Diagnosis on Computational Grids for Detecting Intelligent Cheating Nodes Felipe Martins Rossana M. Andrade Aldri L. dos Santos Bruno SchulzeJosé N. de.

Slides:



Advertisements
Similar presentations
Security in Mobile Ad Hoc Networks
Advertisements

Modeling and Simulation By Lecturer: Nada Ahmed. Introduction to simulation and Modeling.
Secure Multiparty Computations on Bitcoin
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
SecureMR: A Service Integrity Assurance Framework for MapReduce Wei Wei, Juan Du, Ting Yu, Xiaohui Gu North Carolina State University, United States Annual.
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
URSA: Providing Ubiquitous and Robust Security Support for MANET
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
GridFlow: Workflow Management for Grid Computing Kavita Shinde.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Random Key Predistribution Schemes for Sensor Networks Authors: Haowen Chan, Adrian Perrig, Dawn Song Carnegie Mellon University Presented by: Johnny Flowers.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Fault-tolerant Adaptive Divisible Load Scheduling Xuan Lin, Sumanth J. V. Acknowledge: a few slides of DLT are from Thomas Robertazzi ’ s presentation.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Byzantine Generals Problem in the Light of P2P Computing Natalya Fedotova Luca Veltri International Workshop on Ubiquitous Access Control July 17, 2006.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Conference title 1 A Few Bad Apples Are Enough. An Agent-Based Peer Review Game. Juan Bautista Cabotà, Francisco Grimaldo (U. València) Lorena Cadavid.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
SecureMR: A Service Integrity Assurance Framework for MapReduce Author: Wei Wei, Juan Du, Ting Yu, Xiaohui Gu Source: Annual Computer Security Applications.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
DCE (distributed computing environment) DCE (distributed computing environment)
Distributed Systems: Concepts and Design Chapter 1 Pages
A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Nasser Alsaedi. The ultimate goal for any computer system design are reliable execution of task and on time delivery of service. To increase system.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
The Sybil Attack in Sensor Networks: Analysis & Defenses
Co-Grid: an Efficient Coverage Maintenance Protocol for Distributed Sensor Networks Guoliang Xing; Chenyang Lu; Robert Pless; Joseph A. O ’ Sullivan Department.
Summary of Distributed Computing Security Yifeng Zou Georgia State University
Advanced Spectrum Management in Multicell OFDMA Networks enabling Cognitive Radio Usage F. Bernardo, J. Pérez-Romero, O. Sallent, R. Agustí Radio Communications.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
NGMAST 2008 A Proactive and Distributed QoS Negotiation Approach for Heterogeneous environments Anis Zouari, Lucian Suciu, Jean Marie Bonnin, and Karine.
CprE 458/558: Real-Time Systems
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Mitigation strategies on scale-free networks against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Chris Chang.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
SOCIAL HOUSEKEEPING THROUGH INTERCOMMUNICATING APPLIANCES AND SHARED RECIPES MERGING IN A PERVASIVE WEB-SERVICES INFRASTRUCTURE WP8 – Tests Ghent CREW.
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
EFFICIENT STRATEGIES FOR REPRESENTING AND EVALUATING THE EFFECT OF PROPAGATION IMPAIRMENTS ON THE PERFORMANCE OF WIRELESS COMMUNICATIONS SYSTEMS Presented.
Minimizing the Impact of Denial of Service Attacks on a Virtualized Cloud Adel Abusitta, PhD Student (First year) Supervisors: Pr. Martine Bellaiche and.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Fundamentals of Fault-Tolerant Distributed Computing In Asynchronous Environments Paper by Felix C. Gartner Graeme Coakley COEN 317 November 23, 2003.
Unreliable Failure Detectors for Reliable Distributed Systems Tushar Deepak Chandra Sam Toueg Presentation for EECS454 Lawrence Leinweber.
In the name of God.
Presented by Edith Ngai MPhil Term 3 Presentation
Security of Grid Computing Environments
Similarities between Grid-enabled Medical and Engineering Applications
Cristian Ferent and Alex Doboli
Effective Replica Allocation
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Overview Activities from additional UP disciplines are needed to bring a system into being Implementation Testing Deployment Configuration and change management.
Presentation transcript:

Diagnosis on Computational Grids for Detecting Intelligent Cheating Nodes Felipe Martins Rossana M. Andrade Aldri L. dos Santos Bruno SchulzeJosé N. de Souza

Grid Computing Collaborative work among environment devices Heterogeneity Geographical dispersion Transparent access to resources Jobs results must not be manipulated Damage to applications Recomputing and high cost in terms of performance It is necessary to meet requirement of integrity processing Mechanism for detecting manipulation of results to prevent malicious attacks or subversion of resources

A Grid Computing Diagnosis Model for Tolerating Manipulation Attacks Preventing corruption in the grids Verification of processing integrity Detection, prevention and exclusion of misbehaving hosts (nodes) Main contribution A distributed and hierarchical system- level diagnosis model based on information on the reputation of the nodes A security layer implemented in the GridSim simulator

Executor nodes Resources providers Tester nodes Responsible for providing resources and testing the Executor nodes A tester node is also a executor node, but the reciprocal is not true Ultra-Reliable nodes (UR) Each UR node is responsible for a set of nodes (cluster) An UR node may apply tests, validate the perceptions from tester nodes and elevate the status of nodes of it’s cluster Components

Example UR node (gatekeeper) Cluster UR node (gatekeeper) Cluster Tester B Tester A UR node (gatekeeper) Tester B UR node Cluster B Cluster A

Diagnosis Procedure Tester nodes send two different test jobs to the same executor node Executor node sends the results back to the respective tester nodes Tester nodes send their perceptions on the executor node to the UR node which evaluates the behavior This process is repeated until all the nodes of the cluster have been tested Tester node UR node Executor node Test job x Test job y Result of the Test job x Result of the Test job y Perception on the executor node Perception on the executor node

Malicious Nodes Fool Always return arbitrary results Common Return arbitrary results with a certain fixed probability Intelligent Provide resources and contribute for a while, until they get good reputation and start to return arbitrary results

Voting UR nodes with highest reputation test each other If a given UR node acts in a suspicious way, a diagnosis group will decide whether it is a malicious (cheating) or idoneous node Honeypots Node that emulate a certain behavior in order to detect if an UR node is offering a correct diagnosis about its cluster Model Extended

If an UR node verifies that another UR node has responded in a arbitrary way, the latter will be considered as suspected Then, it is invoked a diagnosis group formed by highest reputation UR nodes Each member of the group creates a test job and send it to the suspect node Suspected node sends the results back to the group, that compares them against the expected results Diagnosis Group

The perceptions from all members of the group about the suspected UR node are broadcasted and exchanged Through a majority voting scheme the group diagnoses the behavior of the suspected UR node If the suspected UR node is considered as cheating, then the highest reputation node into the diagnosis group (the coordinator) will exclude the malicious UR node from the grid, putting it in a blacklist and redistributing it’s the executors and tester nodes Decision-Taking X

Algorithm

Evaluation of the Model GridSim v 3.3 New features introduced Creation of a graphical interface Two scenarios  with and without the decision-taking algorithm and honeypots Initially, a unique UR node Maximum of 200 executor nodes and 10 URs Detected malicious nodes  blacklist Admission of new nodes after each test round Variation of percentage of malicious nodes (executor and URs) Variation of frequency of test rounds

Metrics Degree of Detection Number of detected malicious nodes Accuracy Number of jobs correctly processed Total number of jobs Cost Number of test-jobs Total number of jobs

Detection of Malicious Nodes Variation on the total of malicious nodes detected is irrelevant with only 10% of intelligent cheating UR nodes The bigger the presence of cheating UR nodes in the environment, the stronger is the system All cheating UR nodes are detected, no matter the quantity of malicious nodes in the grid nor the frequency of the tests

Accuracy In every case, the accuracy achieved through the proposed strategy is significantly higher With 1/6 of executors nodes acting in a malicious way and 10% of intelligent cheating nodes in the grid, we obtain an accuracy of 99.4% Comparatively, accuracy is even higher when there is more intelligent cheating nodes in the grid

Processing Cost With tests occurring every 12 hours, the cost increases from 12.3% to 17%, using the proposed strategy Cost does not depend on the quantity of malicious executor nodes nor intelligent cheating UR nodes, but only the frequency of round tests

Graphical Interface It makes easier the interpretation of the dynamics of the grid and the results It allows the creation and configuration of scenarios in a quick way It shows the events (testing procedure, detection and exclusion of malicious nodes, elevation of reputation, etc) in real time during the simulation

Conclusion The use of system-level diagnosis is an efficient solution Heterogeneous and dynamic nature of the grids Detection of all malicious nodes, even those who act rationally Diagnosis model proposed A hierarchical, distributed and reputation-based approach It meets the processing integrity requirement, without an additional infrastructure, such as cryptographic keys

Future Work A more extensive evaluation of the metrics and scenarios, in order to reduce the cost Implementation of a tool based on the model, in order to incorporate it into a real grid P2P- based, such as OurGrid

Thank you!