Strong Detection of Misconfigurations Raj Kumar Rajendran Vishal Misra Dan Rubenstein.

Slides:



Advertisements
Similar presentations
Time Demand Analysis.
Advertisements

The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 3 Ýmir Vigfússon.
Vertex Cover Dominating Set These slides are based on the Lecture Notes by David Mount for the course CMSC 451 at the University of Maryland. The Copyright.
 2004 SDU Lecture9- Single-Source Shortest Paths 1.Related Notions and Variants of Shortest Paths Problems 2.Properties of Shortest Paths and Relaxation.
Breadth-First Search and Shortest Path Kevin Schaffer Chapter 15.4 from “Distributed Algorithms” by Nancy A. Lynch.
Graph Traversals Visit vertices of a graph G to determine some property: Is G connected? Is there a path from vertex a to vertex b? Does G have a cycle?
1 Concurrency Specification. 2 Outline 4 Issues in concurrent systems 4 Programming language support for concurrency 4 Concurrency analysis - A specification.
10.4 Factoring to solve Quadratics – Factoring to solve Quad. Goals / “I can…”  Solve quadratic equations by factoring.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
Routing - I Important concepts: link state based routing, distance vector based routing.
Graph Modeled Data Clustering: Fixed Parameter Algorithms for Clique Generation J. Gramm, J. Guo, F. Hüffner and R. Niedermeier Theory of Computing Systems.
DAST 2005 Tirgul 11 (and more) sample questions. DAST 2005 Q.Let G = (V,E) be an undirected, connected graph with an edge weight function w : E→R. Let.
Control Plane Resilience: The Method of Strong Detectio n Raj Kumar Vishal Misra Dan Rubenstein Allerton, 9/28/06.
The max flow problem
Data Structures, Spring 2004 © L. Joskowicz 1 Data Structures – LECTURE 15 Shortest paths algorithms Properties of shortest paths Bellman-Ford algorithm.
4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side, delivers.
DAST 2005 Tirgul 12 (and more) sample questions. DAST 2005 Q.We’ve seen that solving the shortest paths problem requires O(VE) time using the Belman-Ford.
Theoretical Bounds on Control Plane Monitoring in Routing Protocols Dan Rubenstein Joint work with Raj Kumar, Vishal Misra.
Toward Optimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed Network Analysis (DNA) Lab.
Dijkstra’s Algorithm Slide Courtesy: Uwash, UT 1.
On Distinguishing between Internet Power Law B Bu and Towsley Infocom 2002 Presented by.
1 Types Object Oriented Programming Spring 2007.
1 Shortest Path Algorithms. 2 Routing Algorithms Shortest path routing What is a shortest path? –Minimum number of hops? –Minimum distance? There is a.
Tirgul 13 Today we’ll solve two questions from last year’s exams.
EE 122: Intra-domain routing Ion Stoica September 30, 2002 (* this presentation is based on the on-line slides of J. Kurose & K. Rose)
Data Structures, Spring 2006 © L. Joskowicz 1 Data Structures – LECTURE 15 Shortest paths algorithms Properties of shortest paths Bellman-Ford algorithm.
Theoretical Bounds on Control- Plane Self Monitoring in Routing Protocols Raj Kumar Rajendran Vishal Misra Dan Rubenstein.
What is Fault in an Overlay Network and How Can We Tolerate Them?
Routing Protocols and the IP Layer CS244A Review Session 2/01/08 Ben Nham Derived from slides by: Paul Tarjan Martin Casado Ari Greenberg.
1 Minimum Spanning Trees Longin Jan Latecki Temple University based on slides by David Matuszek, UPenn, Rose Hoberman, CMU, Bing Liu, U. of Illinois, Boting.
Software Testing Sudipto Ghosh CS 406 Fall 99 November 9, 1999.
CS223 Advanced Data Structures and Algorithms 1 The Bellman-Ford Shortest Path Algorithm Neil Tang 03/11/2010.
Distributed Asynchronous Bellman-Ford Algorithm
Link-state routing  each node knows network topology and cost of each link  quasi-centralized: each router periodically broadcasts costs of attached.
Automatic Abstraction Refinement for GSTE Yan Chen, Yujing He, and Fei Xie Portland State University Jin Yang Intel Nov 13, 2007.
Popularity versus Similarity in Growing Networks Fragiskos Papadopoulos Cyprus University of Technology M. Kitsak, M. Á. Serrano, M. Boguñá, and Dmitri.
Lecture 13 Graphs. Introduction to Graphs Examples of Graphs – Airline Route Map What is the fastest way to get from Pittsburgh to St Louis? What is the.
It’s All About Properties of Equality. How could properties of equality be applied to solve this equation? Example 1: 3x + 11 = 32 What is the value of.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
13 – Routing Algorithms Network Layer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
CSE 326: Data Structures Lecture #20 Graphs I.5 Alon Halevy Spring Quarter 2001.
Introduction to Algorithms Jiafen Liu Sept
CSE 2331 / 5331 Topic 12: Shortest Path Basics Dijkstra Algorithm Relaxation Bellman-Ford Alg.
DISTRIBUTED SYSTEMS II A POLYNOMIAL LOCAL SOLUTION TO MUTUAL EXCLUSION Prof Philippas Tsigas Distributed Computing and Systems Research Group.
Advancements in the Inference of AS Relationships Xenofontas Dimitropoulos (Fontas) (CAIDA/GaTech) Dmitri Krioukov Bradley Huffaker k claffy George Riley.
Data Structures & Algorithms Shortest Paths Richard Newman based on book by R. Sedgewick and slides by S. Sahni.
Internet Routing r Routing algorithms m Link state m Distance Vector m Hierarchical routing r Routing protocols m RIP m OSPF m BGP.
Week 12 - Monday.  What did we talk about last time?  Topological sort and cycle detection in directed graphs  Connectivity  Strong connectivity.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm CS 6/73201 Advanced Operating System Presentation by: Sanjitkumar Patel.
1 Fault-Tolerant Consensus. 2 Communication Model Complete graph Synchronous, network.
4: Network Layer4-1 Chapter 4: Network Layer Last time: r Chapter Goals m Understand network layer principles and Internet implementation r Started routing.
CSE 326: Data Structures Lecture #23 Dijkstra and Kruskal (sittin’ in a graph) Steve Wolfman Winter Quarter 2000.
Routing algorithms. D(v): the cost from the source node to destination that has currently the least cost. p(v): previous node along current least.
Chapter 7 Dynamic Routing
Notes Over 2.1 Graph the numbers on a number line. Then write two inequalities that compare the two numbers and and 9 l l l.
Distance Vector Routing: overview
Unweighted Shortest Path Neil Tang 3/11/2010
Road Map I. Introduction II. IP Protocols III. Transport Layer
Decision Properties of Regular Languages
Structural balance.
Find the inflection points of the following function: f ( x ) = -7 x sin x {image} {image}
Department of Computer Science University of York
ECE453 – Introduction to Computer Networks
The Bellman-Ford Shortest Path Algorithm Neil Tang 03/27/2008
Network Layer (contd.) Routing
EMIS 8374 Search Algorithms Updated 9 February 2004
EMIS 8374 Search Algorithms Updated 12 February 2008
Presentation transcript:

Strong Detection of Misconfigurations Raj Kumar Rajendran Vishal Misra Dan Rubenstein

Distributed Algorithms Node’s misbehavior can have disastrous consequences: BGP AS7007 incident Important that Nodes detect incorrect implementation by other nodes. Use only information provided by the routing-protocol (e.g. its state) Can I tell if my neighbors are giving me the correct information?

“Weak” Detection can Fail Suppose graph edge lengths є {1,2} No violation of triangle inequality Dest/ Neighbor AB A02 B20 C A B C d(B,C) ≠ 3!!! How do we know if we’ve checked everything we can? Find a property that a node’s state should exhibit Find a method for checking the property Declare misconfiguration if property is violated Eg. Triangle Inequality [DMZ’03]

“Strong” Detection A detection method is “strong” if it always detects all detectable anomalies Given s’ i node i’s state and C={N} the set of allowable networks μ is a strong detection method if, when another node j is misconfigured it either detects a misconfiguration Fails to detect the misconfiguration, but no method exists that can detect misconfiguration from s’ i

Strong Detection in D.V. at node n Take node n’s state, s’ n Use this state to build the canonical graph, M є C Simulate D.V. on M to generate simulated state s n (M) We prove: If s n (M) ≠ s’ n, then misconfiguration detected Else, either there is no misconfiguration, or it is undetectable (using node n’s state) because M might be the actual network Complexity is O(|V| 3 ) Dest/ Neighbo r ABE A0112 B407 C 138 D5912 E964 F 1513 G492 Dest/ Neighbor ABE A0112 B407 C 138 D5912 E964 F 1513 G492 s’ n s n (M) G A B C E F D G A B C n E F D M n