Quantifying Network Denial of Service: A Location Service Case Study Yan Chen, Adam Bargteil, David Bindel, Randy H. Katz and John Kubiatowicz Computer.

Slides:



Advertisements
Similar presentations
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Advertisements

Tapestry: Scalable and Fault-tolerant Routing and Location Stanford Networking Seminar October 2001 Ben Y. Zhao
Tapestry: Decentralized Routing and Location SPAM Summer 2001 Ben Y. Zhao CS Division, U. C. Berkeley.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handly, Richard Karp and Scott Shenker Presented by Shreeram Sahasrabudhe.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao, Christine Lv., Edith Cohen, Kai Li and Scott Shenker ICS 2002.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
P2P Simulation Platform Enhancement Shih Chin, Chai Superviser: Dr. Tim Moors Assessor: Dr. Robert Malaney.
SCAN: A Dynamic, Scalable, and Efficient Content Distribution Network Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy,
The Impact of DHT Routing Geometry on Resilience and Proximity New DHTs constantly proposed –CAN, Chord, Pastry, Tapestry, Plaxton, Viceroy, Kademlia,
Outline Definition Point-to-point network denial of service
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Quantitative Characterization of Denial of Service Attacks: A Case Study of Location Services Adam Bargteil David Bindel Yan Chen.
Scalable Adaptive Data Dissemination Under Heterogeneous Environment Yan Chen, John Kubiatowicz and Ben Zhao UC Berkeley.
Search and Replication in Unstructured Peer-to-Peer Networks Pei Cao Cisco Systems, Inc. (Joint work with Christine Lv, Edith Cohen, Kai Li and Scott Shenker)
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
1 Drafting Behind Akamai (Travelocity-Based Detouring) AoJan Su, David R. Choffnes, Aleksandar Kuzmanovic, and Fabian E. Bustamante Department of Electrical.
OceanStore: Data Security in an Insecure world John Kubiatowicz.
Weaving a Tapestry Distributed Algorithms for Secure Node Integration, Routing and Fault Handling Ben Y. Zhao (John Kubiatowicz, Anthony Joseph) Fault-tolerant.
1 Characterizing Selfishly Constructed Overlay Routing Networks March 11, 2004 Byung-Gon Chun, Rodrigo Fonseca, Ion Stoica, and John Kubiatowicz University.
Locality Optimizations in Tapestry Jeremy Stribling Joint work with: Kris Hildrum Ben Y. Zhao Anthony D. Joseph John D. Kubiatowicz Sahara/OceanStore Winter.
Decentralized Location Services CS273 Guest Lecture April 24, 2001 Ben Y. Zhao.
Or, Providing High Availability and Adaptability in a Decentralized System Tapestry: Fault-resilient Wide-area Location and Routing Issues Facing Wide-area.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
Tapestry: Finding Nearby Objects in Peer-to-Peer Networks Joint with: Ling Huang Anthony Joseph Robert Krauthgamer John Kubiatowicz Satish Rao Sean Rhea.
Tapestry: A Resilient Global-scale Overlay for Service Deployment Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John.
Internet Indirection Infrastructure (i3) Ion Stoica, Daniel Adkins, Shelley Zhuang, Scott Shenker, Sonesh Surana UC Berkeley SIGCOMM 2002.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Tapestry: Decentralized Routing and Location System Seminar S ‘01 Ben Y. Zhao CS Division, U. C. Berkeley.
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
1 Plaxton Routing. 2 Introduction Plaxton routing is a scalable mechanism for accessing nearby copies of objects. Plaxton mesh is a data structure that.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Arnold N. Pears, CoRE Group Uppsala University 3 rd Swedish Networking Workshop Marholmen, September Why Tapestry is not Pastry Presenter.
Introduction to Peer-to-Peer Networks. What is a P2P network A P2P network is a large distributed system. It uses the vast resource of PCs distributed.
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
Overcast: Reliable Multicasting with an Overlay Network CS294 Paul Burstein 9/15/2003.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks IPTPS Feb. 25, 2005 Byung-Gon Chun, Ben Y. Zhao, and John Kubiatowicz.
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
Vincent Matossian September 21st 2001 ECE 579 An Overview of Decentralized Discovery mechanisms.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
1 On the Placement of Web Server Replicas Lili Qiu, Microsoft Research Venkata N. Padmanabhan, Microsoft Research Geoffrey M. Voelker, UCSD IEEE INFOCOM’2001,
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
1 More on Plaxton routing There are n nodes, and log B n digits in the id, where B = 2 b The neighbor table of each node consists of - primary neighbors.
Secure Routing for Structured Peer-to-Peer Overlay Networks M. Castro, P. Druschel, A. Ganesh, A. Rowstron and D. S. Wallach Proc. Of the 5 th Usenix Symposium.
Tapestry: A Resilient Global-scale Overlay for Service Deployment 1 Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
Peer to Peer Network Design Discovery and Routing algorithms
Topologically-Aware Overlay Construction and Sever Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker.
Tapestry : An Infrastructure for Fault-tolerant Wide-area Location and Routing Presenter : Lee Youn Do Oct 5, 2005 Ben Y.Zhao, John Kubiatowicz, and Anthony.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Lecture 16 Page 1 CS 239, Spring 2007 Designing Performance Experiments: An Example CS 239 Experimental Methodologies for System Software Peter Reiher.
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
CS791Aravind Elango Maintenance-Free Global Data Storage Sean Rhea, Chris Wells, Patrick Eaten, Dennis Geels, Ben Zhao, Hakim Weatherspoon and John Kubiatowicz.
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
An Overlay Infrastructure for Decentralized Object Location and Routing Ben Y. Zhao University of California at Santa Barbara.
Dynamic Replica Placement for Scalable Content Delivery
Tapestry: Scalable and Fault-tolerant Routing and Location
Presentation transcript:

Quantifying Network Denial of Service: A Location Service Case Study Yan Chen, Adam Bargteil, David Bindel, Randy H. Katz and John Kubiatowicz Computer Science Division University of California at Berkeley USA

Outline Motivation Network DoS Attacks Benchmarking Object Location Services Simulation Setup and Results Conclusions

Motivations Network DoS attacks increasing in frequency, severity and sophistication –32% respondents detected DoS attacks (1999 CSI/FBI survey) –Yahoo, Amazon, eBay and MicroSoft DDoS attacked –About 4,000 attacks per week in 2000 Security metrics in urgent need –Mission-critical applications built on products claiming various and suspect DoS resilient properties –No good benchmark for measuring security assurance Desired: A general methodology for quantifying arbitrary system/service resilience to network DoS attacks

Outline Motivation Network DoS Attacks Benchmarking Object Location Services Simulation Setup and Results Conclusions

Network DoS Benchmarking QoS metrics –DoS attacks resource availability, a spectrum metric rather than binary –General vs. App-specific metrics General: end-to-end latency, throughput and time to recover Multi-dimensional Resilience Quantification –Dimension rank based on importance, frequency, severity & sophistication –Application/system specific, hard to generalize –Solution: be specific in the threat model definition and only quantify resilience in the model

Network DoS Benchmarking (Cont’d) Simulation vs. Experiment –Standard & realistic simulation environment specification Network configuration Workload generation Threat model – taxonomy from CERT Y Consumption of network connectivity and/or bandwidth Y Consumption of other resources, e.g. queue, CPU Y Destruction or alternation of configuration information N Physical destruction or alternation of network components

Two General Classes of Attacks Flooding Attacks –Point-to-point attacks: TCP/UDP/ICMP flooding, Smurf attacks –Distributed attacks: hierarchical structures Corruption Attacks –Application specific –Impossible to test all, choose typical examples for benchmarking

Outline Motivation Network DoS Attacks Benchmarking Object Location Services Simulation Setup and Results Conclusions

Object Location Services (OLS) Centralized directory services (CDS) vulnerable to DoS attack –SLP, LDAP Replicated directory services (RDS) suffer consistency overhead, still limited number of targets Distributed directory services (DDS) –Combined routing & location on overlay network –Guaranteed success and locality –Failure and attack isolation –Examples: Tapestry, CAN, Chord, Pastry

Tapestry Routing and Location Namespace (nodes and objects) –Each object has its own hierarchy rooted at Root f (ObjectID) = RootID, via a dynamic mapping function Suffix Routing from A to B –At h th hop, arrive at nearest node hop(h) s.t. hop(h) shares suffix with B of length h digits –Example: 5324 routes to 0629 via 5324  2349  1429  7629  0629 Object Location –Root responsible for storing object’s location –Publish / search both route incrementally to root

Tapestry Mesh Incremental suffix-based routing NodeID 0x43FE NodeID 0x13FE NodeID 0xABFE NodeID 0x1290 NodeID 0x239E NodeID 0x73FE NodeID 0x423E NodeID 0x79FE NodeID 0x23FE NodeID 0x73FF NodeID 0x555E NodeID 0x035E NodeID 0x44FE NodeID 0x9990 NodeID 0xF990 NodeID 0x993E NodeID 0x04FE NodeID 0x43FE

Routing in Detail Neighbor Map For “5712” (Octal) Routing Levels 1234 xxx xxx0 xxx3 xxx4 xxx5 xxx6 xxx7 xx xx22 xx32 xx42 xx52 xx62 xx72 x012 x112 x212 x312 x412 x512 x Example: Octal digits, 2 12 namespace, 5712  7510

Object Location Randomization and Locality

Outline Motivation Network DoS Attacks Benchmarking Object Location Services Simulation Setup and Results Conclusions

Simulation Setup Fast Ethernet T3 T1 Distributed Information Retrieval System Built on top of ns 1000-node Transit-stub Topology from GT-ITM –Extended with common network bandwidth Synthetic Workload –Zipf’s law and hot-cold patterns –500 objects, 3 replicas each on 3 random nodes –Size randomly chosen as typical web contents: 5KB – 50KB

Directory Servers Simulation CDS with random replica (CDSr) CDS with closest replica (CDSo) RDS: with 4 random widely-distributed nodes, always return random replica –With random directory server (RDSr) –With closest directory server (RDSo) DDS: simplified version of Tapestry (DDS) –Tapestry mesh statically built with full topology knowledge –Using hop count as distance metric

Attacks Simulation Flooding Attacks –200 seconds simulation –Vary the number of agents: 1 – 16 –Each inject various constant bit stream to targets: 25KB/s – 500KB/s –Targets: CDS, RDS: the directory server(s) DDS: the root(s) of hot object(s) Corruption Attacks –Corrupted application-level routing tables of target nodes: CDS, RDS, DDS –Forged replica advertisement through node spoofing: DDS

CDS vs. Tapestry –1 * 100KB/s, 4 * 25KB/s – 4 *100KB/s –Tapestry shows resistance to DoS attacks Results of Flooding Attacks Average response latencyRequest throughput Only the flood traffic amount matter? No! – Bottleneck bandwidth restrict attackers’ power – Path sharing of clients and attackers – Hard to identify and eliminate multiple attackers simultaneously

Dynamics of Flooding Attacks CDS vs. Tapestry (most severe case: 4 *100KB/s) –Attacks start at 40th second, ends at 110th second Time to Recover –CDS (both policies): 40 seconds –Tapestry: negligible Average response latencyRequest throughput

Results of Flooding Attacks RDS vs. Tapestry –4 * 100KB/s – 16 * 500KB/s –Both RDS and Tapestry are far more resilient than CDS –Performance: RDSo > Tapestry > RDSr Counter DoS attacks: Decentralization and topology-aware locality Average response latencyRequest throughput

Results of Corruption Attacks Distance Corruption –One false edge on directory/root server –Only CDSo (85%) and Tapestry (2.2%) affected App-specific attacks –One Tapestry node spoofing to be root of every object (black square node in the graph) –24% of nodes are affected (enclosed by round-corner rectangles)

Resiliency Ranking Combine multiple-dimensional resiliency quantification into a single ranking –For multiple flooding attacks, weights are assigned in proportion to the amount of flood traffic –Normalized with the corresponding performance without attacks Flooding (80%) Distance corruption (10%) Node spoofing (10%) Total score Rank CDS, rand obj0.027N/A CDS, opt obj N/A Random RDS0.17N/A Optimal RDS0.48N/A DDS,Tapestry

Outline Motivation Network DoS Attacks Benchmarking Object Location Services Simulation Setup and Results Conclusions

First attempt for network DoS benchmarking Applied to quantify various directory services Replicated/distributed services more resilient than centralized ones Will expand it for more comprehensive attacks and more dynamic simulation Will use it to study other services such as web hosting and content distribution

Queuing Theory Analysis (backup slide) Assume M/M/1 queuing Predict the trends and how to choose simulation parameters to cover enough spectrum Average response latency (s) Legitimate throughput X axis: ratio of attack traffic vs. legitimate traffic