Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
How do the superpeer networks emerge? Niloy Ganguly, Bivas Mitra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur,
School of Information University of Michigan Network resilience Lecture 20.
Practical Applications of Complex Network Theory Niloy Ganguly (IIT Kharagpur)
Farnoush Banaei-Kashani and Cyrus Shahabi Criticality-based Analysis and Design of Unstructured P2P Networks as “ Complex Systems ” Mohammad Al-Rifai.
Hierarchy in networks Peter Náther, Mária Markošová, Boris Rudolf Vyjde : Physica A, dec
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Peer-to-Peer and Grid Computing Exercise Session 3 (TUD Student Use Only) ‏
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Sampling from Large Graphs. Motivation Our purpose is to analyze and model social networks –An online social network graph is composed of millions of.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Distributed Combinatorial Optimization
Impact of Different Mobility Models on Connectivity Probability of a Wireless Ad Hoc Network Tatiana K. Madsen, Frank H.P. Fitzek, Ramjee Prasad [tatiana.
TELCOM2125: Network Science and Analysis
Correctness of Gossip-Based Membership under Message Loss Maxim Gurevich, Idit Keidar Technion.
Copyright (c) 2004 Brooks/Cole, a division of Thomson Learning, Inc. Chapter 7 Statistical Intervals Based on a Single Sample.
1 10. Joint Moments and Joint Characteristic Functions Following section 6, in this section we shall introduce various parameters to compactly represent.
Decomposing Networks and Polya Urns with the Power of Choice Joint work with Christos Amanatidis, Richard Karp, Christos Papadimitriou, Martha Sideri Presented.
Random Graph Models of Social Networks Paper Authors: M.E. Newman, D.J. Watts, S.H. Strogatz Presentation presented by Jessie Riposo.
The Erdös-Rényi models
Analyzing the Vulnerability of Superpeer Networks Against Churn and Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
Event-Condition-Action Rule Languages over Semistructured Data George Papamarkos.
Author: M.E.J. Newman Presenter: Guoliang Liu Date:5/4/2012.
P.1Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Part2: An Approach of Passive Peer based Caching to Mitigate P2P Inter-domain.
Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Stability analysis of peer to peer.
Quantifying the dynamics of Binary Search Trees under combined insertions and deletions BACKGROUND The complexity of many operations on Binary Search Trees.
Theory of αBiNs: Alphabetic Bipartite Networks Animesh Mukherjee Dept. of Computer Science and Engineering Indian Institute of Technology, Kharagpur Collaborators:
Clustering of protein networks: Graph theory and terminology Scale-free architecture Modularity Robustness Reading: Barabasi and Oltvai 2004, Milo et al.
MEDUSA – New Model of Internet Topology Using k-shell Decomposition Shai Carmi Shlomo Havlin Bloomington 05/24/2005.
Random-Graph Theory The Erdos-Renyi model. G={P,E}, PNP 1,P 2,...,P N E In mathematical terms a network is represented by a graph. A graph is a pair of.
Analyzing the Vulnerability of Superpeer Networks Against Attack B. Mitra (Dept. of CSE, IIT Kharagpur, India), F. Peruani(ZIH, Technical University of.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
Surface and Bulk Fluctuations of the Lennard-Jones Clusrers D. I. Zhukhovitskii.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
Percolation and diffusion in network models Shai Carmi, Department of Physics, Bar-Ilan University Networks Percolation Diffusion Background picture: The.
Percolation in self-similar networks PRL 106:048701, 2011
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
An Effective Method to Improve the Resistance to Frangibility in Scale-free Networks Kaihua Xu HuaZhong Normal University.
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
1 11 Distributed Channel Assignment in Multi-Radio Mesh Networks Bong-Jun Ko, Vishal Misra, Jitendra Padhye and Dan Rubenstein Columbia University.
Joint Moments and Joint Characteristic Functions.
Onlinedeeneislam.blogspot.com1 Design and Analysis of Algorithms Slide # 1 Download From
Network Dynamics and Simulation Science Laboratory Structural Analysis of Electrical Networks Jiangzhuo Chen Joint work with Karla Atkins, V. S. Anil Kumar,
School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2013 Figures are taken.
On the behaviour of an edge number in a power-law random graph near a critical points E. V. Feklistova, Yu.
CORRELATION-REGULATION ANALYSIS Томский политехнический университет.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Dynamic Network Analysis Case study of PageRank-based Rewiring Narjès Bellamine-BenSaoud Galen Wilkerson 2 nd Second Annual French Complex Systems Summer.
Theory of Computational Complexity M1 Takao Inoshita Iwama & Ito Lab Graduate School of Informatics, Kyoto University.
Random Walk for Similarity Testing in Complex Networks
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
Marina Leri Institute of Applied Mathematical Research
Software Reliability Models.
Effective Social Network Quarantine with Minimal Isolation Costs
Student: Fang Hui Supervisor: Teo Yong Meng
Research Scopes in Complex Network
Department of Computer Science University of York
Peer-to-Peer Information Systems Week 6: Performance
Joydeep Chandra, Santosh Shaw and Niloy Ganguly
Presentation transcript:

Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Kharagpur Co-authors Bivas Mitra, Fernando Peruani, Sujoy Ghose

Department of Computer Science, IIT Kharagpur, India Peer to Peer architecture All peers act as both clients and servers i.e. Servent (SERVer+cliENT)  Provide and consume data  Any node can initiate a connection No centralized data source “The ultimate form of democracy on the Internet” File sharing and other applications like IP telephony, distributed storage, publish subscribe system etc Node Internet

Department of Computer Science, IIT Kharagpur, India Peer to peer and overlay network  An overlay network is built on top of physical network  Nodes are connected by virtual or logical links  Underlying physical network becomes unimportant  Interested in the complex graph structure of overlay

Department of Computer Science, IIT Kharagpur, India Dynamicity of overlay networks Peers in the p2p system leave network randomly without any central coordination Important peers are targeted for attack DoS attack drown important nodes in fastidious computation Fail to provide services to other peers Importance of a node is defined by centrality measures Like degree centrality, betweenness centraliy etc

Department of Computer Science, IIT Kharagpur, India Dynamicity of overlay networks Peers in the p2p system leave network randomly without any central coordination Important peers are targeted for attack Makes overlay structures highly dynamic in nature Frequently it partitions the network into smaller fragments Communication between peers become impossible

Department of Computer Science, IIT Kharagpur, India Problem definition Investigating stability of the networks against the churn and attack Network Topology+ Attack = How (long) stable Developing an analytical framework Examining the impact of different structural parameters upon stability Peer contribution degree of peers, superpeers their individual fractions

Department of Computer Science, IIT Kharagpur, India Steps followed to analyze Modeling of Overlay topologies pure p2p networks, superpeer networks, hybrid networks Various kinds of attacks Defining stability metric Developing the analytical framework Validation through simulation Understanding impact of structural parameters

Department of Computer Science, IIT Kharagpur, India Topology of the overlay networks are modeled by degree distribution p k p k specifies the fraction of nodes having degree k Superpeer network (KaZaA, Skype) - s mall fraction of nodes are superpeers and rest are peers Modeled using bimodal degree distribution r=fraction of peers k l =peer degree k m =superpeer degree p k l =r p k m =(1-r) Modeling: Superpeer networks

Department of Computer Science, IIT Kharagpur, India Modeling: Attack q k probability of survival of a node of degree k after the disrupting event Deterministic attack Nodes having high degrees are progressively removed qk=0 when k>kmax 0< qk< 1 when k=kmax qk=1 when k<kmax Degree dependent attack Nodes having high degrees are likely to be removed Probability of removal of node having degree k

Department of Computer Science, IIT Kharagpur, India Stability Metric: Percolation Threshold Initially all the nodes in the network are connected Forms a single giant component Size of the giant component is the order of the network size Giant component carries the structural properties of the entire network Nodes in the network are connected and form a single component

Department of Computer Science, IIT Kharagpur, India Stability Metric: Percolation Threshold Initial single connected component f fraction of nodes removed Giant component still exists

Department of Computer Science, IIT Kharagpur, India Stability Metric: Percolation Threshold Initial single connected component f fraction of nodes removed Giant component still exists f c fraction of nodes removed The entire graph breaks into smaller fragments Therefore f c =1-q c becomes the percolation threshold

Department of Computer Science, IIT Kharagpur, India  Generating function:  Formal power series whose coefficients encode information Here encode information about a sequence Used to understand different properties of the graph generates probability distribution of the vertex degrees. Average degree Development of the analytical framework

Department of Computer Science, IIT Kharagpur, India specifies the probability of a node having degree k to be present in the network after (1-q k ) fraction of nodes removed. becomes the corresponding generating function. Development of the analytical framework ( 1-q k ) fraction of nodes removed

Department of Computer Science, IIT Kharagpur, India specifies the probability of a node having degree k to be present in the network after (1-q k ) fraction of nodes removed. becomes the corresponding generating function. Distribution of the outgoing edges of first neighbor of a randomly chosen node Development of the analytical framework Random node First neighbor

Department of Computer Science, IIT Kharagpur, India Development of the analytical framework H 1 (x) generates the distribution of the size of the components that are reached through random edge H 1 (x) satisfies the following condition

Department of Computer Science, IIT Kharagpur, India generates distribution for the component size to which a randomly selected node belongs to Average size of the components Average component size becomes infinity when Development of the analytical framework

Department of Computer Science, IIT Kharagpur, India Average component size becomes infinity when With the help of generating function, we derive the following critical condition for the stability of giant component The critical condition is applicable For any kind of topology (modeled by pk) Undergoing any kind of dynamics (modeled by 1-qk) Degree distribution Peer dynamics Development of the analytical framework

Department of Computer Science, IIT Kharagpur, India Stability metric: simulation The theory is developed based on the concept of infinite graph At percolation point theoretically ‘infinite’ size graph reduces to the ‘finite’ size components In practice we work on finite graph cannot simulate the phenomenon directly We approximate the percolation phenomenon on finite graph with the help of condensation theory

Department of Computer Science, IIT Kharagpur, India How to determine percolation point during simulation? Let s denotes the size of a component and n s determines the number of components of size s at time t At each timestep t a fraction of nodes is removed from the network Calculate component size distribution If becomes monotonically decreasing function at the time t t becomes percolation point Initial condition (t=1) Intermediate condition (t=5) Percolation point (t=10)

Department of Computer Science, IIT Kharagpur, India Peer Movement : Churn and attack  Degree independent node failure  Probability of removal of a node is constant & degree independent  q k =q  Deterministic attack  Nodes having high degrees are progressively removed  q k =0 when k>kmax  0< q k < 1 when k=kmax  q k =1 when k<kmax

Department of Computer Science, IIT Kharagpur, India Stability of superpeer networks against deterministic attack Two different cases may arise Case 1: Removal of a fraction of high degree nodes are sufficient to breakdown the network Case 2: Removal of all the high degree nodes are not sufficient to breakdown the network Have to remove a fraction of low degree nodes

Department of Computer Science, IIT Kharagpur, India Stability of superpeer networks against deterministic attack Two different cases may arise Case 1: Removal of a fraction of high degree nodes are sufficient to breakdown the network Case 2: Removal of all the high degree nodes are not sufficient to breakdown the network Have to remove a fraction of low degree nodes  Interesting observation in case 1  Stability decreases with increasing value of peers – counterintuitive

Department of Computer Science, IIT Kharagpur, India Peer contribution Controls the total bandwidth contributed by the peers Determines the amount of influence superpeer nodes exert on the network Peer contribution where is the average degree We investigate the impact of peer contribution upon the stability of the network

Department of Computer Science, IIT Kharagpur, India Impact of peer contribution for deterministic attack The influence of high degree peers increases with the increase of peer contribution This becomes more eminent as peer contribution

Department of Computer Science, IIT Kharagpur, India Impact of peer contribution for deterministic attack Stability of the networks ( ) having peer contribution primarily depends upon the stability of peer ( )

Department of Computer Science, IIT Kharagpur, India Impact of peer contribution for deterministic attack Stability of the network increases with peer contribution for peer degree kl=3,5 Gradually reduces with peer contribution for peer degree kl=1

Department of Computer Science, IIT Kharagpur, India Stability of superpeer networks against degree dependent attack Probability of removal of a node is directly proportional to its degree  Hence  Calculation of normalizing constant C Minimum value This yields an inequality

Department of Computer Science, IIT Kharagpur, India Stability of superpeer networks against degree dependent attack Probability of removal of a node is directly proportional to its degree  Hence  Calculation of normalizing constant C Minimum value The solution set of the above inequality can be either bounded or unbounded

Department of Computer Science, IIT Kharagpur, India Degree dependent attack: Impact of solution set Three situations may arise Removal of all the superpeers along with a fraction of peers – Case 2 of deterministic attack Removal of only a fraction of superpeer – Case 1 of deterministic attack Removal of some fraction of peers and superpeers

Department of Computer Science, IIT Kharagpur, India Degree dependent attack: Impact of solution set Three situations may arise Case 2 of deterministic attack Networks having bounded solution set If, Case 1 of deterministic attack Networks having unbounded solution set If, Degree Dependent attack is a generalized case of deterministic attack

Department of Computer Science, IIT Kharagpur, India Case Study : Superpeer network with k l =3, km=25,  k  =5  Performed simulation on graphs with N=5000 and 500 cases Bounded solution set with  Removal of any combination of where disintegrates the network  At, all superpeer need to be removed along with a fraction of peers  Good agreement between theoretical and simulation results Impact of critical exponent  c Validation through simulation

Department of Computer Science, IIT Kharagpur, India Summarization of the results In deterministic attack, networks having small peer degrees are very much vulnerable Increase in peer degree improves stability Superpeer degree is less important here! In degree dependent attack, Stability condition provides the critical exponent Amount of peers and superpeers required to be removed is dependent upon More general kind of attack

Department of Computer Science, IIT Kharagpur, India Conclusion Contribution of our work Development of general framework to analyze the stability of superpeer networks Modeling the dynamic behavior of the peers using degree independent failure as well as attack. Comparative study between theoretical and simulation results to show the effectiveness of our theoretical model. Future work Perform the experiments and analysis on more realistic network

Department of Computer Science, IIT Kharagpur, India Thank you