Presentation is loading. Please wait.

Presentation is loading. Please wait.

P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao

Similar presentations


Presentation on theme: "P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao"— Presentation transcript:

1 P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao melodysong@huawei.com Ben Y. Zhao ravenben@cs.ucsb.edu

2 P2PSIP Security Analysis and evaluation Enrollment Server P2P Layers Application Distributed storage/ replication Routing maintenance/KBR/ NAT/FW traversal Transport Security with each layer must be considered

3 Transport Security To prevent illegal peers/clients participating in the overlay, TLS/DTLS is necessary to authenticate between each association and protect the communication privacy

4 P2PSIP Security Analysis and evaluation Enrollment Server P2P Layers Application Distributed storage/ replication Routing maintenance/KBR/ NAT/FW traversal Transport Security with each layer must be considered

5 Routing Maintenance Security A peer may receive fake routing table entries from malicious neighbors Each DHT must resolve this according to its specific routing table maintenance rules Generally speaking, each peer must verify each new entry in its routing table for correctness Attacks can try to induce security threats by increasing churn Node must waste significant bandwidth to update routing table and replicate transfer stored data The higher the churn rate is, the more entries in one’s routing table turn to be outdated, which will cause lower efficiency

6 KBR Security(1) Intermediate peers may claim to be the destination peer to hijack application component A check mechanism is required to verify if the response is from the responsible peer for desired key This linked paper provide an example for a proof mechanism: http://www.cs.ucsb.edu/~ravenben/publications/pdf /identity-npsec05.pdf http://www.cs.ucsb.edu/~ravenben/publications/pdf /identity-npsec05.pdf

7 KBR Security(2) Misbehaving forwarding by intermediate peer Intentional forwarding to a wrong next hop Discarding incoming messages Modifying the message before forwarding Chosen ID attack make KBR even less secure Malicious nodes can repeatedly request new nodeIDs to obtain some control over nodeID assignment

8 KBR Security(3) Some approaches for protection mechanisms Digital signatures for initial bootstrapping messages One approach is to chain together packet acks to determine responsibility for lost or misrouted messages Secure Node ID assignment mechanism

9 P2PSIP Security Analysis and evaluation Enrollment Server P2P Layers Application Distributed storage/ replication Routing maintenance/KBR/ NAT/FW traversal Transport Security with each layer must be considered

10 Distributed Storage Security Protect data objects against unauthorized data operations Writing data Modification Removal Data poisoning Publish invalid or non-existent data into the overlay Publish victim node’s address as location for a popular data object to induce DDOS attack

11 Distributed Storage Security Storage denial of service attacks Overlays work well for a reasonable amount of data objects, but can easily be overwhelmed by inserting large numbers of objects per node Malicious nodes can publish great amount of junk data to the overlay Replication security is TODO

12 P2PSIP Security Analysis and evaluation Enrollment Server P2P Layers Application Distributed storage/ replication Routing maintenance/KBR/ NAT/FW traversal Transport Security with each layer must be considered

13 Application Security TBD

14 P2PSIP Security Analysis and evaluation Trusted Overlay Base Untrusted Overlay Base

15 Trusted Overlay Base All peers in the overlay are deployed with trusted nodes, e.g. an operator deploys the core CHORD ring of P2P overlay network, and provides services to the ordinary clients by accessing peers in the overlay

16 Possible attacks in the overlay with Trusted Overlay Base

17 P2PSIP Security Analysis and evaluation Trusted Overlay Base Untrusted Overlay Base

18 Peers in a Untrusted P2P Overlay Base are not all trusted. There may exist some malicious behaving nodes in that P2P Overlay Base. All security issues with the Tursted Overlay Base still exist here More security threats emerge

19 More attacks in the overlay with Untrusted Overlay Base

20 Thank You www.huawei.com


Download ppt "P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao"

Similar presentations


Ads by Google