The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems IS523 Class Presentation KAIST Seunghoon Jeong 1.

Slides:



Advertisements
Similar presentations
A Network Positioning System for the Internet T. S. Eugene Ng and Hui Zhang USENIX 04 Presented By: Imranul Hoque 1.
Advertisements

Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
Intel Research Internet Coordinate Systems - 03/03/2004 Internet Coordinate Systems Marcelo Pias Intel Research Cambridge
Fabián E. Bustamante, 2007 Meridian: A lightweight network location service without virtual coordinates B. Wong, A. Slivkins and E. Gün Sirer SIGCOM 2005.
Containing DoS Attacks in Broadcast Authentication in Sensor Networks (Ronghua Wang, Wenliang Du, Peng Ning) Containing DoS Attacks in Broadcast Authentication.
Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang Tian He Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis.
1 BGP Anomaly Detection in an ISP Jian Wu (U. Michigan) Z. Morley Mao (U. Michigan) Jennifer Rexford (Princeton) Jia Wang (AT&T Labs)
Peer-to-Peer Systems Kulesh Shanmugasundaram Security Issues.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems Adil Ahmad.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
IPlane: An Information Plane for Distributed Services Offence by: Anup Goyal Sagar Vemuri.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Vivaldi Coordinate Service Justin Ma, Patrick Verkaik, Michael Vrable Department of Computer Science And Engineering UCSD CSE222A, Winter 2005.
1 Distributed localization of networked cameras Stanislav Funiak Carlos Guestrin Carnegie Mellon University Mark Paskin Stanford University Rahul Sukthankar.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
Self-Correlating Predictive Information Tracking for Large-Scale Production Systems Zhao, Tan, Gong, Gu, Wambolt Presented by: Andrew Hahn.
Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs.
PlanetLab Deployment and Analysis of Network Coordinate Systems Fenglin Liao Keshava Subramanya Veljko Pejovic cs.ucsb.edu.
PAM A Measurement Study of Internet Delay Asymmetry Abhinav PathakPurdue University Himabindu PuchaPurdue University Ying ZhangUniversity of Michigan.
Predicting Communication Latency in the Internet Dragan Milic Universität Bern.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Computer Science Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Presented by Akshay Lal.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Designing a DHT for low latency and high throughput Robert Vollmann P2P Information Systems.
STRENTHENING YOUR EXTERNAL DNS External DNS Overview DNS Background Strengthening External DNS with Anycast Example of an Anycast DNS Service.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Phoenix: A Weight-Based Network Coordinate System Using Matrix Factorization Yang Chen Department of Computer Science Duke University
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Background Subtraction based on Cooccurrence of Image Variations Seki, Wada, Fujiwara & Sumi Presented by: Alon Pakash & Gilad Karni.
Scalable Computing on Open Distributed Systems Jon Weissman University of Minnesota National E-Science Center CLADE 2008.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 Vivaldi: A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris Presented by: Chen Qian.
Secure In-Network Aggregation for Wireless Sensor Networks
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Network Coordinates : Internet Distance Estimation Jieming ZHU
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Network Computing Laboratory 1 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published.
Chapter 6 Conducting & Reading Research Baumgartner et al Chapter 6 Selection of Research Participants: Sampling Procedures.
Ahmad Salam AlRefai.  Introduction  System Features  General Overview (general process)  Details of each component  Simulation Results  Considerations.
A Sybil-Proof Distributed Hash Table Chris Lesniewski-LaasM. Frans Kaashoek MIT 28 April 2010 NSDI
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua University Tsinghua Univ. Oct Experimental Study on Neighbor Selection Policy.
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
Matchmaking for Online Games and Other Latency-Sensitive P2P Systems
Jian Wu (University of Michigan)
Vivaldi: A Decentralized Network Coordinate System
Presenter: Yawen Wei Author: Loukas Lazos and Radha Poovendran
Localization with witnesses
SKIP GRAPHS James Aspnes Gauri Shah SODA 2003.
Providing Secure Storage on the Internet
Scalable Peer-to-Peer Networked Virtual Environment
ITIS 6010/8010 Wireless Network Security
CMPE 252A : Computer Networks
Presentation transcript:

The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems IS523 Class Presentation KAIST Seunghoon Jeong 1

What is Network Coordinate System? P2P, CDN, DHT, … How to measure distance between a pair of nodes Efficient estimation of latency 2 B A C

Embedding Error in Network Coordinates Real value ≈ Estimated value? What if the error is very big? What a coordinate system should do? 3

Existing Network Coordinate Systems Vivaldi – Decentralized – Resilient to network dynamics Pyxida – Implementation of Vivaldi – Open source designed to operate on P2P 4 [Dabek et al.,2004] [Pyxida 2009]

Coordinate Update 5 (1,20) (14,5) Relative Error =|Estimated-Real|/Real =| |/25 = 20.8% Alice update coordinate that reduces error 25ms

Vivaldi is not secure 6 A T V V’ A’ Real RTT Measured RTT

Existing secure mechanism 7 A V V’ Mahalanobis distance, Kalman Filter, Veracity

Frog-Boiling Attack 8 A V V’ Displacements falls inside the threshold

Targeted Attack Goal: make victim report spoiled coordinate to the rest of the network and flagged as outliers and isolated Is frog-boiling attack simple to achieve? 9 V A A A

Three Variant Attacks Basic-Targeted Attack: moves targeted nodes to some coordinate (a) Network-Partition Attack: partitions a network into several subnetworks (b) Closest-Node Attack: attacker becomes the closest node to the victim (c) Honest nodes are shaded whereas malicious nodes are white 10

Mahalanobis Distance Distance measure of a point from a group of values based on the correlation between variables. 11

Mahalanobis Outlier Detection 12 Vivaldi Mahalanobis Outlier Detection Spatial filter’s vector [ Peer’s reported error, change in the peer’s coordinate, the latency ] Temporal filter’s vector [ The remote error, local error, latency, change in the peer’s coordinate, local coordinate change ] Used to update 1.Coordinate 2.History for filters

Convergence Time and Overhead Long-Running Experiment – 400 PlanetLab nodes for almost 2 days with no attackers – Stabilized after 2 hours with low median relative error, rrl, ralp – A network coordinate system does not impose high latency penalty 13 RRL(Relative Rank Loss): pairwise orderings of each neighbor RLAP(Relative Application Latency Penalty: percentage of lost latency

Basic-Targeted Attack Evaluation Coordinate oscillation attack as a baseline – At time 120m, attacker nodes(11%) start to random coordinate attack Basic-Targeted Attack 14

Aggressive Frog-Boiling Attack Evaluation Aggressive step size – Different step size δ is used: 2, 5, 10, 50, 100, 250 (ms) Effectiveness – For the value of 5 or 10, the attack is very effective and fast – For higher values of 50 or 100, the attack is less effective – For the value of 250, the frog-boiling attack is not successful 15

Network Partition Attack Evaluation Both the victim nodes and the rest of the network are moved – Adversaries: 6%, Network1: 37%, Network2: 57% – Network1 is pushed to the location (1000,1000,1000,1000) with height 1000 while Network2 is pushed to the location (-1000, -1000,- 1000,-1000) with height

Closest-Node Attack Evaluation Attacker nodes tries to become the closest node – Every victim node reports the closest neighbor at 10 minutes interval – The fraction of attackers was estimated – Snapshot of 500 minutes 17

Kalman Filter anomaly detection 18 Expectation-Maximization + Parameter calculation Parameter passing For Kalman filter Comparison of predicted relative error and measured error with history and parameter Trusted nodesUnrusted nodes

Kalman Filter Attack Evaluation 8% of nodes are set to trusted nodes with δ =10 19

Veracity Reputation System 20 PV 1. Coordinate report 2. Coordinate verification test 3. RTT delay verification test V’s VSET (determined by V) V’s RSET (randomly chosen by V) Γ = 7 Λ =7

Veracity Attack Evaluation δ = 0.4, Δ = 20%, Γ = 7, Λ =7 Each attack shifts its coordinate by +δ or - δ based on the victim’s unique global identifier GUID Before replying with the forged coordinate to a victim node, the attacker sends out messages to the VSET members to compromise the first step of coordinate verification. Delaying RTT is not necessary. 21

Summary A decentralized network coordinate system with proposed secure mechanisms can be entirely disrupted by more clever attack of the frog-boiling attack. Frog-boiling attack manipulates peers’ required property of coordinate update, and the adversary slowly expands the range of data accepted by the node by influencing the node’s recent history. A secure network coordinate system will need to provide some mechanism to verify a node’s reported coordinates and/or RTTs, which is a challenging problem. 22

Considerations Limitary authentication mechanism dedicated for secure coordinate update can be considered Mixing geographical information with a virtual coordinated can limit the range of victims that attackers can manipulate Each node can be assigned a set of trusted nodes so that their coordinate information impacts majority of portion in a node’s coordinate change. Periodically, each node can be made to verify its coordinate to a set of trusted nodes. If embedding error exceeds a boundary, its coordinate can be made reset by those trusted nodes and its neighbor list is reconstructed. 23