Using Overlays to Improve Security Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University SPIE ITCom Conference on Scalability and.

Slides:



Advertisements
Similar presentations
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Survey of Key Management for Secure Group Communications Celia Li.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
1 SOS: Secure Overlay Services Angelos Keromytis, Dept. of Computer Science Vishal Misra, Dept. of Computer Science Dan Rubenstein, Dept. of Electrical.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Delivery, Forwarding, and Routing
P2P Course, Structured systems 1 Introduction (26/10/05)
Internet Protocol Security (IPSec)
3/30/2005 Auburn University Information Assurance Lab 1 Simulating Secure Overlay Services.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Communication (II) Chapter 4
Chapter 22 Network Layer: Delivery, Forwarding, and Routing
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
Chapter 13 – Network Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
10/8/2015CST Computer Networks1 IP Routing CST 415.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
Streaming over Subscription Overlay Networks Department of Computer Science Iowa State University.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Computer Networks with Internet Technology William Stallings
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
ACM 511 Introduction to Computer Networks. Computer Networks.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
SOS: Secure Overlay Services A.Keromytis, V. Misra, and D. Rubenstein Presented by Tsirbas Rafail.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Internet Protocol: Routing IP Datagrams Chapter 8.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Hiral Chhaya CDA 6133.
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
SOS: An Architecture For Mitigating DDoS Attacks Authors: Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. Published: ACM SIGCOMM 2002 Presenter: Jerome.
CS 347Notes081 CS 347: Parallel and Distributed Data Management Notes 08: P2P Systems.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Network Layer Lecture Network Layer Design Issues.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
RSVP: A New Resource ReSerVation Protocol
Internet Networking recitation #12
Overlay Networking Overview.
The Network Layer Network Layer Design Issues:
Presentation transcript:

Using Overlays to Improve Security Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University SPIE ITCom Conference on Scalability and Traffic Control in IP Networks IISPIE ITCom Conference on Scalability and Traffic Control in IP Networks II, Boston, MA, July 2002 Presented by Preeti Phadnis

Outline  Introduction  Features of Network Overlays  Security Paradigms  SOS: Secure Overlay Service Solutions  Discussions

Introduction  Internet not designed to handle to handle intentional attacks like DDoS  DDos: attacks that attempt to overwhelm the processing or link capacity of the target site by saturating it with bogus packets.  Designers of internet assumed that Internet would operate in friendly environments.  “End-to-End Principle” basic premise behind the protocol design.

End-to-End principle  Easier to replace and update routers inside the network since fewer requirements to satisfy.  Limiting code to simple tasks reduces likelihood of software/ hardware bugs or algorithmic flaws that bring the network down.  Extending the network is easier.  But inadequate at protecting the networks from attacks

DDos  Focus of DDoS countering mechanism has been on reaction  Focus on detecting the source of DoS attacks in progress by pushing some filter rules on routers as far away from the target of the attack as possible.  Introduce a protocol that will be used by relatively small subset of the nodes of the internet as opposed to requiring the introduction of new protocols that must be deployed by end systems.  Also these protocols are fairly transparent to protocols, applications.

Network Overlays  It is a virtual network constructed upon an underlying, physical network.  The participating end systems act as routers within this virtual network  A link between two end-systems is formed from a physical path (e.g. IP route) that connects these two end systems.  Many available links increases the flexibility of the network, and a more flexible network is less likely to be susceptible to attacks.  Overlays provide stronger security by increasing the potential set of paths a flow can take through the underlying network, which in turn complicates the attacking procedures.

Overlay Networks and Multicast  Initial use was to enable multicast within the network- application layer multicast.  Multicast trees formed atop overlays: several end-systems would act as multicast forwarding points, sending copies of the transmission simultaneously to several additional end systems.  Trees can be adjusted dynamically to meet the needs of applications much more easily than in their network-layer multicast alternative

Overlay Networks and Unicast  Improve performance and robustness of unicast routing by providing alternate paths from a particular source to a particular destination along paths that proceeded through intermediate end systems.  Despite the additional overhead of passing through multiple end-system nodes, it was often the case that such alternate paths would provide routes with smaller source-to-destination delivery latencies than the underlying, direct IP path.  In addition, an alternate path for communication would often remain active when routing anomalies caused disruptions along the underlying IP path.

Network Overlays and P2P  Overlays have seen wide deployment as a means of exchanging content between peers.  Peer-to-peer (P2P) networks such as Gnutella are overlays where peers- the end-systems that participate in the protocol – assist one another by forwarding or responding to search requests for content.

Full connectivity of the overlay graph  Physical Networks  topological position limits the sets of pairs of routers that can be directly connected  Physical limitations bind the number of neighbors  Overlay Networks  Any virtual router can connect to any other virtual router  Communication complexity limits the set of neighbors. They focus on choosing the right set of neighbors.

Dynamics in the membership of virtual routers  Physical Networks  Router ceases to perform its task when either it is disconnected from the network or an anticipated failure occurs  Overlay Networks  Protocols run atop overlays expect frequent changes in topology, as end- systems enter and exit from participating within a specific application.

Improving security  Robustness- Since overlays increase a network’s robustness, attackers will have a more difficult time bringing down the network.  Dynamics: Since participants of the overlay come and go, there is a greater challenge in even deciding what to attack.  Increased Alternatives: Network routing typically provides a single path between two points. In contrast, overlay routing offers a seemingly limitless set of paths between two points. Thus, an attacker that wishes to bring down a particular communication must be prepared to attack a much larger portion of the network when overlays are used.

Security Paradigms  Data Confidentiality: keeping communication contents secret from potential eavesdroppers.  Data Integrity: ensuring that what was received by the recipient of a message is what was originally sent by the sender.  Privacy: “scrubbing” different sessions by the same user such that they cannot be correlated (for traffic analysis, marketing, or spying purposes).  Authentication: determining or verifying the identity of an entity (user, network node, etc.).  Access Control: restricting access to sensitive data or resources to only authorized users.

A Secure Overlay Service Solution  The goal of the SOS architecture is to allow communication between a confirmed source point and a target.  The source must be authenticated and authorized by the SOS infrastructure before traffic is allowed to flow between itself and the target through the overlay.

SOS  Attackers exist in the network that are interested in preventing traffic from reaching the target.  These attackers have the ability to launch DoS attacks from a variety of points around the wide area network called compromised locations.  The number and bandwidth capabilities of these compromised locations determine the intensity with which the attacker can bombard a node with packets, effectively shutting down that node’s ability to process legitimate traffic.  Without SOS, knowledge of the target’s IP address is all that is needed in order for a moderately provisioned attacker to bring down the target site.

SOS Architecture

Components of SOS Architecture  Targets: Target nodes wish to receive transmissions from validated sources and wish to be protected from phony (i.e., un-authenticated) transmissions. Heavy filtering is applied in the immediate vicinity of the target to protect it from unwanted traffic.  Secret Servlets: Nodes that participate on the overlay and act as the (only) entry point to a target. Their identities are kept as secret as possible.  Beacons: A beacon is a node that participates on the overlay. It receives traffic destined for a particular target and, after verifying the legitimacy of the traffic, forwards it to a secret servlet. Hence, beacons are aware of the identities of some of the secret servlets for the targets for which they act as a beacon.

Components of SOS Architecture  Overlay Access Point (OAP): A node that participates on the overlay that accepts traffic from “approved” source points that wish to use the overlay to reach a given destination.  Source points: A node on or off the overlay that wishes to send a (legitimate) transmission to a target. It is assumed that source points have been granted permission by the target during an earlier exchange (e.g., have received an appropriate certificate through ).  Attack point: Any node that has been compromised and can be used to launch an attack or snoop the source from where a packet came or destination to where a packet is going (both next hop and final).

Filtering at the target Assumptions  Filtering done at a set of high powered routers such that these routers can handle high loads of traffic.  Possibly there are several, disjoint paths leading to the target, each of which is filtered independently.  When using Overlays, still possible for a arbitrary packet to reach the target even when intensive filtering is applied by forwarding traffic to locations in the overlay whose addresses are permitted to pass through the filter.

2 Properties for providing security  Attackers should not be given the identities of the IP addresses of the nodes that can proceed through the filter. Otherwise, an attacker could pass through the filter by simply spoofing the IP address.  Legitimate clients at confirmed source points should be able to reach the nodes with unfiltered IP addresses.

Secret Servlets  A node Ns is a secret servlet for a target node Nt if the filter around Nt permits packets whose source address is (the IP address of) Ns to pass through the filter.  The set of secret servlets used by a given target Nt is selected by the target itself.  The target notifies these nodes (in private) of their role as secret servlets.  The set of routers that the target needs to notify is fixed and filtering rules simply straightforward.

Access Points  Not every legitimate client resides on an overlay network.  Access points give access to the overlay networks to the legitimate clients.  The IP addresses of access points may be made public, or may only be revealed to legitimate clients.

Access points  A legitimate client chooses a node Na from a list of access points and initiates a secure communication with that node using a protocol such as IPsec.  Hence, when Na agrees to act as the access point for this client, it has confirmed both the client’s right to communicate with the target as well as the IP address of the client. Subsequent traffic between the access point and the client may be protected (again, by IPsec).  If Na fails for any reason (including a DoS attack upon Na) the legitimate client can simply move to another access point elsewhere in the network to continue transmitting to the target.

Overlay Routing  Routing should be robust to attacks.  Efficient transition to an alternate path Chord Service  The service is implementable atop the existing IP network structure.  Chord provides a means to map (hash) the key to a particular subset of nodes that are active members of the overlay and contain the information that is associated with the key.  It is simple to produce multiple mappings (hash functions) that produce different paths to different sets of destination nodes (i.e., each path can be thought of as being selected at random).  The service is robust to changes in overlay membership.  Not all nodes that route a packet within Chord using key need to know the IP address of the final destination to which Chord routes the packet.

Chord Routing  Any node that is a destination of a route using a key formed by hashing upon the target’s IP address is called that target’s beacon for that hash function.  When a packet is approved by an access point for transmission, the hash on the IP address of the target is used as the key. Hence, Chord provides a robust and reliable while relatively unpredictable means of routing packets from an access point to one of several beacons.

Chord routing  The final step in the architecture involves getting packets from beacons to secret servlets.  Nodes that act as beacons respond to queries (transmitted securely over the overlay) that ask them to identify themselves as a beacon for a given hash function and target location.  This allows secret servlets to locate beacons for a given hash function and inform those beacons of their identity as secret servlet.

Sequence of operation 1) A site (target) selects a number of SOS nodes to act as secret servlets; that is, nodes that are allowed to forward traffic to that site. Routers in the perimeter of the site are instructed to only allow traffic from these servlets to reach the internal of the site’s network. 2) When an SOS node is informed that it will act as a secret servlet for a site (and after verifying the authenticity of the request), it will compute the key k for each of a number of well-known consistent hash functions, based on the target site’s network address range. Each of these keys will identify a number of overlay nodes that will act as beacons for that target site.

Sequence of operations 3) Having identified the beacons, the servlets will contact them and notify them of their function. Beacons, after verifying the validity of the request, will store the necessary information to forward traffic for that site to the appropriate servlet. 4) A source that wants to communicate with the target contacts an overlay access point (OAP). After authenticating and authorizing the request, the OAP routes all traffic from the source to the target to one of the beacons. The OAP (and all subsequent hops on the overlay) can route the packet to an appropriate beacon in a distributed fashion using Chord by using computation of the hash function(s) over the target’s address to identify the next hop on the overlay. 5) The beacon then routes the packet to a secret servlet that then routes the packet (through the filtering) to the target.

Robustness against DoS attacks  If an access point is attacked, the confirmed source point can simply choose an alternate access point by which it enters the overlay.  If a node within the overlay is attacked, the node simply exits the overlay and the Chord service self- heals, providing new paths to (potentially new sets of) beacons. Furthermore, no node is more important or sensitive than others — even beacons can be attacked and are allowed to fail.  If a secret servlet is attacked (either due to a lucky random hit or somehow its identity was compromised), the secret servlet (which can still send traffic outward) can notify the target and the target can choose alternate secret servlets.  If a secret servlet’s identity is discovered and attacks arrive at the target with the source IP address of some secret servlet, the target can choose an alternate set of secret servlets.

Simulations Target = 20 resources, Legitimate and attack traffic utilize 1 resource

Simulations Attack traffic load 200, recompute blocking probability, BG = old blocking probability/new blocking probability

Simulations RG = old probability/ new probability

Simulations N = Number of overlay nodes

Discussion  Hurdles toward applying overlays to secure networks  Attacks from inside the overlay  Shared Secure Overlay  Timely delivery

Big Deal about the paper  Think beyond end to end principle  Concept of overlay networks new and interesting  Can improve network security but a substantial increase in complexity and delay increases.