Download presentation
Presentation is loading. Please wait.
Published byAngel Patience McCoy Modified over 9 years ago
1
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday 26.09.2005 C. Today I³SI³HIPHI³
2
2/32 Overview Communication today Problems I³ New services SI³ Denial of Service protection HIP Cryptographic security HI³ C. Today I³SI³HIPHI³
3
3/32 Communication Today Via IP Source and destination know one another Identifier = Locator C. Today I³SI³HIPHI³
4
4/32 Problems Mobility Multicast, Anycast etc. Protection against Denial of Service Attacks End-to-end security / authentication C. Today I³SI³HIPHI³
5
5/32 Mobility Change the address space Broken „connection“ Paderborn 1Paderborn 2 C. Today I³SI³HIPHI³
6
6/32 Denial of Service Attack Flooding the host with useless traffic Faulty connection Loss of services C. Today I³SI³HIPHI³
7
7/32 Internet Indirection Infrastructure C. Today I³SI³HIPHI³ Enables new services Mobility Multicast, Anycast … New overlay network Decouples sending from receiving
8
8/32 I³ - How It Works C. Today I³SI³HIPHI³ sender (S) receiver (R) (id,data)(R,data) Receivers express interest in packets Sources send packets to trigger I³ servers store triggers / forward packets (id,R)
9
9/32 Identifiers Identifiers are m bit long Each identifier is mapped to an unique I³ server First k bits select server Efficient trigger matching (v,R1) (x|y,R2) (x|z,R3) (x|q,data) OR C. Today I³SI³HIPHI³ sender (S) receiver1 (R1) receiver2 (R2) receiver3 (R3)
10
10/32 Mobility Receiver moves from one location to another Receiver updates its existing triggers Simultaneous movement of sender & receiver possible Identifier ≠ Locator (id,R) sender (S) receiver (R) (id,data) (R,data) receiver (R‘) (R‘,data) (id,R‘) C. Today I³SI³HIPHI³
11
11/32 Public / Private Triggers Distinction only at application layer First contact through public trigger Private triggers are used for data communication (id,S) client (C)server (S) (id,id PC ) (id PC,C) (id PS,S) (id PC, id PS ) C. Today I³SI³HIPHI³
12
12/32 Problems Mobility Multicast, Anycast etc. Protection against Denial of Service Attacks End-to-end security / authentication C. Today I³SI³HIPHI³
13
13/32 Secure I³ Extended I³ Protection against DoS attacks Communication without revealing IP addresses Empowering end-hosts with more control C. Today I³SI³HIPHI³
14
14/32 Control Against DoS Attacks Stop the Attack Dilute the Attack Slow Down the Attack Evade the Attack Multicast Access Control C. Today I³SI³HIPHI³
15
15/32 Stop the Attack Remove public trigger Prevent new clients from connecting Preserving existing connections (private triggers) C. Today I³SI³HIPHI³ Client3 (C3) Server (S) (x,R) (y,R) (z,R) Client2 (C2) Client1 (C1) Attacker (A)
16
16/32 Dilute the Attack Provide multiple public triggers Drop a fraction of the total traffic Still some triggers to connect Learn which public triggers are alive Change the subset of active public triggers Victim (V) (id 1,V) (id 2,V) (id 3,V) (id 4,V) Attacker (A) C. Today I³SI³HIPHI³
17
17/32 Slow Down the Attack Use a powerful third-party server Cryptographic puzzle Each message with a unique puzzle Server (S) (id a,A) Client (C) DoS-Filter (A) 1 (id C,C) 2 (id S,S) 3 C. Today I³SI³HIPHI³
18
18/32 Secure I³ - Summary Advantages Prevent IP level flooding Inability to attack private communication Alleviate flooding via triggers at the I³ level Costs Overlay server – amount of network traffic C. Today I³SI³HIPHI³
19
19/32 Problems Mobility Multicast, Anycast etc. Protection against Denial of Service Attacks End-to-end security / authentication C. Today I³SI³HIPHI³
20
20/32 Host Identity Protocol New namespace New protocol layer Between internetworking and transport layer Public-key cryptography C. Today I³SI³HIPHI³
21
21/32 Host Identity Protocol Host Identifier Independent of IP address Public key Host Identity Tag (HIT) 128-bit representation for Host Identity Locator IP address Binding transport associations to Host Identities C. Today I³SI³HIPHI³
22
22/32 End-to-End Connection Using IPsec: Internet key exchange (Diffie-Hellman) Security association Security parameters index - connection identifier C. Today I³SI³HIPHI³
23
23/32 Mobility First scenario – not connected Mobile node – rendezvous mechanism Second scenario – connected address change doesn`t brake TCP connection Third scenario Move at the same time C. Today I³SI³HIPHI³
24
24/32 Problems Mobility Multicast, Anycast etc. Protection against Denial of Service Attacks End-to-end security / authentication C. Today I³SI³HIPHI³
25
25/32 Weaknesses SI³ Traffic flows through an overlay server No encryption HIP Rendezvous server is needed Unable to deal with DoS attacks Lacks support for multicast / anycast C. Today I³SI³HIPHI³
26
26/32 Host Identity Indirection Infrastructure (HI³) Combination of (S)I³ and HIP More efficient SI³ More secure than SI³ Better DoS protection than HIP Rendezvous service C. Today I³SI³HIPHI³
27
27/32 HI³ Architecture Using HITs as SI³ triggers I³ server is similar to rendezvous server Basic Idea: Separation of data / control traffic Use SI³ to route HIP control packets Data packets via HIP IPsec protected end-to-end traffic C. Today I³SI³HIPHI³
28
28/32 HI³ Architecture (id PUB,R) Client (C) Server (S) Public/private trigger insertion (id PRI,R) C. Today I³SI³HIPHI³ I1 private trigger IPsec protected SI³ HIP
29
29/32 Seperating Data And Control Control traffic: Via SI³ DoS protection Mobility C. Today I³SI³HIPHI³
30
30/32 Seperating Data And Control Data traffic: IPsec / SPI used to implements DoS protection Middle box forwards traffic (destination Address, SPI) HIP mobility C. Today I³SI³HIPHI³
31
31/32 Problems Mobility Multicast, Anycast etc. Protection against Denial of Service Attacks End-to-end security / authentication C. Today I³SI³HIPHI³
32
32/32 The End Questions ? C. Today I³SI³HIPHI³
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.