LTMI Internet Management Technology Laboratory APNOM 2003 A Study on Survivability of Mobile Network Nodes in the Network Mobility Sang Young Lee, Jin.

Slides:



Advertisements
Similar presentations
High Performance Research Network. Development Lab. / Supercomputing Center 1 Design of the Detection and Response System against DDoS attacks Yoonjoo.
Advertisements

Security Issues In Mobile IP
APNOMS 2003 Security Gateway System Team Design and Implementation of Security Gateway System for Intrusion Detection on High-speed Links Byoung-Koo Kim,
Object-Oriented Design and Implementation of Fault Management Function for MPLS network Sung-Jin Lim, Ryung-Min Kim, and Young-Tak Kim Advanced Networking.
Design and Implementation of Performance Management for the DiffServ-aware-MPLS Network Dong-Jin Shin, Young-Tak Kim Advanced Networking Technology Lab.(ANT.
APNOMS 2003 An Efficient Service Management Architecture in Virtual Active Network Using Script MIB School of Electronics and Information Kyung Hee University.
1 Network Composition between Ambient Networks Cornelia Kappler, Siemens AG ITG Fachgruppentreffen in Aachen, 4./5. Mai 2006.
Security in Mobile Ad Hoc Networks
INTRODUCTION WIRELESS TECHNOLOGY BECOMING HOTTER WIRELESS TECHNOLOGY BECOMING HOTTER TRANSITION TOWARDS MOBILITY OVER PAST 20 YEARS TRANSITION TOWARDS.
Mobile Communications-Network Protocols/Mobile IP
1 Mobility Management for All-IP Mobile Networks: Mobile IPv6 vs. Proxy Mobile IPv6 Ki-Sik Kong; Wonjun Lee; Korea University Youn-Hee Han; Korea university.
Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Authorization of a QoS path based on Generic AAA SC2002 Baltimore NOV Bas van Oudenaarde Advanced Internet Research Group University of Amsterdam.
1 Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks Jaehoon Jeong, Kyeongjin Lee, Jungsoo Park, Hyoungjun Kim ETRI
15-441: Computer Networking Lecture 26: Networking Future.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Lan Nguyen Mounika Namburu 1.  DDoS Defense Research  A2D2 Design ◦ Subnet Flooding Detection using Snort ◦ Class -Based Queuing ◦ Multi-level Rate.
AAA-ARCH IRTF-RG Authentication Authorisation and Accounting ARCHitecture Research Group chairs: C. de Laat J. Vollbrecht Content of this talk has contributions.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
A Study of MPLS Department of Computing Science & Engineering DE MONTFORT UNIVERSITY, LEICESTER, U.K. By PARMINDER SINGH KANG
NEtwork MObility By: Kristin Belanger. Contents Introduction Introduction Mobile Devices Mobile Devices Objectives Objectives Security Security Solution.
A Survey on Interfaces to Network Security
IPv6 Network Mobility on Ad hoc network for Transportation System Assoc. Prof. Lee Bu Sung, Francis.
1 Overview of Mobility Protocols Md. Shohrab Hossain Dec 6, 2014.
1 CIS 6930: Mobile Computing Mobile IP Sumi Helal Credit: majority of slides borrowed from one of Dave Johnson’s talks, 3.
“Securing IP Multimedia Subsystem (IMS) infrastructures …,” M. Tsagkaropoulos UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
NEMO Requirements and Mailing List Discussions/Conclusions T.J. Kniveton - Nokia Pascal Thubert - Cisco IETF 54 – July 14, 2002 Yokohama, Japan.
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
Securing Wired Local Area Networks(LANs)
NEtwork MObility (NEMO) Houcheng Lee. Main Idea NEMO works by moving the mobility functionality from Mobile IP mobile nodes to a mobile router. The router.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
Integration of 6LoWPAN into IP networks draft-cansever-6lowpan-integration-00.txt Derya Cansever Geoff Mulligan Carl Williams.
Dynamic Management of Multiple Mobile Routers Manabu Tsukada, Thierry Ernst, Ryuji Wakikawa and Koshiro Mitsuya Graduate School of Media and Governance,
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
WEIRD Hot Topic: Wireless Chris Burke WEIRD Working Group
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
IETF69 - NEMO WG1 NEMO: Deployments and Requirements From a Consumer Electronics Perspective draft-ng-nemo-ce-req-00.txt Chan-Wah Ng
Spring 2004 Network Mobility School of Electronics and Information Kyung Hee University Choong Seon HONG
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Requirements For Handover Information Services MIPSHOP – IETF #65 Srinivas Sreemanthula (Ed.)
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Network Mobility (NEMO) Advanced Internet 2004 Fall
2003/3/1856th IETF NEMO WG1 Basic Network Mobility Support draft-wakikawa-nemo-basic-00.txt Ryuji Wakikawa Keisuke Uehara
NEMO Basic Support update IETF 61. Status IANA assignments done Very close to AUTH48 call Some issues raised recently We need to figure out if we want.
Mobile IP 순천향대학교 전산학과 문종식
Carnegie Mellon University Software Engineering Institute Lecture 4 The Survivable Network Analysis Method: Evaluating Survivability of Critical Systems.
IS3220 Information Technology Infrastructure Security
SECURITY IN MOBILE NETWORKS Bharat Bhargava CERIAS and Computer Sciences Departments Purdue University, W. Lafayette, IN Supported.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Automating Cyber- Defense Management By: Zach Archer COSC 316.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Telematics Protocols and Technologies
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
High Performance Computing Lab.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
with distributed anchor routers
Seraphim : A Security Architecture for Active Networks
Net 431: ADVANCED COMPUTER NETWORKS
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
ISMS Information Security Management System
Presentation transcript:

LTMI Internet Management Technology Laboratory APNOM 2003 A Study on Survivability of Mobile Network Nodes in the Network Mobility Sang Young Lee, Jin Seok Yang, Dong Soo Kim and Tai Myoung Chung Internet Management Technology Lab. Dept. for Electronics and Computer Engineering Sungkyunkwan University Tel. :

LTMI Internet Management Technology Laboratory APNOM Introduction [Source : krNIC, NUA, cert/cc Inc.] Increase network host & user, then increase incidents

LTMI Internet Management Technology Laboratory APNOM Related works NEMO(Network Mobility) A Mobile Network is an entire network, moving as a unit, which changes its point of attachment to the Internet. A NEMO may be composed by one or more IP-subnets IETF NENO WG AR MR AR Internet home link NEMO link visited link egress interface ingress interface single- link NEMO multi-link NEMO CN

LTMI Internet Management Technology Laboratory APNOM Related works CITRA(cooperative intrusion traceback and response architecture) DARPA, NAI, UC Davis Boundary controllers Discovery coordinator Intrusion detection system Intrusion detection system Boundary controllers Boundary controller Propagating traceback message Intrusion or attacks Community Neighborhood 2 Neighborhood 3 Neighborhood 1 Sending traceback message

LTMI Internet Management Technology Laboratory APNOM Related works Survivability The capability of a system to fulfill its mission in a timely manner, even in the presence of stresses Stresses include attacks, failures, accidents, and abnormal loads DARPA Survival by defense Use of redundancy Monitoring QoS(Quality of Service) Self-check Application adaptation BBN Technology

LTMI Internet Management Technology Laboratory APNOM Current Issues NEMO Single point failure in AR, MR Low process capability, Battery and Bandwidth of MNNs QoS & Performance Security Confidentiality Authentication Authorization Location Privacy Access Control : VMN Survival by Defense - Resource Monitoring Guarantee QoS

LTMI Internet Management Technology Laboratory APNOM NCS - Architecture Discovery Coordinator Internet AAA MR AR MR AR AAA Neighborhood 1 Neighborhood 2 AAA HA AR Neighborhood 3 Community Index Mobile Router w/ RMA Mobile Host w/ RMA

LTMI Internet Management Technology Laboratory APNOM NCS - Module & Protocol OS Transport layer Network/DL layer Service APIs Physical layer AR(Access Router) Network/DL layer Transport layer Service APIs Resource Mon.Security Service Module Resource Mon. Security Transport Service Module Resource Mon. Security Transport Service Module Resource Mon. Security Transport Physical layer Security Systems(IDS, FW, etc.)MNNs AAA Discovery Coordinator Application Resource Mon.Security Repository Service APIs Index Wired networking protocol Resource monitoring info. & AAA protocol COPS LDAP Wireless networking protocol RMA

LTMI Internet Management Technology Laboratory APNOM NCS - Procedure Discovery Coordinator Internet AAA MR AR MR AR AAA Neighborhood 1 Neighborhood 2 AAA HA AR Neighborhood 3 Community syn-flood attacks See the symptoms sending alert & traceback msg alert & traceback msg

LTMI Internet Management Technology Laboratory APNOM Conclusions & Future Works Advantages No corruption of service in the AR, MR Guaranteed QoS, Improved Security in the NCS community Access control, Authorization for MNNs Conclusions Survival by defense-enabling in AR, MR Prevent some attacks QoS improvement by resource management Future works Need consideration of Multi-homing in NEMO Minimize performance decrease of MNNs Formalize a method of symptoms detection

LTMI Internet Management Technology Laboratory APNOM