1 Intrusion Monitoring of Link-State Routing Protocols Akshay Aggarwal Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of.

Slides:



Advertisements
Similar presentations
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Advertisements

Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
Routing: Cores, Peers and Algorithms
Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks Computer Science Department, UCLA International Computer Science Institute,
Routing Protocol.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Comnet 2010 Communication Networks Recitation 6 Routing.
Algorithms for Precomputing Constrained Widest Paths and Multicast Trees Paper by Stavroula Siachalou and Leonidas Georgiadis Presented by Jeremy Witmer.
PROXY FOR CONNECTIVITY We consider the k shortest edge disjoint paths between a pair of nodes and define a hyperlink, whose ‘connectivity’ is defined as:
CS541 Advanced Networking 1 Routing and Shortest Path Algorithms Neil Tang 2/18/2009.
Routing.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
Routing Protocol Pertemuan 21 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 21 Introduction to Computer Networks.
Layer-3 Routing Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Analysis of RIP, OSPF, and EIGRP Routing Protocols using OPNET Group 5: Kiavash Mirzahossein Michael Nguyen Sarah Elmasry
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
EQ-BGP: an efficient inter- domain QoS routing protocol Andrzej Bęben Institute of Telecommunications Warsaw University of Technology,
Routing and Routing Protocols Dynamic Routing Overview.
Link-State Routing Protocols
Lecture Week 10 Link-State Routing Protocols. Objectives Describe the basic features & concepts of link-state routing protocols. List the benefits and.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
9/15/2015CS622 - MIRO Presentation1 Wen Xu and Jennifer Rexford Department of Computer Science Princeton University Chuck Short CS622 Dr. C. Edward Chow.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Rate-based Data Propagation in Sensor Networks Gurdip Singh and Sandeep Pujar Computing and Information Sciences Sanjoy Das Electrical and Computer Engineering.
Link State Routing Using Link Cost as a Metric. Link State Routing Also called shortest path first (SPF) forwarding Named after Dijkstra’s algorithm (1959)
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 2 Single-Area OSPF.
Minimax Open Shortest Path First (OSPF) Routing Algorithms in Networks Supporting the SMDS Service Frank Yeong-Sung Lin ( 林永松 ) Information Management.
Efficient Route Computation on Road Networks Based on Hierarchical Communities Qing Song, Xiaofan Wang Department of Automation, Shanghai Jiao Tong University,
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Optical Network Security Daniel Stewart. Preliminary work Dijkstra's Algorithm Dijkstra's algorithm, is a graph search algorithm that solves the single-
Interior Gateway Protocols (RIP, OSPF) continued….
OSPF Open Shortest Path First. Table of Content  IP Routes  OSPF History  OSPF Design  OSPF Link State  OSPF Routing Table  OSPF Data Packets.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
Chapter 20 Unicast Routing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
Dijkstra-Scholten and Shavit-Francez termination algorithms
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Single Area OSPF Module 2, Review How routing information is maintained Link-state routers apply the Dijkstra shortest path first algorithm against.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
COMPUTER NETWORKS CS610 Lecture-17 Hammad Khalid Khan.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Instructor Materials Chapter 5: Dynamic Routing
Dijkstra’s shortest path Algorithm
Routing Protocols and Concepts
COMP 3270 Computer Networks
Dynamic Routing Protocols part2
A Scalable Multipath Algorithm in Hierarchical MPLS Networks
Routing: Distance Vector Algorithm
Chapter 5: Dynamic Routing
Frank Yeong-Sung Lin (林永松) Information Management Department
CS223 Advanced Data Structures and Algorithms
Communication Networks
Frank Yeong-Sung Lin (林永松) Information Management Department
Communication Networks
Computer network technology
Presentation transcript:

1 Intrusion Monitoring of Link-State Routing Protocols Akshay Aggarwal Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis

2 UCDavis SecLab MURI October 2002 Outline Part 1 Application to OSPF routing protocol Augmented OSPF Betweenness centrality computation Sample Topology Ongoing work

3 UCDavis SecLab MURI October 2002 Application to OSPF Routing OSPF NOW –At each router participating in OSPF Link-State Routing, the router employs the Dijkstra SPF Alg. and determines the shortest path tree originating at that router –Every link update received by router results in SPF algorithm execution –Employing a Fibonacci heap sort, algorithm executes in O(e+nlog(n)) time for e edges and n nodes

4 UCDavis SecLab MURI October 2002 OSPF AUGMENTED –Modified Definition of Betweenness Centrality: Centrality of a node is determined with respect to root router of SPF tree –Advantages Each router independently computes betweenness centrality indices of other routers in its routing network Each router can adopt independent response decisions based on this metric

5 UCDavis SecLab MURI October 2002 Betweenness Centrality Computation –Piggyback betweenness centrality computation within Dijkstra SPF algorithm at each router executing OSPF, for all routers in the routing network –Order of computational time requirements for determining this index remain UNCHANGED from existing Dijkstra computation, i.e., O(e+nlogn) at each router

6 UCDavis SecLab MURI October 2002 Augmented Dijkstra’s SPF Algorithm Given a graph with n nodes, find a shortest path tree from source node S S = Source node E = set of evaluated nodes for which shortest paths are known R = set of remaining nodes, Vi O = ordered list of paths C_B(V_i), i = 1,.., n /* Centrality index of all nodes, V_i, with respect to source node, S */ Step 1 C_B(V_i) = 0 E = {S} R = {V_1, V_2, …, V_(n-1)} O = {set of 1-edge paths starting from S} = {P_1, P_2, …, P_i} /* Each path has a cost corresponding to the link metric, and the paths are sorted by increasing metrics */ Step 2 if O = Ø or if metric(P_1) = ∞ /* All paths have been considered, or the first path has infinite metric */ mark all remaining nodes in R as unreachable Terminate algorithm contd

7 UCDavis SecLab MURI October 2002 Augmented Dijkstra’s SPF Algorithm – contd. Step 3 Let V = last node in P_1 If V Є E, go to Step 2 else P_1 is the shortest path to V Move V from R to E Increment C_B(V_i) for all V_i Є path P_1, where V_i ≠ S or V /* Centrality index is incremented for all nodes in the path between S and V */ Step 4 Build new set of paths by concatenating P_1 with each of the new edges from V Cost of the new paths = cost of P + link metric of new edge Insert new links in O, while sorting O Go to Step 2

8 UCDavis SecLab MURI October 2002 D E F G 2 A B C D E F G 2 A B C D E F G 2 A B C Initial Network Topology Topology after Link FE fails Topology after Link GF fails

9 UCDavis SecLab MURI October 2002 BCDEFG G E C B A D F 1. Initial SPF tree F G E C B A D 3. Link GF Failure F E G C B A D 2. Link FE Failure Nodes Initial Betweeness Centrality C_B of Node C_B after link FE failure C_B after link GF failure Change in C_B after 2 link updates Initial Degree Centrality C_D of Node Change in C_D after 2 link updates000-2 Node B has more control of the network Node F is more isolated

10 UCDavis SecLab MURI October 2002 Ongoing Work –Augmented current link-state algorithm (rtProtoLS) implemented in network simulator, ns-2, to incorporate centrality computations and perform comparative performance analysis on this augmented algorithm – Running simulations on ns-2 for realistic network scenarios to test validity of centrality indices for various cases of spatial and temporal as well as random and correlated link failures

11 UCDavis SecLab MURI October 2002 Outline Part 2 : Simulation Results Requirements of betweenness centrality calculation Simulator choice and reasons Test topologies and derived results Issues with simulation Conclusion

12 UCDavis SecLab MURI October 2002 Requirements of betweeness centrality calculation Need to maintain state of all the shortest paths from a given node. All hops along the path need to be maintained to calculate their betweenness An efficient method of calculation of the centrality piggybacking of calculation on shortest path calculation

13 UCDavis SecLab MURI October 2002 NS Reasons used –In-house expertise –An implementation of linkstate available – A popular simulator among networking researchers –Proof of concept prototype development Open to use of any suitable simulator for future work

14 UCDavis SecLab MURI October 2002 Topology 1 23 nodes All links are duplex Cost of links between node 0 – node 1 : 10 node 4 – node 5 : 10 node 2 – node 3 : variable All other links cost : 1

15 UCDavis SecLab MURI October 2002 Topology 1

16 UCDavis SecLab MURI October 2002 Results Topology 1

17 UCDavis SecLab MURI October 2002 Topology 2

18 UCDavis SecLab MURI October 2002 Results Topology 2

19 UCDavis SecLab MURI October 2002 Topolgy 3 24 nodes All links duplex Cost of links between node pairs (2,3) (3,5) (2,4) (4,5) (0,2) (13,16): 2 (9,19) : 6 (0,1) : variable All other links cost : 1

20 UCDavis SecLab MURI October 2002 Topology 3

21 UCDavis SecLab MURI October 2002 Results Topology 3

22 UCDavis SecLab MURI October 2002 Issues With NS Linkstate documentation non-existent Extensive use of STL makes linkstate inefficient State for the paths not maintained

23 UCDavis SecLab MURI October 2002 Other Issues Stable view of OSPF centrality is difficult to obtain : heuristic needed to determine the stability of the centrality Method of dealing with multiple equal shortest paths needed

24 UCDavis SecLab MURI October 2002 Conclusion Demonstrated that the betweenness centrality index is an important metric for security and traffic flow. Can be calculated by piggybacking onto the calculation of the OSPF shortest path.

25 UCDavis SecLab MURI October 2002 Contact Information Akshay Aggarwal Poornima Balasubramanyam