3/30/2005 Auburn University Information Assurance Lab 1 Simulating Secure Overlay Services.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
CIS 459/659 – Introduction to Network Security – Spring 2005 – Class 13 – 4/5/05 1 D-WARD 1  Goal: detect attacks, reduce the attack traffic, recognize.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
CHORD – peer to peer lookup protocol Shankar Karthik Vaithianathan & Aravind Sivaraman University of Central Florida.
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Phalanx: Withstanding Multimillion-Node Botnets Colin Dixon Arvind Krishnamurthy Tom Anderson University of Washington NSDI 2008.
Technische Universität Yimei Liao Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
Lecture 5 - Routing On the Flat Labels M.Sc Ilya Nikolaevskiy Helsinki Institute for Information Technology (HIIT)
Robert Morris, M. Frans Kaashoek, David Karger, Hari Balakrishnan, Ion Stoica, David Liben-Nowell, Frank Dabek Chord: A scalable peer-to-peer look-up protocol.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Zhang Fu, Marina Papatriantafilou, Philippas Tsigas Chalmers University of Technology, Sweden 1 ACM SAC 2010 ACM SAC 2011.
You should worry if you are below this point.  Your projected and optimistically projected grades should be in the grade center soon o Projected:  Your.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
15-441: Computer Networking Lecture 26: Networking Future.
1 SOS: Secure Overlay Services Angelos Keromytis, Dept. of Computer Science Vishal Misra, Dept. of Computer Science Dan Rubenstein, Dept. of Electrical.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
SCALLOP A Scalable and Load-Balanced Peer- to-Peer Lookup Protocol for High- Performance Distributed System Jerry Chou, Tai-Yi Huang & Kuang-Li Huang Embedded.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
1 Securing Information Transmission by Redundancy Jun LiPeter ReiherGerald Popek Computer Science Department UCLA NISS Conference October 21, 1999.
Using Overlays to Improve Security Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University SPIE ITCom Conference on Scalability and.
Wide-area cooperative storage with CFS
Survey of Distributed Denial of Service Attacks and Popular Countermeasures Andrew Knotts, Kent State University Referenced from: Charalampos Patrikakis,Michalis.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Data Consistency in the Structured Peer-to-Peer Network Cheng-Ying Ou, Polly Huang Network and Systems Lab 台灣大學電機資訊學院電機所.
Consistent Hashing: Load Balancing in a Changing World
1. SOS: Secure Overlay Service (+Mayday) A. D. Keromytis, V. Misra, D. Runbenstein Columbia University Presented by Yingfei Dong.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
CS An Overlay Routing Scheme For Moving Large Files Su Zhang Kai Xu.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Final Introduction ---- Web Security, DDoS, others
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Slide 1/24 Denial of Service Elusion (DoSE): Keeping Clients Connected for Less Paul Wood, Christopher Gutierrez, Saurabh Bagchi School of Electrical and.
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Large-Scale IP Traceback in High-Speed Internet : Practical Techniques and Theoretical Foundation Jun (Jim) Xu Networking & Telecommunications Group College.
SOS: Secure Overlay Services A.Keromytis, V. Misra, and D. Rubenstein Presented by Tsirbas Rafail.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Lecture (Mar 23, 2000) H/W Assignment 3 posted on Web –Due Tuesday March 28, 2000 Review of Data packets LANS WANS.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Hiral Chhaya CDA 6133.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Lecture 16 Page 1 CS 239, Spring 2007 Designing Performance Experiments: An Example CS 239 Experimental Methodologies for System Software Peter Reiher.
SOS: An Architecture For Mitigating DDoS Attacks Authors: Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. Published: ACM SIGCOMM 2002 Presenter: Jerome.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Lecture 17 Page 1 CS 236, Spring 2008 Distributed Denial of Service (DDoS) Attacks Goal: Prevent a network site from doing its normal business Method:
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
Md Tareq Adnan Centralized Approach : Server & Clients Slow content must traverse multiple backbones and long distances Unreliable.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Brocade: Landmark Routing on Overlay Networks
Magdalena Balazinska, Hari Balakrishnan, and David Karger
Planning and Troubleshooting Routing and Switching
Wireless Sensor Networks 7. Geometric Routing
MIT LCS Proceedings of the 2001 ACM SIGCOMM Conference
Presentation transcript:

3/30/2005 Auburn University Information Assurance Lab 1 Simulating Secure Overlay Services

3/30/ Auburn University Information Assurance Lab Outline SOS Overview SOS Overview Communication Architecture Communication Architecture Ideas and Assumptions Ideas and Assumptions Models Models Experiments Experiments Results Results Future Work Future Work Questions? Questions?

3/30/ Auburn University Information Assurance Lab SOS Overview Target Site Target Site High-Speed Routers High-Speed Routers Secret Servlet Secret Servlet Beacon Beacon Secure Overlay Access Point (SOAP) Secure Overlay Access Point (SOAP)

3/30/ Auburn University Information Assurance Lab SOS Overview Target Site Target Site The machine enlisting the protection of the overlay network The machine enlisting the protection of the overlay network High-Speed Filter Routers High-Speed Filter Routers Routers that govern all access to the protected site Routers that govern all access to the protected site Must have the capacity to repel a sizeable attack Must have the capacity to repel a sizeable attack

3/30/ Auburn University Information Assurance Lab SOS Overview Secret Servlet Secret Servlet The only Node that is allowed to send data directly to the Target Site The only Node that is allowed to send data directly to the Target Site Beacon Beacon The ultimate destination as far as the overlay is concerned The ultimate destination as far as the overlay is concerned Secure Overlay Access Point (SOAP) Secure Overlay Access Point (SOAP) The point at the edge of the overlay through which users are authenticated, and their traffic forwarded The point at the edge of the overlay through which users are authenticated, and their traffic forwarded

3/30/ Auburn University Information Assurance Lab Design Philosophy and Assumptions Simplicity Simplicity Communication Protocol Communication Protocol Inter-node communication is reduced to single packet instructions and acknowledgements Inter-node communication is reduced to single packet instructions and acknowledgements User-target communication is very simple stop-and-wait protocol, allows us to make simple measurements of round trip time, loss rates, etc. User-target communication is very simple stop-and-wait protocol, allows us to make simple measurements of round trip time, loss rates, etc. Network Models Network Models The models should be as functionally pure as possible The models should be as functionally pure as possible The network should not be overburdened with excessively complex routing The network should not be overburdened with excessively complex routing

3/30/ Auburn University Information Assurance Lab Design Philosophy and Assumptions Simplicity (cont’d) Simplicity (cont’d) Attacks are simulated by intermittently failing nodes as opposed to generating large amounts of traffic to overwhelm them Attacks are simulated by intermittently failing nodes as opposed to generating large amounts of traffic to overwhelm them Attacker Assumptions Attacker Assumptions Attackers do not know the function of nodes in the network, only that they are participating Attackers do not know the function of nodes in the network, only that they are participating Attackers have the strength to shut down n nodes in a single stroke Attackers have the strength to shut down n nodes in a single stroke

3/30/ Auburn University Information Assurance Lab Models SOS Node Model SOS Node Model Secret Servlet Secret Servlet Beacon Beacon SOAP SOAP Intermediate Node Intermediate Node Target Site Target Site Accepts authenticated traffic and replies Accepts authenticated traffic and replies

3/30/ Auburn University Information Assurance Lab Models Router Router Filters what it is told to filter, forwards everything else Filters what it is told to filter, forwards everything else User (Traffic Generator) User (Traffic Generator) Injects data into the network and waits patiently for ACKs Injects data into the network and waits patiently for ACKs

3/30/ Auburn University Information Assurance Lab Models The Network The Network 25 Subnets 25 Subnets Each Subnet contains (at least) a router and an SOS node Each Subnet contains (at least) a router and an SOS node

3/30/ Auburn University Information Assurance Lab Models

3/30/ Auburn University Information Assurance Lab Models

3/30/ Auburn University Information Assurance Lab Models

3/30/ Auburn University Information Assurance Lab Models

3/30/ Auburn University Information Assurance Lab Models

3/30/ Auburn University Information Assurance Lab Models

3/30/ Auburn University Information Assurance Lab Models

3/30/ Auburn University Information Assurance Lab Experimental Design Unsophisticated Random Attacker Unsophisticated Random Attacker That attacker knows which nodes are participating in the network, but does not know their roles. That attacker knows which nodes are participating in the network, but does not know their roles. The attacker can fail any node in the network with probability p. After a random amount of downtime, the node will rejoin the network. The attacker can fail any node in the network with probability p. After a random amount of downtime, the node will rejoin the network. Unsophisticated Targeted Attacker Unsophisticated Targeted Attacker The attacker can use all of her resources to bring down n nodes simultaneously. These nodes do not have the chance to rejoin the network. The attacker can use all of her resources to bring down n nodes simultaneously. These nodes do not have the chance to rejoin the network.

3/30/ Auburn University Information Assurance Lab Experimental Design Sophisticated (Overinformed) Attacker Sophisticated (Overinformed) Attacker This attacker can divine the identity of the overlay’s most guarded secret, the identity of the secret servlet. This attacker can divine the identity of the overlay’s most guarded secret, the identity of the secret servlet. This discovery takes a short and near constant amount of time. This discovery takes a short and near constant amount of time.

3/30/ Auburn University Information Assurance Lab Results Unsophisticated Random Attacker Unsophisticated Random Attacker For small values of p the overlay is hardly effected For small values of p the overlay is hardly effected Anything larger than 0.5 creates long periods of down time for recovery. Anything larger than 0.5 creates long periods of down time for recovery.

3/30/ Auburn University Information Assurance Lab Results Unsophisticated Targeted attacker Attacker Unsophisticated Targeted attacker Attacker Again, once 50% of the nodes are susceptible to failure, recovery becomes very difficult, if not impossible Again, once 50% of the nodes are susceptible to failure, recovery becomes very difficult, if not impossible

3/30/ Auburn University Information Assurance Lab Results Sophisticated Attacker Sophisticated Attacker Recovery time for losing a secret servlet is near constant no matter how many times it happenes Recovery time for losing a secret servlet is near constant no matter how many times it happenes

3/30/ Auburn University Information Assurance Lab Conclusions The ease with which attackers can recruit a zombie hoard make DDoS a large and realistic threat to the communication infrastructure. The ease with which attackers can recruit a zombie hoard make DDoS a large and realistic threat to the communication infrastructure. Secure Overlay Services represents a creative solution to a complicated problem. Secure Overlay Services represents a creative solution to a complicated problem. With a large enough number of participating nodes, and very high speed links, SOS provides adequate protection and real-time recoverability in the face of a bandwidth denial of service attack. With a large enough number of participating nodes, and very high speed links, SOS provides adequate protection and real-time recoverability in the face of a bandwidth denial of service attack.

3/30/ Auburn University Information Assurance Lab Future Work More Accurate Network Model More Accurate Network Model TCP/IP Stack TCP/IP Stack Dynamic Routing Dynamic Routing Implementation Implementation Ask Adam… Ask Adam…

3/30/ Auburn University Information Assurance Lab Resources A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure Overlay Services. In Proceedings of ACM SIGCOMM, pages , August A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure Overlay Services. In Proceedings of ACM SIGCOMM, pages , August I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In Proceedings of ACM SIGCOMM, I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In Proceedings of ACM SIGCOMM, Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers. In: Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS). (2003) Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using Graphic Turing Tests to Counter Automated DDoS Attacks Against Web Servers. In: Proceedings of the 10th ACM International Conference on Computer and Communications Security (CCS). (2003) D. Karger, E. Lehman, F. Leighton, R. Panigrahy, M. Levine, and D. Lewin. Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web. In Proceedings of ACM Symposium on Theory of Computing (STOC), pages 654–663, May D. Karger, E. Lehman, F. Leighton, R. Panigrahy, M. Levine, and D. Lewin. Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving Hot Spots on the World Wide Web. In Proceedings of ACM Symposium on Theory of Computing (STOC), pages 654–663, May H. W. Fletcher, K. Richardson, M. C. Carlisle, J. A. Hamilton. Simulation Experimentation with Secure Overlay Services. In review for SES Summer Simulation Conference, H. W. Fletcher, K. Richardson, M. C. Carlisle, J. A. Hamilton. Simulation Experimentation with Secure Overlay Services. In review for SES Summer Simulation Conference, 2005.