 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK
Pastiche: Making Backup Cheap and Easy. Introduction Backup is cumbersome and expensive Backup is cumbersome and expensive ~$4/GB/Month (now $0.02/GB)
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
The Chord P2P Network Some slides have been borowed from the original presentation by the authors.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
1 PASTRY Partially borrowed from Gabi Kliot ’ s presentation.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Bowstron & Peter Druschel Presented by: Long Zhang.
Secure routing for structured peer-to-peer overlay networks M. Castro, P. Druschel, A. Ganesch, A. Rowstron, D.S. Wallach 5th Unix Symposium on Operating.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel Proc. of the 18th IFIP/ACM.
1 Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Robert Morris Ion Stoica, David Karger, M. Frans Kaashoek, Hari Balakrishnan.
Storage Management and Caching in PAST, a large-scale, persistent peer- to-peer storage utility Authors: Antony Rowstorn (Microsoft Research) Peter Druschel.
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan.
Pastry Partially borrowed for Gabi Kliot. Pastry Scalable, decentralized object location and routing for large-scale peer-to-peer systems  Antony Rowstron.
Spring 2003CS 4611 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
Secure routing for structured peer-to-peer overlay networks (by Castro et al.) Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
1 The Sybil Attack John R. Douceur Microsoft Research Presented for Cs294-4 by Benjamin Poon.
Wide-area cooperative storage with CFS
1 Peer-to-Peer Networks Outline Survey Self-organizing overlay network File system on top of P2P network Contributions from Peter Druschel.
P2P Course, Structured systems 1 Introduction (26/10/05)
Tapestry: A Resilient Global-scale Overlay for Service Deployment Ben Y. Zhao, Ling Huang, Jeremy Stribling, Sean C. Rhea, Anthony D. Joseph, and John.
Tapestry An off-the-wall routing protocol? Presented by Peter, Erik, and Morten.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems (Antony Rowstron and Peter Druschel) Shariq Rizvi First.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Tapestry GTK Devaroy (07CS1012) Kintali Bala Kishan (07CS1024) G Rahul (07CS3009)
1 Plaxton Routing. 2 Introduction Plaxton routing is a scalable mechanism for accessing nearby copies of objects. Plaxton mesh is a data structure that.
1 PASTRY. 2 Pastry paper “ Pastry: Scalable, decentralized object location and routing for large- scale peer-to-peer systems ” by Antony Rowstron (Microsoft.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Chord & CFS Presenter: Gang ZhouNov. 11th, University of Virginia.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
1 Security and Trust in P2P systems. 2 Trust and Security Peer-to-Peer systems require different entities to decide how to interact or whether to interact.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Security Michael Foukarakis – 13/12/2004 A Survey of Peer-to-Peer Security Issues Dan S. Wallach Rice University,
A Scalable Content-Addressable Network (CAN) Seminar “Peer-to-peer Information Systems” Speaker Vladimir Eske Advisor Dr. Ralf Schenkel November 2003.
CIS 640-2, Presenter: Yun Mao1 Security for Structured Peer- to-peer Overlay Networks By Miguel Castro et al. OSDI ’ 02 Presented by Yun Mao in CIS640.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Secure Routing for Structured Peer-to-Peer Overlay Networks M. Castro, P. Druschel, A. Ganesh, A. Rowstron and D. S. Wallach Proc. Of the 5 th Usenix Symposium.
Peer to Peer A Survey and comparison of peer-to-peer overlay network schemes And so on… Chulhyun Park
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems Antony Rowstron and Peter Druschel, Middleware 2001.
Chord Advanced issues. Analysis Theorem. Search takes O (log N) time (Note that in general, 2 m may be much larger than N) Proof. After log N forwarding.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Pastry Antony Rowstron and Peter Druschel Presented By David Deschenes.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
Peer to Peer Network Design Discovery and Routing algorithms
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
Peer-to-Peer Networks 05 Pastry Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Christian Scheideler Dept. of Computer Science
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Controlling the Cost of Reliability in Peer-to-Peer Overlays
COS 461: Computer Networks
Accessing nearby copies of replicated objects
PASTRY.
Secure Routing for Structured Peer-to-Peer Overlay Networks
COS 461: Computer Networks
Presentation transcript:

 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct message delivery.  Assumption that none of the participating nodes is malicious is unrealistic.

 An analysis of security issues in structured p2p overlay networks.  A study of attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and present defenses to these attacks.  An evaluation of techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.

 Structured P2P overlay networks are prone to various security attacks. ◦ malicious nodes that mis-route, corrupt or drop messages and routing information. ◦ Malicious nodes that may attempt to assume the identity of other nodes and corrupt the objects.

 A secure assignment of node identifiers  secure routing table maintenance  secure message forwarding

 Participating nodes are assigned uniform random identifiers called nodeIds from a large Id space.  App. Specific objects are assigned unique keys  Each key is mapped by the overlay to a unique live node the key’s root  Each node maintains a routing table with nodeIds of other nodes and their as­sociated IP addresses  neighbor set, consisting of some number of nodes with nodeIds near the current node in the id space  application objects are stored at more than one node in the overlay  A replica function maps an object’s key to a set of replica keys, such that the set of replica roots associated with the replica keys represents a random sample of participating nodes in the overlay

Node ids Key O 128 bit circular id space nodeIDs (uniform random) objIDs (uniform random) Invariant: node with numerically closest nodeID maintains object

Node ids Key O 128 bit circular id space nodeIDs (uniform random) objIDs (uniform random) Invariant: node with numerically closest nodeID maintains object

CMPT 880: P2P Systems - SFU

 N nodes that run on an overlay network  Assume a bound f ( 0<= f <= 1) on fraction of faulty nodes  Faulty nodes grouped into independent coalitions with size bound cN ( 1/N <= c <= f)  Major damage when c = f

 Ensures that ◦ the message is eventually delivered, despite nodes that may corrupt, drop or misroute the message ◦ the message is delivered to all legitimate replica roots for the key, despite nodes that may attempt to impersonate a replica root  Need solution for ◦ Node assignment ◦ Secure routing table maintenance ◦ Secure message forwarding

 An attacker who can ‘choose’ a node id can ◦ Target a particular victim node whose routing table entries are made to point to a hostile node ◦ choose the closest nodeIds to all replica keys for a particular target object, thus controlling all replica roots  Sybil attacks ◦ Attacks are possible even when an attacker cannot choose the node id but if can get a large number of legitimate node ids

 Certified node ids - set of central trusted certification authorities ensure that nodeIds are chosen randomly from the id space, and prevent nodes from forging nodeIds  A certificate binds a nodeId to a public key and its IP. ◦ attacker cannot swap IDs between his nodes ◦ Not a good idea when the IPs change dynamically  Solution for Sybil attacks ◦ Charging money for node id s ◦ Bind nodeIds to real world entities

 Attackers may fake proximity to increase the fraction of bad routing table entries  Bad routing updates ◦ Hard to determine whether the routing updates are legitimate ◦ This attack causes the value of f move towards 1 easily as the bad routing updates are propogated

 Constrained routing table ◦ impose strong constraints on the set of nodeIds that can fill each slot in a routing table ◦ For node i – at row l and column d, an entry that  shares a prefix of length l with I  has d as its (l+1) st digit  closest nodeID to the point p: p satisfies above properties and has remaining digits same as i  Approach uses two routing tables ◦ one that exploits network proximity information for efficient routing ◦ one that constrains routing table entries

 certified nodeIds and secure routing table maintenance ensure that each constrained routing table (and neighbor set) has an average fraction of only f random entries that point to nodes controlled by the attacker.  Attacks are still possible ◦ attacker can reduce the probability of successful delivery by simply not forwarding messages according to the algorithm

 the probability of routing successfully between two correct nodes when a fraction f of the nodes is faulty is only: (1-f ) h-1 where h is the average no of routing hops  Probability of routing correctly to a non-faulty replica root is (1-f) h  Fewer hops increase the probability of routing correctly  number of hops can be decreased by increasing the value of b.  But increasing b also increases the cost of routing table maintenance

 ensures that with very high probability at least one copy of the message reaches each correct replica root for the key. ◦ Route message to the key ◦ Root node returns prospective set of replica roots ◦ apply failure test on all replica roots ◦ If the test results are negative, accept the replica roots ◦ If the test results are positive, apply redundant routing

Route the message to root of destination key Collect the set of prospective replica roots Apply RFT on the set of prospective replca roots RFT result Accept the replica root set as the correct ones Apply redundant routing -ve +ve

 Takes a key and the set of prospective replica roots ◦ Returns negative if the set of roots is likely to be correct for the key; otherwise positive ◦ If no set is returned within a time frame, returns positive  Works by comparing the density of nodeIDs in the sender’s neighborhood set with the density of nodeIDs close to the replica roots of the destination key – It is observed that the avg density of nodeIds per unit volume in the id space is greater than the avg density of faulty nodes.

 Attacker can collect nodeId certificates of nodes that have left the overlay, and use them to increase the density of a prospective root neighbor set  Attacker can include both nodeIds of nodes it controls and nodeIds of correct nodes in a prospective root neighbor set

 the sender contacts all the prospective root neighbors to determine ◦ if they are live and ◦ if they have a nodeId certificate that was omitted from the prospective root neighbor set.  Prospective root returns to the sender a message with the list of ◦ nodeId certificates ◦ secure hashes of the neighbor sets reported by each of the ◦ prospective root neighbors ◦ set of nodeIds that are used to compute the hashes in the above list.  The sender checks that the hashes are consistent with the identifiers of the prospective root neighbors

 Invoked when routing failure test returns positive  Idea – route copies of the message over multiple routes toward each of the destination key’s replica roots  Issue – How to ensure that routes are diverse  Solution – neighbor set anycast ◦ sends copies of the message toward the destinationkey until they reach a node with the key’s root in its neighbor set. ◦ use the detailed knowledge that such a node has about the portion of the id space around the destination key to ensure that all correct replica roots receive a copy of the message.

 Secure routing primitive adds significant overhead over the conventional routing  Overhead can be reduced by storing self- certifying data in the overlay ◦ A client can go for a secure routing primitve only when the integrity check of the object fails.

Thank you!