Analyzing the jitter-attacks against TCP flows Mentors: Dr. Imad Aad, Prof. Jean-Pierre Hubaux Moumbe Arno Patrice 09 february 2005.

Slides:



Advertisements
Similar presentations
3/2/2001Hanoch Levy, CS, TAU1 TCP Behavior and Performance Workshop on QoS Hanoch Levy April 2004.
Advertisements

1 Transport Protocols & TCP CSE 3213 Fall April 2015.
NET0183 Networks and Communications Lecture 28 TCP: a transport layer protocol... the story continues... Sagan halda áfram 8/25/20091 NET0183 Networks.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Performance Improvement of TCP in Wireless Cellular Network Based on Acknowledgement Control Osaka University Masahiro Miyoshi, Masashi Sugano, Masayuki.
1 TCP - Part II. 2 What is Flow/Congestion/Error Control ? Flow Control: Algorithms to prevent that the sender overruns the receiver with information.
1 Evaluating F-RTO (RFC 4138) Markku Kojo, Kazunori Yamamoto, Max Hata, Pasi Sarolahti Draft available at:
Chapter 12 TCP Traffic Control Chapter 12 TCP Traffic Control.
Vijay Vasudevan, Amar Phanishayee, Hiral Shah, Elie Krevat David Andersen, Greg Ganger, Garth Gibson, Brian Mueller* Carnegie Mellon University, *Panasas.
1 Equation-Based Congestion Control for Unicast Applications Sally Floyd, Mark Handley, Jitendra Padhye & Jorg Widmer August 2000, ACM SIGCOMM Computer.
Error control An Engineering Approach to Computer Networking.
Presented by Prasanth Kalakota & Ravi Katpelly
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
Distributed Video Streaming Over Internet Thinh PQ Nguyen and Avideh Zakhor Berkeley, CA, USA Presented By Sam.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #7 TCP New Reno Vs. Reno.
1 Internet Networking Spring 2002 Tutorial 10 TCP NewReno.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Congestion Avoidance and Control Van Jacobson Jonghyun Kim April 1, 2004.
Computer Networking Lecture 16 – More TCP
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Travis Grant – Mingzhe Li, Choong-Soo Lee, Emmanuel.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
1 Internet Networking Spring 2004 Tutorial 10 TCP NewReno.
1 K. Salah Module 6.1: TCP Flow and Congestion Control Connection establishment & Termination Flow Control Congestion Control QoS.
Low-Rate TCP-Targeted Denial of Service Attacks Presenter: Juncao Li Authors: Aleksandar Kuzmanovic Edward W. Knightly.
Low-Rate TCP Denial of Service Defense Johnny Tsao Petros Efstathopoulos Tutor: Guang Yang UCLA 2003.
Path selection Packet scheduling and multipath Sebastian Siikavirta and Antti aalto.
TCP: flow and congestion control. Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a.
TCP Enhancement for Random Loss Jiang Wu Computer Science Lakehead University.
COMT 4291 Communications Protocols and TCP/IP COMT 429.
TCP Timers Chia-tai Tsai Introduction The 7 Timers for each Connection Connection-Establishment Timer Establish a new connection.
CS 4396 Computer Networks Lab
TFRC: TCP Friendly Rate Control using TCP Equation Based Congestion Model CS 218 W 2003 Oct 29, 2003.
CIS : TCP Traffic Control. Effect of Window Size W = TCP window size (octets) R = Data rate (bps) at TCP source D = Propagation delay (seconds)
1 Transport Protocols (continued) Relates to Lab 5. UDP and TCP.
SELECTIVE ACKNOWLEDGEMENT (SACK) DUPLICATE SELECTIVE ACKNOWLEDGMENT
Chapter 12 Transmission Control Protocol (TCP)
27th, Nov 2001 GLOBECOM /16 Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail-Drop / RED Routers Go Hasegawa Osaka University, Japan.
TCP and SCTP RTO Restart draft-hurtig-tcpm-rtorestart-02 Michael Welzl 1.
1 TCP III - Error Control TCP Error Control. 2 ARQ Error Control Two types of errors: –Lost packets –Damaged packets Most Error Control techniques are.
Lec 17. 4/2/14 Anthony D. Joseph CS162 ©UCB Spring 2014 CS162 S ECTION 8.
Forward Error Correction vs. Active Retransmit Requests in Wireless Networks Robbert Haarman.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
Computer Networking Lecture 18 – More TCP & Congestion Control.
TCP: Transmission Control Protocol Part II : Protocol Mechanisms Computer Network System Sirak Kaewjamnong Semester 1st, 2004.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
1 SIGCOMM ’ 03 Low-Rate TCP-Targeted Denial of Service Attacks A. Kuzmanovic and E. W. Knightly Rice University Reviewed by Haoyu Song 9/25/2003.
1 TCP - Part II. 2 What is Flow/Congestion/Error Control ? Flow Control: Algorithms to prevent that the sender overruns the receiver with information.
1 Computer Networks Congestion Avoidance. 2 Recall TCP Sliding Window Operation.
Recap of Lecture 19 If symptoms persist, please consult Dr Jacobson.
TCP Congestion Control 컴퓨터공학과 인공지능 연구실 서 영우. TCP congestion control2 Contents 1. Introduction 2. Slow-start 3. Congestion avoidance 4. Fast retransmit.
Retransmission. Automatic Repeat reQuest (ARQ) 2 Time Packet ACK Timeout Automatic Repeat Request –Receiver sends acknowledgment (ACK) when it receives.
Peer-to-Peer Networks 13 Internet – The Underlay Network
TCP as a Reliable Transport. How things can go wrong… Lost packets Corrupted packets Reordered packets …Malicious packets…
Chapter 12 TCP Traffic Control 1 Chapter 12 TCP Traffic Control.
Denial of Service Resilience in Ad Hoc Networks (MobiCom 2004) Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly November 21 th, 2006 Jinkyu Lee.
Performance Evaluation of L3 Transport Protocols for IEEE (2 nd round) Richard Rouil, Nada Golmie, and David Griffith National Institute of Standards.
1 ICCCN 2003 Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environments Shaojian Fu School of Computer Science University of Oklahoma.
TCP - Part II.
David Wetherall Spring 2000
NDNLP Implementation of Best-Effort Link-Layer Reliability
Transmission Control Protocol (TCP) Retransmission and Time-Out
ECE 4605 Edgar Duskin Ifiok Udowana
Computer Networks with Internet Technology William Stallings
ECE 599: Multimedia Networking Thinh Nguyen
CS4470 Computer Networking Protocols
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Lecture 18 – More TCP & Congestion Control
TCP Throughput Modeling
TCP III - Error Control TCP Error Control.
TCP: Transmission Control Protocol Part II : Protocol Mechanisms
Presentation transcript:

Analyzing the jitter-attacks against TCP flows Mentors: Dr. Imad Aad, Prof. Jean-Pierre Hubaux Moumbe Arno Patrice 09 february 2005

2 Outline How does TCP work? Different kinds of attacks on TCP Our goal Different methods of Jitter Attack Simulation Results Discussion Conclusion

3 How does TCP work? RTT (Round Trip Time ) is the time elapsed between sending a packet and receiving its Acknowledgement RTO (Retransmission Time Out) is the time after which the packet is sent again if there is no ACK SenderReceiver RTT ACK Packet RTO Figure 1: TCP

4 according to RFC2988 SRTT(k+1) = a * SRTT(k) + (1-a) * RTT(k+1) (SRTT = Smoothed Round Trip Time) is the average of RTT estimator. RTTVAR = (1 - β) * RTTVAR + β* |SRTT - RTT| RTTVAR is the smoothed RTT deviation estimator. α =1/8 and β =1/4 RTO = max (minRTO, SRTT+ max (G, 4 RTTVAR)) (RTO = Retransmission Time Out) is the time that elapses after a packet has been sent until the sender considers it lost and therefore retransmits it. G <= 100 msec 3 sec How does TCP work

5 Outline How does TCP work? Different kinds of attacks on TCP Our goal Different methods of Jitter Attack Simulation Results Discussion Conclusion

6 JellyFish Drop JellyFish reorder JellyFish Jitter Differents kinds of attacks on TCP

7 JellyFish Drop JellyFish reorder JellyFish Jitter Differents kinds of attacks on TCP

8 Outline How does TCP work? Different kinds of attacks on TCP Our goal Different methods of Jitter Attack Simulation Results Discussion Conclusion

9 Our goal Find the best way to drop the throughput of TCP by using Jitter Attack We simulated several methods, and present the performance of three of them We will emphasize on the best one

10 Outline How does TCP work? Different kinds of attacks on TCP Our goal Different methods of Jitter Attack Simulation Results Discussion Conclusion

11 Figure 2: first method of jitter attack Figure 3: RTT increase First Method

12 Second Method Figure 4: RTT increase (second method)

13 Third Method Figure 5: RTT increase

14 Third Method (cont’d) Figure 6: δRTT to be added to RTT of a packet

15 Comparison of Methods two and three Figure 7: comparison of throughput of two methods Attack starts at second 100

16 Comparison of Methods two and three Figure 8: difference of throughputs of methods two and three Th = Th_Method3 – Th_Method2

17 We have three parameters to use in our implementation Number of Hops The Period T (s) tp (s) Third Method (cont’d) Figure 9: presentation of parameters

18 Outline How does TCP work? Different kinds of attacks on TCP Our goal Different methods of Jitter Attack Simulation Results Discussion Conclusion

19 Simulation Results Figure 10: Throughput over 2 hops, T=1 s, t p = 0,1 s Figure 11: Throughput over 8 hops, T = 1 s, t p = 0,1 s (Number of Hops)

20 Simulation Results (cont’d) Figure 12: Comparison of throughputs for two periods (T) Period T (s)

21 Simulation Results (cont’d) Figure 13 : throughputs vs t p t p (s)

22 Outline How does TCP work? Different kinds of attacks on TCP Our goal Different methods of Jitter Attack Simulation Results Discussion Conclusion

23 Discussion Effect of the Jitter First we compute the average additional delay introduce by the Jitter implementation We build a new implementation where we shift all the packets by d0 RTT1 = RTT2 = … = RTTn = d0 Therefore, for two implementations, we have the same average delay Jitter approach delay approach

24 Discussion (cont’d) Figure 14: Comparison of the throughputs of the delay and Jitter approaches For 2 and 4 hops

25 Discussion (cont’d) Figure 15: Comparison of the throughputs of the delay and Jitter approaches For 6 and 8 hops

26 Discussion (cont’d) Table 1: equivalence of percent / average for each number of hops

27 Discussion (cont’d) Figure 16: Comparison of difference of throughput between Jitter and Delay

28 Discussion (cont’d) Using Table 1 and Figure 16, we can say that to have a good throughput drop using the Jitter attack, (without caring about the number of hops): Number of hops = don’t care T = 1 s 0,1 < t p < 0,5 (with a good result for tp = 0.3 s) Possibility to automate the drop of the throughput (by trying several values of t p )

29 Outline How does TCP work? Different kinds of attacks on TCP Our goal Different methods of Jitter Attack Simulation Results Discussion Conclusion

30 Conclusion We derived the good parameters that drop the throughput of TCP, regardless of the number of hops. Period = T = 1 second Percent = tp = 0.3 second We also showed that the Jitter attack may drop very few throughput if throughput is low

31 Thanks you for your attention