Gothic : A Group Access Control Architecture for Secure Multicast and Anycast Paul Judge, Mostafa Ammar Georgia Institute of Technology Presenters: Dheeraj.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
Chapter 14 – Authentication Applications
SCSC 455 Computer Security
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Access control for IP multicast T Petri Jokela
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CSCI283 Fall 2005 GWU All slides from Bishop’s slide set Public Key Infrastructure (PKI)
Secure Multicast Xun Kang. Content Why need secure Multicast? Secure Group Communications Using Key Graphs Batch Update of Key Trees Reliable Group Rekeying.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
School of Information Technologies Internet Multicasting NETS3303/3603 Week 10.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
COS 420 Day 18. Agenda Group Project Discussion Program Requirements Rejected Resubmit by Friday Noon Protocol Definition Due April 12 Assignment 3 Due.
COS 420 Day 14. Agenda Assignment 3 Posted Covers chapters Due March 23 Assignment 4 Posted Chap Due April 6 Individual Project Papers due.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Chapter 4 IP Multicast Professor Rick Han University of Colorado at Boulder
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Multicast Communication
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Research on IP Anycast Secure Group Management Wang Yue Network & Distribution Lab, Peking University Network.
Study of the Relationship between Peer to Peer Systems and IP Multicasting From IEEE Communication Magazine January 2003 學號 :M 姓名 : 邱 秀 純.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Network Security – Part 2 (Continued) Lecture Notes for May 8, 2006 V.T. Raja, Ph.D., Oregon State University.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Secure Group Communication: Key Management by Robert Chirwa.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 9: Fundamentals of Securing Network Communication.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Security Kim Soo Jin. 2 Contents Background Introduction Secure multicast using clustering Spatial Clustering Simulation Experiment Conclusions.
Design and Implementation of Secure Layer over UPnP Networks Speaker: Chai-Wei Hsu Advisor: Dr. Chin-Laung Lei.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Key Management and Distribution Anand Seetharam CST 312.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
1 CMPT 471 Networking II Multicasting © Janice Regan,
Zueyong Zhu† and J. William Atwood‡
Cengage Learning: Computer Networking from LANs to WANs
Advanced Computer Networks
Computer Networks Protocols
Presentation transcript:

Gothic : A Group Access Control Architecture for Secure Multicast and Anycast Paul Judge, Mostafa Ammar Georgia Institute of Technology Presenters: Dheeraj Thumma Boppanna Madhrira

Outline Communication Paradigms Communication Paradigms Security Issues Security Issues Security Objective Security Objective Proposed Design Proposed Design Evaluation Evaluation Conclusion Conclusion

Communication Paradigms Unicast Unicast Point-to-point flow of packets Multicast Multicast Point-to-multipoint flow of packets Anycast Anycast Point-to-point flow of packets

Unicast Point-to-point flow of packets between a source (client) and destination (server) host Server is identified by a unique IP unicast address contained in the header of each packet sent from the client Routers make a best-effort attempt to deliver the packet to the destination host identified by unicast address. Examples - Web-browsing, file transfer (FTP)

Unicast Receiver Sender Receiver

Multicast Point-to-multipoint flow of packets between a single source host and one or more destination hosts. Source host sends a single copy of the packet to group address (e.g ). Destination hosts configured with a multicast group address. Routers deliver the multicast packets to all destination hosts identified by the multicast group address. Example - Broadcast-style videoconferencing

Multicast Receiver Sender Receiver

Anycast Point-to-point flow of packets between a single client and the “nearest” destination server identified by an anycast address. Client sends packets to any one of several possible servers offering a particular service or application but does not really care which one. A single anycast address is assigned to one or more servers contained within an anycast group. Sends packets to an anycast server by placing the anycast address in the packet header. Routers attempt to deliver the packet to a server with the matching anycast address.

Anycast

Must maintain security of transmission, while allowing users to join or leave the multicast session Must maintain security of transmission, while allowing users to join or leave the multicast session New members into the session should not be able to decrypt earlier transmissions, nor should ex-members be able to decrypt later transmissions New members into the session should not be able to decrypt earlier transmissions, nor should ex-members be able to decrypt later transmissions We need a system of changing keys, while assuring ourselves that all legitimate members are able to transmit and receive to/from all other legitimate members We need a system of changing keys, while assuring ourselves that all legitimate members are able to transmit and receive to/from all other legitimate members Multicast Security

Vulnerabilities of Multicast Multicast suffers from increased vulnerability due to: Multicast suffers from increased vulnerability due to: Sessions are frequently advertised Sessions are frequently advertised Greater number of points of vulnerability Greater number of points of vulnerability Attack affects a broader base of people Attack affects a broader base of people Attacker can pose as a legitimate user easier (larger “crowd” of principals) Attacker can pose as a legitimate user easier (larger “crowd” of principals)

Anycast Security Similar issues as in multicast security and more! Unauthenticated server advertisements Anycast server authenticity Secure anycast communications Connection and SA migration – For fault-tolerance

What does ‘security’ need to provide? Authentication Authentication Verify the user is who he says he is Verify the user is who he says he is Authorization Authorization Only admit those with proper authorization into the group Only admit those with proper authorization into the group Integrity Integrity Group members maintain privacy from those not in the group Group members maintain privacy from those not in the group System must be scalable System must be scalable

Gothic Multicast group access control (MGAC) Multicast group access control (MGAC) Control ability of hosts join multicast group Control ability of hosts join multicast group Anycast server group access control (ASGAC) Anycast server group access control (ASGAC) Control the ability of a host to advertise itself Control the ability of a host to advertise itself for the anycast address for the anycast address MGAC + ASGAC = GAC = GOTHIC MGAC + ASGAC = GAC = GOTHIC

Design Goals Maintain Security Maintain Security  Scalable System  Low overhead on Routers  Low message overhead  Low support infrastructure requirements

Functions Group policy specification Group policy specification Specify group policy, authenticate host, verify group owner Specify group policy, authenticate host, verify group owner Group owner ? Group owner ? Access Request Access Request Notify wish to become member Notify wish to become member Access Control Access Control Receive request, authorize Receive request, authorize

Gothic Architecture Group Policy Management System (GPMS) = Specify group policy Group Policy Management System (GPMS) = Specify group policy Group Member Authorization System (GMAS) = Access request + Access control Group Member Authorization System (GMAS) = Access request + Access control

GPMS Group owner provides list of authorized members and the security policy to access control server (ACS) Group owner provides list of authorized members and the security policy to access control server (ACS) Problem – How to verify that host is a group owner? Problem – How to verify that host is a group owner? Solution – Group Owner determination and Authentication System (GODAS) Solution – Group Owner determination and Authentication System (GODAS)

GMAS Perform authorization before host is allowed to become member Perform authorization before host is allowed to become member Authorization protocol Authorization protocol Reauthorizations and Revocations Reauthorizations and Revocations

Authorization Protocol Host H, Router R, Access Control Server (ACS) Host H, Router R, Access Control Server (ACS) Assume H & ACS possess public key pairs or certificates Assume H & ACS possess public key pairs or certificates K +H, K +ACS  public keys K +H, K +ACS  public keys K -H, K -ACS  private keys K -H, K -ACS  private keys CERT K+X  certificate with public key K +x CERT K+X  certificate with public key K +x [message] K-X  digitally signed message [message] K-X  digitally signed message

Authorization Protocol 1. H  ACS : AR = [GID, CERT K + H ] K - H 1. H  ACS : AR = [GID, CERT K + H ] K - H 2. ACS  H : AA = CAP = [IP H, DN H, GID, T exp, CERT K + ACS ] K - ACS 2. ACS  H : AA = CAP = [IP H, DN H, GID, T exp, CERT K + ACS ] K - ACS 3. H  R : JR = CAP 3. H  R : JR = CAP 4. R  H : JA = Status 4. R  H : JA = Status

Reauthorizations and Revocations Protocol uses time-limited capabilities for revocation Protocol uses time-limited capabilities for revocation Members refresh their membership state Members refresh their membership state Problem – Refreshing state heavyweight Problem – Refreshing state heavyweight Solution – Extend lifetime of capabilities Solution – Extend lifetime of capabilities Drawback – Weakens Security Drawback – Weakens Security Tradeoff reauthorization overhead and security Tradeoff reauthorization overhead and security

Ideal – Small revocation window and low reauthorization overhead Ideal – Small revocation window and low reauthorization overhead Proposed Method Proposed Method Host uses the group key as the authenticator Host uses the group key as the authenticator Requires router to possess group key Requires router to possess group key Reauthorizations and Revocations

Group Policy Management System This system involves a group owner providing the list of authorized members and possibly other security policy for the group to the ACS. This system involves a group owner providing the list of authorized members and possibly other security policy for the group to the ACS. How the system verifies that a particular host is the group owner? How the system verifies that a particular host is the group owner? Two solutions are proposed that provide group owner determination and authentication. Two solutions are proposed that provide group owner determination and authentication.

Group owner certificates Similar to traditional digital certificates. The group owner certificate can be issued by a local certificate authority (CA).

Group ownership service This service is a query/reply protocol based service. It accepts queries specifying a particular group address and responds with the identity of the host that owns the group.

Group owner determination and authentication in multicast environments Multicast Address Allocation Architecture (MAAA). Multicast Address Allocation Architecture (MAAA). Source-Specific Multicast (SSM). Source-Specific Multicast (SSM). GLOP GLOP Session Announcement Protocol (SAP)/Session Description Protocol (SDP). Session Announcement Protocol (SAP)/Session Description Protocol (SDP).

Group owner determination and authentication in anycast environments IP Anycast. IP Anycast. Global IP Anycast. Global IP Anycast. Application-Layer Anycast. Application-Layer Anycast.

Group Access Control Aware GKM How the existence of a group access control system changes the requirements of Group key management (GKM)?. How the existence of a group access control system changes the requirements of Group key management (GKM)?. How Gothic integrates with the multicast routing system?. How Gothic integrates with the multicast routing system?. The group access control aware group key management (GACA-GKM) technique leverages the existence of a group access control system to substantially reduce overhead. The group access control aware group key management (GACA-GKM) technique leverages the existence of a group access control system to substantially reduce overhead.

Gothic and Routing System Trusted router correctly authorizes all join requests according to the protocol. An untrusted router is a router that may accept unauthorized join requests or forward fake or unauthorized join requests. Scope of trust extends from the source to the multicast tree and is bordered by trusted routers. Trusted subtree is a subtree of the multicast tree rooted at a trusted router.

GACA-GKM GKM focuses on dynamic group problem. When a member joins or leaves, the group key must be changed so that the new member can not decrypt past content or the former member can not decrypt future content. GKM focuses on dynamic group problem. When a member joins or leaves, the group key must be changed so that the new member can not decrypt past content or the former member can not decrypt future content. With group access control in place, the host can not receive the encrypted content before it is a member. There are similar implications for a member leave. So, there is no need to rekey the group. With group access control in place, the host can not receive the encrypted content before it is a member. There are similar implications for a member leave. So, there is no need to rekey the group. But if a new member, host A, is on a shared broadcast link with current group member, host B, then A had access to the distribution tree before she became a member. In cases like these we need to rekey the group. But if a new member, host A, is on a shared broadcast link with current group member, host B, then A had access to the distribution tree before she became a member. In cases like these we need to rekey the group. Eavesdropping in the form of wiretaps and network sniffing are also possible. Eavesdropping in the form of wiretaps and network sniffing are also possible.

GACA-GKM technique If a host h joins multicast session G from a trusted subtree that has previously been part of the multicast tree for session G, then a rekey must occur. If a host h leaves multicast session G from a trusted subtree that will remain part of the multicast tree for session G, then a rekey must occur. Otherwise, there is no need to rekey.

Related Work Hardjono and Cain. Hardjono and Cain. They present a method for delivering keys to enable IGMP authentication. They present a method for delivering keys to enable IGMP authentication. The authorization server provides capability-like access tokens to group members and access control list (ACL)- like token lists to routers. The authorization server provides capability-like access tokens to group members and access control list (ACL)- like token lists to routers. Two vulnerabilities identified. Two vulnerabilities identified. Replay attacks and Replay attacks and Malicious users can cause the router to accept fake access tokens since issuer signature is not verified by router. Malicious users can cause the router to accept fake access tokens since issuer signature is not verified by router. Ballardie and Crowcroft. They present a version of IGMP that allows receivers to be authorized before joining the group. The architecture has authorization servers that possess ACLs distributed by an initiator. Two vulnerabilities identified. An unauthorized user can obtain an authorization stamp by authenticating as itself, but then providing the spoofed address of an authorized user. An unauthorized user can cause AS accept an invalid authorization stamp.

Evaluation Gothic evaluation examines the efficiency of Gothic in terms of message overhead and computational overhead. Gothic evaluation examines the efficiency of Gothic in terms of message overhead and computational overhead. The evaluation is done in multicast environment. The evaluation is done in multicast environment. GACA-GKM evaluation shows the reduced message overhead compared to traditional GKM. GACA-GKM evaluation shows the reduced message overhead compared to traditional GKM.

Evaluation To simulate the performance of these schemes, they used data collected by the Mlisten tool over several days for the Mbone multicast of the space shuttle mission STS-80 November The session has a duration of 13 days and over 1600 join requests. This figure shows the group membership over the length of the session.

Gothic Evaluation This figure shows the total network overhead at all last hop routers involved in the system. This figure shows the overall network overhead.

Gothic Evaluation This figure shows the total network overhead at all group members. This figure shows the cumulative network overhead at the ACS.

Gothic Evaluation This figure shows the computational overhead of the three schemes at the router in terms of processing time. The computational overhead of Gothic is an order of magnitude less than that of the other scheme. So the Gothic authorization system achieved its goal of reducing the computational overhead at the router.

GACA-GKM Evaluation In addition to the session trace they also used a trace from a simulated multicast group. This allows to simulate the performance for a range of trusted subtree sizes. The simulated multicast group model has the following parameters: The pool of potential receivers has receivers. Each receiver joins and leaves the group independently. The ratio of active to inactive duration of individuals is 1:10, so the average group size is approximately 5958 during steady state. The length of the group session is 100 τ.

GACA-GKM Evaluation This figure shows the results for the actual mlisten trace data.

GACA-GKM Evaluation This figure shows the simulated trace results. This shows performance in terms of GKM message overhead at the group key controller.

Conclusion This paper has generalized the problem of secure multicast group joins and secure anycast server advertisements problems into a single group access control problem and proposed a framework that includes a group member authorization system and a group policy management system. Proposed Gothic, a secure and scalable group access control architecture based on this framework. Presented a novel authorization system that improves the scalability and security over previous solutions. Identified the need for group owner determination and authentication and proposed two approaches to achieve this.

Conclusion (Contd.) The discussion of group access control was presented in the context of many flavors of multicast and anycast including global IP-anycast, application-layer anycast, source-specific multicast, and application-layer multicast. Suggested that group key management schemes can leverage group access control systems to reduce the overhead involved in GKM. Presented the GACA-GKM technique and presented evaluation results that show the performance improvements. Future work remains in further integrating group access control, group key management, and content distribution.

Thank you. Happy Thanksgiving!!