Revere—Disseminating Security Updates at Internet Scale

Slides:



Advertisements
Similar presentations
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Advertisements

Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
(4.4) Internet Protocols Layered approach to Internet Software 1.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Securing Information Transmission by Redundancy Jun LiPeter ReiherGerald Popek Computer Science Department UCLA NISS Conference October 21, 1999.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
An Approach to Measuring Large-Scale Distributed Systems Jun Li, Peter Reiher, Gerald Popek, and Mark Yarvis UCLA Geoffrey H. Kuenning Harvey Mudd College.
Security Alert Systems May 21st, 2003 cs239-1 Martin Lukac.
Wide-area cooperative storage with CFS
Dissemination of Security Updates Jun Li Dissertation Proposal.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
ON DESIGING END-USER MULTICAST FOR MULTIPLE VIDEO SOURCES Y.Nakamura, H.Yamaguchi, A.Hiromori, K.Yasumoto †, T.Higashino and K.Taniguchi Osaka University.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Overcast: Reliable Multicasting with an Overlay Network Paper authors: Jannotti, Gifford, Johnson, Kaashoek, O’Toole Jr. Slides by Chris Johnstone.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
A Key Management Scheme for Distributed Sensor Networks Laurent Eschaenauer and Virgil D. Gligor.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
William Stallings Data and Computer Communications
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Chapter 40 Internet Security.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Lab A: Planning an Installation
Introduction Wireless devices offering IP connectivity
Grid Computing Security Mechanisms: the state-of-the-art
Data Management on Opportunistic Grids
Dynamic Routing Protocols part2
CONNECTING TO THE INTERNET
Ad-hoc Networks.
Chapter 18 IP Security  IP Security (IPSec)
Scaling the Network: The Internet Protocol
CS4470 Computer Networking Protocols
Cryptography and Network Security
Packet Leashes: Defense Against Wormhole Attacks
Process-to-Process Delivery, TCP and UDP protocols
Chapter 4: Network Layer
PART 5 Transport Layer Computer Networks.
Chapter 6: Transport Layer (Part I)
Internet Networking recitation #12
CSE 4340/5349 Mobile Systems Engineering
Routing.
CONGESTION CONTROL.
Host Multicast: A Framework for Delivering Multicast to End Users
Transport Layer Unit 5.
Dynamic Routing Protocols part2
Subject Name: Computer Communication Networks Subject Code: 10EC71
Overlay Networking Overview.
Computer networking In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network.
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Data and Computer Communications
Security.
Distributed Systems CS
Scaling the Network: The Internet Protocol
Dynamic Replica Placement for Scalable Content Delivery
was not invented by Al Gore…
EE 122: Lecture 22 (Overlay Networks)
Routing and the Network Layer (ref: Interconnections by Perlman
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Operating System Concepts
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Routing.
Design and Implementation of OverLay Multicast Tree Protocol
Distributed Systems CS
Presentation transcript:

Revere—Disseminating Security Updates at Internet Scale Revere--Delivering Security Updates at Internet Scale Revere—Disseminating Security Updates at Internet Scale Jun Li Computer Science Department Laboratory for Advanced Systems Research University of California, Los Angeles Advisors: Peter Reiher and Gerald Popek

Motivation Threats propagate quickly through the Internet Viruses, worms, Trojan horses, etc. e.g., Code Red worm Jul 19 6:00 AM Jul 19 12:00 PM Jul 19 6:00 PM Times given are EDT ( GMT –4:00 ) http://www.cert.org/advisories/CA-2001-23.html Source incident data for CERT # 36881 # of Unique IP Addresses (cumulative) IP Addresses Compromised by the “CodeRed” Worm (data for July 19, 2001 as reported to the CERT/CC) 300000 250000 200000 150000 100000 50000 Critical security info throughout the Internet is often stale Victims lack up-to-date knowledge of new threats We must react at the same speed introduction RBone dissemination security measurement conclusions

Goal of Revere To disseminate security updates throughout the Internet quickly, securely, and with high assurance Early-warning signal Virus signature Intrusion detection event Certificate revocation list Offending characteristics recorded at firewall Security patches . . . . . . introduction RBone dissemination security measurement conclusions

Challenges Fast Secure Resilient Scalable Must not be slower than the propagation of threats Secure Revere is a tempting target for attackers A corrupted Revere can be misused or abused Resilient Interruption threats by compromised nodes, or any kind of failure Cryptography does not assure delivery Authenticated acknowledgements are insufficient Scalable Any Internet host is a potential recipient Node disconnection will be common introduction RBone dissemination security measurement conclusions

Simple Transmission Techniques Unicasting Broadcasting Flooding IP multicasting network network network X introduction RBone dissemination security measurement conclusions

Virus Signature Distribution Let users download from a website Set up a central server A naïve peer-to-peer approach introduction RBone dissemination security measurement conclusions

A Government Practice Typically, a Federal Computer Incident Response Capability team e-mails alerts to agencies But when facing the “I Love You” virus, many agencies shut down their email servers Thus, phoned and faxed alerts instead, one at a time What a time-consuming tedious procedure ! Afterwards . . . A completely automated new system is designed that claims to handle 96 phone lines and deliver 800 faxes/hour They also look into an AM radio system for federal employees to check every morning Diane Frank. “One if by phone, two if by fax,” Federal Computer Week, September 2000 introduction RBone dissemination security measurement conclusions

So, How Would Revere Meet the Challenges? Revere--Delivering Security Updates at Internet Scale So, How Would Revere Meet the Challenges? Non-centralized delivery structure Use redundancy to support information transmission resiliency Secure both the dissemination procedure and the delivery structure A picture of dynamic RBone A picture of multiple parents introduction RBone dissemination security measurement conclusions

The Revere Solution Revere builds overlay networks, called RBones, on top of the Internet . . . . and uses RBone to deliver security updates Every node can also forward updates Disconnected nodes will be handled Runs at application level Great flexibility No changes to underlying network infrastructure Implemented in Java Deployment is easy Hardware layer Application layer introduction RBone dissemination security measurement conclusions

RBone: A Self-Organized Resilient Overlay Network Revere--Delivering Security Updates at Internet Scale RBone: A Self-Organized Resilient Overlay Network Redundancy-based resiliency Multiple delivery paths Therefore multiple parents Select as-disjoint-as-possible paths Self-organized overlay Easy join Easy withdrawal Broken nodes Broken links X A picture of dynamic RBone A picture of multiple parents introduction RBone dissemination security measurement conclusions

Revere--Delivering Security Updates at Internet Scale RBone Join Procedure Search for existing nodes Directory service Multicast-based expanding-ring or expanding-wheel search Contact already-known existing nodes Negotiate to select best parents Again, multiple parents are allowed! Three-way-handshake negotiation protocol Reciprocal selection Locate existing nodes Process attach request Select parents Attach new child Potential child Potential parent New child New parent req ack confirm The picture on three-way handshake join procedure introduction RBone dissemination security measurement conclusions

Revere--Delivering Security Updates at Internet Scale Parent Selection What parental qualities matter? Efficiency: is the delivery via this parent fast? Resiliency: is the delivery via this parent disjoint with other paths? If not completely disjoint, how much is the overlap? 1 2 Path vector picture Pseudo-code x 3 4 5 introduction RBone dissemination security measurement conclusions

Parent Selection (cont’d) The path vector of a node Describes the fastest path: Latency An ordered list of nodes to cross Denoted as pv(n) The path vector associated with a parent Described the fastest path through the parent Denoted as pv(n, p) The resiliency level of a node’s parent Calculated by comparing the path vector associated with the parent and the path vector of the node introduction RBone dissemination security measurement conclusions

Path-Vector-Based Parent Selection Algorithm Suppose node c is deciding a potential parent x if (c has not reached the maximum number of parents) select x; else if pv(c,x) is faster than pv(c) else if resiliency(x) better than resiliency(a current parent) else do not select x;

RBone Maintenance Heartbeat messages Explicit messages To verify node liveness To update path info associated with every parent Carry timestamps Deal with the broken parent, or any broken node on a path Explicit messages To tear down a parent-child relationship Corrupted security updates also trigger adjustment introduction RBone dissemination security measurement conclusions

RBone with Multiple Dissemination Centers Revere--Delivering Security Updates at Internet Scale RBone with Multiple Dissemination Centers If a node wants to hear from multiple centers it joins multiple RBones, each rooted at a different center this becomes undesirable if too many centers Build a common RBone rooted at a rendezvous Every center delivers updates to the rendezvous A picture of dynamic RBone A picture of multiple parents Multiple rendezvous points can be set up introduction RBone dissemination security measurement conclusions

Dissemination Procedure A dual mechanism Pushing as the main method for broadcasting security updates from a dissemination center Pulling as the supplementary method for catching up with missed security updates Security update format seqno timestamp payload signature type introduction RBone dissemination security measurement conclusions

Pushing Security Updates Revere--Delivering Security Updates at Internet Scale Pushing Security Updates Adaptive transmission TCP UDP IP multicast etc. Duplicate checking Every Revere node remembers the range of historical sequence numbers Security checking (Will be addressed later) Picture (input jobs, output jobs, security update window) introduction RBone dissemination security measurement conclusions

Pulling Security Updates By the time a disconnected node reconnects, it may have missed some security updates Parents do not keep old updates Parents might no longer be parents Retransmission by the dissemination center is not scalable Repository servers Nodes that keep old security updates Usually maintain stable connection Clients directly contact those servers A newly pulled security update is also forwarded to child nodes, if any introduction RBone dissemination security measurement conclusions

Security Assumptions Center’s public key is wellknown Large percentage of nodes are cooperative Any node could be corrupted The center cannot be corrupted, but its private key could be compromised No uniform security scheme to protect node-to-node control messages For example, some nodes may run the Kerberos service to authenticate other nodes, some may employ public-key-based authentication introduction RBone dissemination security measurement conclusions

Securing the Dissemination Process Integrity of security updates A dissemination center has a public/private key pair Every security update carries a digital signature signed by the center Availability of security updates Redundant delivery private public introduction RBone dissemination security measurement conclusions

Center Key Disclosure Disastrous if the private key of a center is disclosed The public key must be invalidated Public key invalidation Send a key invalidation message Signed with the disclosed private key Delivered in the same way as updates Every recipient verifies the message with the current public key Then discards this public key And switches to the new public key How secure is this method? Fine, if an attacker also distributes key invalidation messages Resilient, since it follows the same routes as normal security updates public private private public X X X X X introduction RBone dissemination security measurement conclusions

Securing RBone Every node can enforce several different security schemes Node authentication Message filtering Etc. . . . The functionality of a specific security scheme can be easily plugged in Node-to-node communication is initiated with security scheme negotiation introduction RBone dissemination security measurement conclusions

Metrics   RBone maintenance bandwidth Dissemination bandwidth Join bandwidth Join latency Dissemination latency Dissemination resiliency  introduction RBone dissemination security measurement conclusions

What’s the challenge ? Revere is a large-scale distributed system Empirical experiments incur prohibitive cost Required to obtain, access, configure, maintain, and collect results from more than a few hundred machines Simulation is more scalable, but Expensive to develop Slow to run Possibly inaccurate (hidden costs and subtle timing effects) & buggy Must be validated against real system introduction RBone dissemination security measurement conclusions

The “Overloading” Approach Revere--Delivering Security Updates at Internet Scale The “Overloading” Approach A physical machine is overloaded with multiple (virtual) Revere nodes Each Revere node runs the real software Achieves larger scalability using multiple machines 1 3 Figure 2 Jun Li, Peter Reiher, Gerald Popek, Mark Yarvis, and Geoffrey Kuenning. “An approach to measuring large-scale distributed systems,” TestCom 2002, Berlin, Germany, March 2002. introduction RBone dissemination security measurement conclusions

Measurement Environment A testbed of 10 machines Overloaded with up to 3,000 Revere nodes Topology GT-ITM topology generator A topology server for node assignment Configuration Every node must have 2 parents, but  10 children introduction RBone dissemination security measurement conclusions

Join Performance Join phase Token-controlled resource-locking mechanism One-at-a-time join No contention because of serialization introduction RBone dissemination security measurement conclusions

Join Performance Outbound join bandwidth per node (KB) Join latency per node (sec) introduction RBone dissemination security measurement conclusions

Dissemination Speed Measured in dissemination phase Dissemination Latency = kernel-crossing latency + processing latency + communication latency Measured using divide-and-conquer method Measure each subtask in non-overloaded environments Measure hop counts in full system, and then sum introduction RBone dissemination security measurement conclusions

Dissemination Speed (cont’d) Average and maximum hop count per node Average and maximum latency to reach a node (sec) hops Number of total Revere nodes introduction RBone dissemination security measurement conclusions

The latency to reach a certain percentage of nodes (sec) Dissemination Speed (cont’d) The latency to reach a certain percentage of nodes (sec) Assuming the trends continue at higher scale, then in a 100M-node RBone: average hop counts: 12 maximum hop counts: 30 average latency: 1.10s latency to reach 2/3: 1.34s latency to reach 90%: 1.88s latency to reach 99%: 2.25s latency to reach all: 3.83s hops Number of total Revere nodes Trends: [99%] y=0.156ln(x)-0.628 (R2=0.881) [90%] y=0.136ln(x)-0.629 (R2=0.913) [ 2/3 ] y=0.098ln(x)-0.463 (R2=0.914) introduction RBone dissemination security measurement conclusions

Dissemination Resiliency Resiliency test phase Every node assigned a uniform probability of failure Measured a 3000-node RBone with maintenance disabled Results: All reachable with less than 2% failure probability Still very resilient with higher failure probability Time (sec) (total nodes = 3000) Time (sec) (total nodes = 3000) introduction RBone dissemination security measurement conclusions

Some Related Work RON – resilient overlay network Inserts an overlay network layer between routing and application Allows faster routing failure recovery & application-specific routing Other overlay networks Tree-structured dissemination is not resilient Nodes are not always connected at delivery time Security handling is not sufficient Multi-path routing A router-level implementation Primarily for load balancing or congestion control Must handle security issues at router level Replay prevention, key distribution . . . Deployment is challenging introduction RBone dissemination security measurement conclusions

Work Summary of Revere Project Designed The structure, the dissemination, the security, the . . . Implemented 45,010 lines of Java code in the prototype system Measured The number of nodes varies from 250 to 3,000 Demonstrated DARPA Site Visit UCLA Annual Research Review Published and presented NSPW’99, NISSC’99, Testcom’02 Also submitted to OSDI’02 Dissertation draft is at your hand introduction RBone dissemination security measurement conclusions

Conclusions Necessary work: Since attackers already distribute malicious functions rapidly, an even faster notification system is required. Encouraging results: It is feasible to disseminate security updates to much of today’s connected Internet quickly, securely, and with high assurance. Broad applicability: Revere is not limited to only security updates. introduction RBone dissemination security measurement conclusions

The End