Inference Integrity in Wireless Networks

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Advertisements

Cooperative Transmit Power Estimation under Wireless Fading Murtaza Zafer (IBM US), Bongjun Ko (IBM US), Ivan W. Ho (Imperial College, UK) and Chatschik.
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
1 EL736 Communications Networks II: Design and Algorithms Class3: Network Design Modeling Yong Liu 09/19/2007.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Distributed Algorithms for Secure Multipath Routing
1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Package Transportation Scheduling Albert Lee Robert Z. Lee.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
1 Controlling IP Spoofing via Inter-Domain Packet Filters Zhenhai Duan Department of Computer Science Florida State University.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
Some questions about multipath Damon Wischik, UCL Trilogy UCL.
Secure In-Network Aggregation for Wireless Sensor Networks
1 - CS7701 – Fall 2004 Review of: Detecting Network Intrusions via Sampling: A Game Theoretic Approach Paper by: – Murali Kodialam (Bell Labs) – T.V. Lakshman.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
1 Chapter 6 Reformulation-Linearization Technique and Applications.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Puzzle You have 2 glass marbles Building with 100 floors
William Stallings Data and Computer Communications
Impact of Interference on Multi-hop Wireless Network Performance
Xin Liu Department of Computer Science Univ. of California, Davis
Delay-Tolerant Networks (DTNs)
Constraint-Based Routing
Presented by Tae-Seok Kim
Group Multicast Capacity in Large Scale Wireless Networks
Introduction to Wireless Sensor Networks
Computing and Compressive Sensing in Wireless Sensor Networks
Packet Leashes: Defense Against Wormhole Attacks
A Study of Group-Tree Matching in Large Scale Group Communications
The minimum cost flow problem
MinJi Kim, Muriel Médard, João Barros
DTMC Applications Ranking Web Pages & Slotted ALOHA
An Equal-Opportunity-Loss MPLS-Based Network Design Model
Routing in Wireless Ad Hoc Networks by Analogy to Electrostatic Theory
ISP and Egress Path Selection for Multihomed Networks
Multi-Core Parallel Routing
Hidden Terminal Decoding and Mesh Network Capacity
A stability-oriented approach to improving BGP convergence
How They Interact? Understanding Cyber and Physical Interactions against Fault Propagation in Smart Grid Zhuo Lu, University Of South Florida Mingkui Wei,
Network Optimization Research Laboratory
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Integer Programming (정수계획법)
Totally Disjoint Multipath Routing in Multihop Wireless Networks Sonia Waharte and Raoef Boutaba Presented by: Anthony Calce.
Kevin Lee & Adam Piechowicz 10/10/2009
L12. Network optimization
Data and Computer Communications
Networked Real-Time Systems: Routing and Scheduling
Yiannis Andreopoulos et al. IEEE JSAC’06 November 2006
Capacity of Ad Hoc Networks
Distributed Systems CS
Taehyun Kim and Mostafa H. Ammar
Advisor: Yeong-Sung, Lin, Ph.D. Presented by Yu-Ren, Hsieh
Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Implementing Multicast
Authors: Jinliang Fan and Mostafa H. Ammar
2019/9/14 The Deep Learning Vision for Heterogeneous Network Traffic Control Proposal, Challenges, and Future Perspective Author: Nei Kato, Zubair Md.
Distributed Systems CS
Presentation transcript:

Inference Integrity in Wireless Networks Zhuo Lu, Electrical Engineering / FC2 University of South Florida

Proactive Network Security feasibility efficiency security Traditional security  reactive/passive defense Find the best application domains of being proactive in wireless network designs We take a fundamental approach to quantitatively understand the benefits of being proactive in wireless networks

Case Studies 1. Protecting network flow information against inference attack (network anti-inference) 2. Scapegoating attacks in network tomography

Case I Case I: Protecting network flow information against inference attack (anti-inference)

Multi-hop Wireless Network: Feasible Design Example

Multi-hop Wireless Network: Optimized Design Example

Multi-hop Wireless Network: Security Design Prevent Eavesdropping Data content Connectivity/flow?

Strategy to Protect Connectivity Information Understand attacks How malicious attacks can know the connectivity information, what is the worst-case attack? Analyze potential strategies against attacks Limit the performance cost Measure the security impact

How to Know Connectivity Info Network inference Sensing the wireless transmission Extracting who it transmitting to whom at low layers Building a relationship between link and flow information. Then, inferring flow info from link info. Applications: fault diagnose, network monitoring, flow detection, … can also be used for malicious purpose.

Inference: Problem Formulation Flow inference formulation: y = Ax y – link rate vector: observed by attackers x – flow rate vector: to be estimated A – routing matrix: known network info Given A and y, estimate x Usually an under-determined system So no least squares solution!

How to Get Routing Matrix A Example:

Example Observing link transmissions (knowing y) 11 nodes, 2 flows, y=Ax  get x from y. Inference Result: AH: 100kbps, BH: 50kbps

How to Beat Inference Attack? Two underlying assumptions for inference Link traffic is only induced by network flows No flow  no link traffic Routing is usually predictable E.g., shortest path routing. To break at least one of these assumptions, we have to be proactive!

Deception/Honey Traffic Link traffic is only induced by network flows No flow  no link traffic Every node randomly transmits some redundant traffic All nodes transmit some redundant traffic in a coordinated way Deception Traffic Strategy (Proactive)

E.g., shortest path routing. Routing Changing Routing is usually predictable E.g., shortest path routing. Dynamically change routing paths to make sure the attacker has some information mismatch Routing Changing Strategy (Proactive)

Fundamental Problem Yes, we may confuse the attacks from properly inferring the connectivity information But …… Deception traffic Routing changing security efficiency

Research Goals How proactive strategies improve security at a limited cost of efficiency? Improve security Limit the cost of efficiency

Formulation under Proactive Strategies Original formulation: y = Ax Deception Traffic: Add noise: y = Ax + J ( deception traffic vector) Routing Changing: Information mismatch: changing routing means routing matrix A  B ( new routing matrix)

Metric to Measure Security Benefit Metrics to measure the accuracy of network inference? Genie bound: lower bound of error in all possible methods. Assuming the attacker knows who is transmitting, Then using minimum mean squared error estimation to estimate all the flow rates. Error of inference … … Method 1 Method 2 Genie bound

Genie Bound We want to see how much the genie bound can be increased due to deception traffic and routing changing with limited costs. Error of inference Genie bound under proactive defense Genie bound

Limit the Costs Routing Changing: A  B Deception Traffic: y = Ax + J |J|/n, or E|J|/n (average deception traffic per node) is smaller than a constant, where n is the number of nodes in the network. Routing Changing: A  B We have a random geometric graph model, all nodes are randomly distributed. A and B are random matrices. How to model the routing changing ??

Routing Modeling (from Scaling Law) Model: Under any routing strategy, the average number of hops between any source-destination pair is denoted by a function g(n) satisfying g(n) = O(n), where n is the number of nodes in the network Existing K-shortest path routing satisfies this model.

Routing Modeling (cont’d) Quantifying the cost of routing changing: The original routing changing: g(n) The new routing changing: h(n) The cost is h(n)/g(n), where n is the number of nodes in the network. Limit the cost: Θ(h(n)/g(n)) = Θ(1),

Theoretical Result: An Example In a network with n nodes, Θ(n) random network flows/connectivities.

Case II: Scapegoating Attacks in Network Tomography (in both wireline and wireless scenarios)

Move to Network Tomography Motivation: If we can’t see what’s going on in a network directly, how to measure the network performance? Brain Tomography Direct access is difficult

Move to Network Tomography Motivation: If we can’t see what’s going on in a network directly, how to measure the network performance? Network Tomography Direct access is difficult

Move to Network Tomography Definition: Study internal characteristics (e.g. link delay) of the network from external measurements (e.g. path delay). infer the link performance from end-to-end path measurements. Applications: discovering in a network Link failures Node failures Performance bottleneck Potential security attacks

Basics in Network Tomography Why we can infer internals via externals Delay example: Nodes 0, 1, 2, 3 End-nodes: 0, 2, 3 We can only perform measurements between these end nodes. These nodes are called monitors Link delays: x1, x2, x3 End-to-end path delays: y1, y2, y3 Key observation in network tomography There is a relationship between x and y. Objective: Given y, get x. y3 1ms 3ms 2ms

Formulation of Network Tomography ( Network Inference) Given end-to-end measurement 𝒚= 3 4 5 and routing matrix 𝑥 1 𝑥 2 𝑥 3 𝑹= 1 1 0 1 0 1 0 1 1 𝑦 1 𝑦 2 𝑦 3 The relationship is: 𝒚=𝑹𝒙 Solution (linear inverse): given 𝒚 and 𝑹, obtain x, i.e., 𝒙= 𝑹 𝑻 𝑹 −𝟏 𝑹 𝑻 𝒚= 1 2 3 y3 1ms 3ms 2ms

y3 Traditional Attacks Packet dropping attack: Intentionally drop or delay packets routed to the malicious nodes. Black hole attack Grey hole attack Weak Point Very easy to be detected. Find out the links which always suffer bad performance under network tomography. y3 delay all packets!

Security Concerns Current attack models are blind, brute-force Less sophisticated Can an attacker do a better job? Key Assumption in Network Tomography: Seeing is believing Measurements indeed reflect the real performance aggregates over individual links. does not always hold in the presence of a more sophisticated attack !!!

Scapegoating Attack Key Idea: Attackers cooperatively delay or drop packets to manipulate end-to-end measurements such that The network is damaged A legitimate node is incorrectly identified by network tomography as the root cause of the problem (thereby becoming a scapegoate). The tomography can be deceived by attackers !

Intuition: Scapegoating Attack B: Drop !! M1: I can’t reach M2 through A!

Intuition: Scapegoating Attack M1: I can’t reach M3 through A! C: Drop !!

Intuition: Scapegoating Attack M1: I can reach M3 through C! Delivered

Intuition: Scapegoating Attack All packets through A are blocked. All packets do not pass A are delivered. A must have some problems.

Possible Strategies Strategies: Chosen-Victim Attack Victim set is already given. Maximum-Damage Attack Find best victim sets for the maximum damage in the network Obfuscation Make every link look mostly similar without evident outliers.

Possible Strategies: Examples Example of three attacks

Convert Intuition into Formulation Objective: attack the linear inverse solution 𝒙= 𝑹 𝑻 𝑹 −𝟏 𝑹 𝑻 𝒚 Things significantly go wrong after inverse! manipulated measurement Formulation: Definition: wrong or right link state is the performance of link . and are the lower and upper bound. Definition: link set is the victim link set. y3

Measuring the Attack Damage Formulation: Definition of the damage vector: m = y’ - y y’ is the measurements with attack. y is the measurements without attack. If an attacker cannot manipulate a particular path, the entry at m is 0. Attack- manipulatable Attacker cannot manipulate this path!

Example: Formulating Chosen-Victim Chosen-Victim Attack: Damage objective: find a damage vector m with Deceiving objective (added as constraint to the max): link 1 should be the one detected abnormal via the inverse

Example: Formulating Max-Damage Max-Damage Attack: Objective: find a damage vector m with Subject to: The victim(s) look abnormal The attack nodes/links look normal

Example: Formulating Obfuscation Objective: maximize the number of uncertain links

Experimental Evaluation Attack Example Chosen-Victim Attack Link 10 has a very high delay. make it a scapegoat!

Experimental Evaluation Attack Example Maximum-Damage Attack Delay of both link 1 and 9 are high. make it a scapegoat! make it a scapegoat!

Experimental Evaluation Attack Example Obfuscation Delay of all links are similar, making the measurement of the network look very confusing!

Imperfect Cut: Max-Damage and Obfuscation Use the Rocketfuel datasets as topologies for wireline networks. Use random geometric graph to generate wireless network topologies. Even one single attacker is likely to succeed, and maximum-damage attacks are always more likely than chosen-victim attacks.

How to Detect Such Attacks Can we really detect perfect cut? The attackers completely block our view of the victim link!!

How about imperfect cut? We should find inconsistency between attack paths (M1-M2 and M1-M3) and non-attack paths (M1-M4)

Experimental Evaluation Detection evaluation Perfect-cut attack is undetectable. Imperfect one is always detectable

Summary Network inference and tomography were not designed with a security purpose. Inference integrity issues: Methods to disrupt the inference integrity Can be used as a defense against malicious inference Can be used as an attack against legitimate monitoring

Q&A Thank you!