Vulnerabilities of Reliable Multicast Protocols Thomas M. Park, David A. Kassay, Clifford J. Weinstein Massachusetts Institute of Technology Lincoln Laboratory.

Slides:



Advertisements
Similar presentations
Reliable Multicasting –IP-multicast is unreliable. Need a reliable multicast layer to simplify the software design. –Like in reliable unicast (PAR), we.
Advertisements

Distributed Control: Echelons view of the Internet of Things Bob Dolins position paper Fred Bakers presentation.
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Denial of Service in Sensor Networks Szymon Olesiak.
Computer Security and Penetration Testing
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
The study and demonstration on SIP security vulnerabilities Mahidhar Penigi Vamsi Krishna Karnati.
1 Reading Log Files. 2 Segment Format
RSVP Cryptographic Authentication "...RSVP requires the ability to protect its messages against corruption and spoofing. This document defines a mechanism.
By Alex Kirshon and Dima Gonikman Under the Guidance of Gabi Nakibly.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Chapter 6 Errors, Error Detection, and Error Control.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
IP Spoofing, CS2651 IP Spoofing Bao Ho ToanTai Vu CS Security Engineering Spring 2003 San Jose State University.
A loss detection Service for Active Reliable Multicast Protocols Moufida MAIMOUR & C. D. PHAM INRIA-RESO RESAM UCB-Lyon – ENS Lyon INC’02, Plymouth Tuesday,
Wired Equivalent Privacy (WEP)
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Wolfgang EffelsbergUniversity of Mannheim1 Multicast IP Wolfgang Effelsberg University of Mannheim September 2001.
A Preferred Link Based Multicast Protocol for Wireless Mobile Ad hoc Networks R. S. Sisodia, Karthigeyan. I, B. S. Manoj, and C. Siva Ram Murthy ICC 2003.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
A Lightweight Hop-by-Hop Authentication Protocol For Ad- Hoc Networks Speaker: Hsien-Pang Tsai Teacher: Kai-Wei Ke Date:2005/01/20.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Multicast Transport Protocols: A Survey and Taxonomy Author: Katia Obraczka University of Southern California Presenter: Venkatesh Prabhakar.
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
IIT Indore © Neminath Hubballi
Ming-Yu Jiang and Wanjiun Liao,IEEE ICC 2002 Family ACK Tree (FAT): A New Reliable Multicast Protocol for Mobile Ad Hoc Networks. Speaker : Wilson Lai.
Local Area Network By Bhupendra Ratha, Lecturer
Huda AL_Omairl - Network 71 Protocols and Network Software.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
On the use of Reliable Multicast for Content Distribution Vassilis Chatzigiannakis
7/26/ Design and Implementation of a Simple Totally-Ordered Reliable Multicast Protocol in Java.
GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks Seung-Jong Park et al IEEE Transactions on mobile computing.
Computer and Network Security Rabie A. Ramadan. Organization of the Course (Cont.) 2 Textbooks William Stallings, “Cryptography and Network Security,”
Chapter 5 Peer-to-Peer Protocols and Data Link Layer PART I: Peer-to-Peer Protocols ARQ Protocols and Reliable Data Transfer Flow Control.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 29 Internet Security.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
CS603 Fault Tolerance - Communication April 17, 2002.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. TCP/IP Addressing and Data Delivery  The TCP/IP Protocol Suite  IP Addressing.
Multicast: Wired to Wireless Hrishikesh Gossain Carlos de Morais Cordeiro Dharma P. Agrawal IEEE Communication Magazine June 2002 資工所 蔡家楷.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #09: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Telecommunications Networking II Lecture 41d Denial-of-Service Attacks.
On the Design of Robust and Adaptive IEEE Multicast Services for Video Transmissions Speaker: Bo-Yu Huang Advisor: Dr. Ho-Ting Wu Date: 2014/12/23.
Doc.: IEEE /0070r2 SubmissionSlide 1 Efficient Error Control Using Network Coding for Multicast Transmission Date: Authors: DooJung.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
Reliable Adaptive Lightweight Multicast Protocol Ken Tang, Scalable Network Technologies Katia Obraczka, UC Santa Cruz Sung-Ju Lee, Hewlett-Packard Laboratories.
RMTP-II Security Considerations Brian Whetten GlobalCast Communications.
Source-Specific Multicast (RFC4607) Author: H. Holbrook, Arastra, Inc. B. Cain, Acopia Networks Speaker: Wu Zhi Yu.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Chapter 5 Network and Transport Layers
Zueyong Zhu† and J. William Atwood‡
Domain 4 – Communication and Network Security
Long-haul Transport Protocols
The study and demonstration on SIP security vulnerabilities
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Robust Congestion Control for IP Multicast
CS4470 Computer Networking Protocols
IIT Indore © Neminath Hubballi
ECE 544 Project3 Team member.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer
Lecture 4 Peer-to-Peer Protocols and Data Link Layer
Presentation transcript:

Vulnerabilities of Reliable Multicast Protocols Thomas M. Park, David A. Kassay, Clifford J. Weinstein Massachusetts Institute of Technology Lincoln Laboratory Lexinton, Massachusetts Reviewed by: Siu Fung (Andes) Chin

Vulnerabilities of Reliable Multicast Protocols Outline Introduction Types of Protocols Attacks Defenses Conclusion

Introduction Multiple unicast transmission TCP/IP Multicast transmission RMP SRM

Introduction (cond.) Why reliable multicast transmission? More efficient Problems? Lack of security Solutions? Network-level security (IPSEC) Secret-key algorithm Risk management approach

Types of reliable multicast protocols Sender-initiated reliability protocol Positive acknowledgment (ACK) ACK implosion Example: RMP(Reliable Multicast Protocol) Token around ring

Types of reliable multicast protocols (cont) Receiver-initiated reliability protocol Negative acknowledgment (NCK) NCK implosion Example: SRM(Scalable Reliable Multicast Protocol) Suppress excess NAK

Vulnerabilities Flooding attack Consume network bandwidth/process time Forged data attack Corruption of files transmitted (RMP) Premature ACK Assign incorrect sequence no. (RMP) NAK and retransmission suppression Interfare retransmissions (SRM)

Defense Fliter received packets Block attacker’s packet Digitally signed messages Identify legitimate members Employ IGMP v3 (Internet Group Management Protocol) Prevent flooding Simple authentication protocol Prevent spoofing

Conclusion Different types reliable multicast protocol Different types attack Different types defense Increase protection – increase cost Questions?