Towards Resilient Networks using Programmable Networking Technologies Linlin Xie, Paul Smith, Mark Banfield, Helmut Leopold, James Sterbenz and David Hutchison.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Towards Autonomic Adaptive Scaling of General Purpose Virtual Worlds Deploying a large-scale OpenSim grid using OpenStack cloud infrastructure and Chef.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Suphakit Awiphan, Takeshi Muto, Yu Wang, Zhou Su, Jiro Katto
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
High speed links, distributed services, can’t modify routers  Lack of visibility But, need for more visibility and control  Increased number and complexity.
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
Traffic Engineering With Traditional IP Routing Protocols
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
December 20, 2004MPLS: TE and Restoration1 MPLS: Traffic Engineering and Restoration Routing Zartash Afzal Uzmi Computer Science and Engineering Lahore.
MPLS and Traffic Engineering
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
1 Action Breakout Session Anil, AP, Nina Bhatti, Charles Berdnall, Joe Hellerstein, Wei Hu, Anthony Joseph, Randy Katz, Li, Machi Mukund Kimmo Raatikanen,
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Distributed-Dynamic Capacity Contracting: A congestion pricing framework for Diff-Serv Murat Yuksel and Shivkumar Kalyanaraman Rensselaer Polytechnic Institute,
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Stealth Probing: Efficient Data- Plane Security for IP Routing Ioannis Avramopoulos Princeton University Joint work with Jennifer Rexford.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Abstraction and Control of Transport Networks (ACTN) BoF
Mehmet C. Vuran Vehbi C. Gungor Özgür B. Akan School of Electrical & Computer Engineering Georgia Institute of Technology Atlanta, GA {mcvuran,
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
1 Autonomic Computing An Introduction Guenter Kickinger.
Supporting Emergency- Response by Retasking Network Infrastructures Presented by: Michael LeMay Carl A. Gunter.
End-to-end QoE Optimization Through Overlay Network Deployment Bart De Vleeschauwer, Filip De Turck, Bart Dhoedt and Piet Demeester Ghent University -
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Common Devices Used In Computer Networks
Robot Autonomous Perception Model For Internet-Based Intelligent Robotic System By Sriram Sunnam.
Jason Ernst and Mieso Denko
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
Putting Intelligence in Internetworking: an Architecture of Two Level Overlay EE228 Project Anshi Liang Ye Zhou.
Cognitive Radio Networks
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
GridStat on GENI: Simulating a Smart Power Grid Infrastructure over GENI Divya Giri, Ruma Paul, Haiqin Liu, Victor Valgenti, Carl Hauser and Min Sik Kim.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Members Version 03/07 Principal Investigators Prof. David Hutchison Lancaster University Prof. James P. Sterbenz The University of.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
UNIVERSITY OF JYVÄSKYLÄ 2005 Multicast Admission Control in DiffServ Networks Department of Mathematical Information Technology University of Jyväskylä.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Improving TCP Performance over Wireless Networks
A Bandwidth Estimation Method for IP Version 6 Networks Marshall Crocker Department of Electrical and Computer Engineering Mississippi State University.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Members Version 03/07 Principal Investigators Prof. David Hutchison Lancaster University Prof. James P. Sterbenz The.
THE IMPACT OF OSPF ROUTING ON MILITARY MANETS BY ROCCO LUPOI UNDER THE GUIDANCE OF DR. GRANT WIGLEY THESIS - BACHELOR OF COMPUTER SCIENCE (HONOURS) - LHIS.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Wireless Mesh Networks Myungchul Kim
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
Cognitive Information Service Basic Principles and Implementation of A Cognitive Inter-Node Protocol Optimization Scheme Dzmitry Kliazovich Fabrizio Granelli.
MPLS Introduction How MPLS Works ?? MPLS - The Motivation MPLS Application MPLS Advantages Conclusion.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Chapter 9 Optimizing Network Performance
Nuno Salta Supervisor: Manuel Ricardo Supervisor: Ricardo Morla
Resource Allocation for Distributed Streaming Applications
EE 122: Lecture 22 (Overlay Networks)
Autonomous Network Alerting Systems and Programmable Networks
Achieving Resilient Routing in the Internet
Presentation transcript:

Towards Resilient Networks using Programmable Networking Technologies Linlin Xie, Paul Smith, Mark Banfield, Helmut Leopold, James Sterbenz and David Hutchison Computing Department Lancaster University Department of Electrical Engineering and Computer Science University of Kansas Telekom Austria AG

Linlin XieIWAN Presentation Outline Introduction to resilience networking –Motivation –Resilient networks –Aims –Approaches Scenario –Flash Crowd Event to Web Servers –Ill-Effect Detection –Remediation

Linlin XieIWAN Motivation The Internet is a utility –Consumers, businesses, governments Failures & attacks are inevitable –Hurricane Katrina, 9/11, NE blackout… –Link/device failures, DDoS… Current Internet and applications not resilient Need networking effort: network providers should take the responsibility –to protect network resources and optimize the utilization –to protect cross traffic as well as stricken customers

Linlin XieIWAN Resilient Networks Ability of network to maintain or recover an acceptable level of service in the face of challenges to normal operation in an acceptable period of time Example challenges to normal operation: –Unusual traffic load (e.g. flash crowds) –High-mobility of nodes and sub-networks –Weak and episodic connectivity of wireless channels –Long delay paths –Large-scale natural disasters –Attacks against the network hardware, software, protocol infrastructure –Natural faults of network components

Linlin XieIWAN General Resilience Aims Provide acceptable services to applications –Ensure information is accessible –Maintain end-to-end communication when possible –Operation of distributed processing and networked storage Resilient services must remain accessible –Can degrade gracefully when necessary, but ensure correctness –Recover rapidly and automatically when challenges dissipate

Linlin XieIWAN Role of Programmable Networks Challenges to normal operation will rapidly change over time and space Prescribed solutions cannot be deployed Therefore, resilient networks must: –Operate in real-time –Be autonomic –Be context-aware and “intelligent” –Be dynamically extensible Programmable networking technologies are key to enabling these facilities

Linlin XieIWAN Programmable Networking Facilities Dynamic extensibility and self-organisation –Programmability allows dynamic response to challenges by altering its behaviour –But need to be controlled in order to avoid misuse and potential harm (e.g., stealthy interfaces) –Service to determine suitable locations to deploy services is required Traffic and network environment awareness –Packet inspection at line speed –Network information collection Cross layer awareness and interaction –Avoid waste of resources and enhance coordination –How and the possible consequences need further study

Linlin XieIWAN Related Work Knowledge Plane (“KP”, David Clark et al. MIT) –Part of the KP purpose is to detects faults &intrusion and mitigate the ill-effects –It proposes to add a new plane into the Internet architecture –The supporting technology is cognitive AI –The purpose of KP covers a very broad range –Cognitive AI is still in its initial stage of development –No concrete mechanisms for resilience maintenance yet Autonomic Communications –Efforts largely focused on self-configuring, self-managing, and self-healing networked server systems –Initiatives now on making communications system autonomic Learn network context and automatically adapt

Linlin XieIWAN Related Work (Cont’d) COPS (Checking, Observing and Protecting Services) (Randy Katz, UCB) –Propose to protect network using iBoxes on the network edge –Propose an annotation layer between IP and transport layers to carry information along the traffic Other similar/related efforts –Disruption Tolerant Network (DTN) Mean to provide stable end to end paths for applications when network connectivity faces challenges –Survivability Enable the system to fulfil its mission even in the presence of attacks or failures (CMU) –Resilience covers a broader range including protection against unusual traffic load (e.g., FC)

Linlin XieIWAN Resilience Networking Scenario Demonstrate the applicability of programmable networks Flash Crowd Event –Although flash crowd requests are legitimate, the damage caused is equally as bad as malicious attacks Two activities investigated: –Detecting ill-effects of a flash crowd on Web servers –Remediation of a flash crowd event

Linlin XieIWAN Network Model We take the role of network provider, i.e. ISP, to detect and mitigate the ill-effects occurred to the web servers network (which subscribes such service), and protect resources and cross traffic in the network of its own

Linlin XieIWAN Ill-Effects Detection Detection basis: –An increase of request rate in an association with a decrease or level-off of response rate Detection location: –The edge router that connects the web server network to the ISP network Algorithm overview: –compare actual observed response rate with the expected one

Linlin XieIWAN Ill-Effect Detection (Cont’d) Mechanism based on the formulae: Where the sizes of response objects are estimated according to the size distribution calculated from sampling the “content-length” domain in HTTP header of the response traffic

Linlin XieIWAN Simulation Setup Based on ns-2 Topology α chosen to 0.2 Detection interval t set to be 30s

Linlin XieIWAN Simulation Setup (Cont’d) Parameters set up as follows

Linlin XieIWAN Simulation Results Flash crowd traffic simulation Flash crowd starts at 500s We use access link congestion to simulate the server-side behavior

Linlin XieIWAN Simulation Results (Cont’d) Detection results Ratio of the actual response volume over the expected one

Linlin XieIWAN Simulation Results Statistical distribution of ratio samples of background traffic: N( , ) The 95% confidence range of this distribution is [ , ]

Linlin XieIWAN Remediation Drop excessive requests at the ingress edges of the network –Pushback-similar mechanism Opportunistic multiple-routing of large response traffic that is packet-sequence-tolerant to protect cross traffic from degrading QoS too much –Multiple routes database –Path bandwidth information collection –Split the response traffic in proportion to the available bandwidth of each path Must consider the possibility of having zero or just a few of programmable routers in the core network

Linlin XieIWAN Scenario Conclusions Contributions –Cross-layer coordination in detection –Cross traffic protection in the network Future work –Mitigation mechanism and experiments –Design and improve a resilient network infrastructure and architecture

Linlin XieIWAN Conclusions Resilient networks are crucial for the future information society Programmable networking technology is appropriate for building resilient networks Example flash crowd scenario demonstrates the need for programmability, namely: –cross-layer interaction –dynamic extensibility

Linlin XieIWAN Thanks! Questions?