes, 600 links 0.34 200 nodes, 800 links 0.19 200 nodes, 1000 links 0.16 Bound-Control (for maximal-rate model) Bound-Control reduces the worst-case attack cost by 50-70%.

Experiment 2 – Lex-Control Number of links with severe attack cost vs. number of lexicographic iterations. Attack cost is severe if it’s at least 25% of the worst-case attack cost. E.g., for the attack-cost sequence (1, 0.5, 0.25, 0.1, 0.1), number of links with severe attack cost is 3.

Experiment 3 Lex-Control algorithm subject to different scales of uniform link attacks.

Experiment 4 Lex-Control algorithm subject to the proportional and worst-case multi-link attacks 同時能reduce 兩種情況的 attack cost,按attack cost比例攻擊 / 只攻擊highest attack cost (worst-case)

Summary of Experiments Bound-Control vs. Single-Path Routing: Reduce the worst-case attack cost by 50-70% Lex-Control vs. Bound-Control Reduce # of links with severe attack costs by ~50% Reduce aggregate attack cost in multi-link attacks: by ~40% in the uniform 50-link attack by ~23% in the proportional 5-link attack by ~12% in the worst-case 5-link attack 3 or 4 lexicographic iterations are enough severe attack costs (e.g., the second and third worst-case link attacks)

Attack-resistant network a specialized network that protects end hosts by surrounding them with a defensive architecture Example SOS (Secure Overlay Services) Two crucial but contradicting criteria (1) resiliency: the network should offer alternate paths in the face of node failures (2) security: the network should confine the damage caused by compromised nodes. To evaluate their trade-off via simulation 重疊網路(Overlay Network)係指利用Proxy 等技術,將某應用伺服器多點散布在廣大的 網路中,以達到增進網路安全之目的。在攻擊發生時,可以立刻有效的針對分散的攻擊加以阻擋來保 護伺服器。 SOS(Secure Overlay Services) 同樣使用 Overlay Network 技術來防禦。而 SOS 架構簡單 來說就是 Overlay 和 Filter。使用 Overlay 來隱藏行蹤並且用 Filter 來過濾攻擊封包。 以上兩個criteria雖然重要,但兩者相互抵觸,有trade-off關係。以simulation來取得兩者平衡

Example of an attack-resistant network

Conclusions In this talk: More details in the paper: Proposed two distributed algorithms Bound-Control and Lex-Control that optimize respective security objectives. Illustrated performance of Bound-Control and Lex-Control via simulation analysis. More details in the paper: Simulation results for multi-link attacks