DipZoom: A Marketplace for Internet Measurements Michael Rabinovich, Sipat Tiukose, Limin Wang EECS Department Case Western Reserve University.

Slides:



Advertisements
Similar presentations
U N L E A S H I N G A S E R V I C E S R E N A I S S A N C E SIP SIP Security Jonathan Rosenberg Chief Scientist.
Advertisements

Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Authentication Applications The Kerberos Protocol Standard
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
17/10/031 Summary Peer to peer applications and IPv6 Microsoft Three-Degrees IPv6 transition mechanisms used by Three- Degrees: 6to4 Teredo.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
1 Copyright © 2005, Cisco Systems, Inc. All rights reserved. Applying Security Principles to Networking Applications Mark Enright Dec.
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
H t t p : / / w w w. e e c s. c a s e. e d u / DipZoom A Marketplace for Internet Measurements Faculty: Michael Rabinovich Students: Sipat Tiukose, Zhihua.
DipZoom: A Marketplace for Internet Measurements Michael Rabinovich, Sipat Tiukose, Zhihua Wen Limin Wang EECS Department Case Western Reserve University.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Security Awareness: Applying Practical Security in Your World
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
1 Integrating ISA Server and Exchange Server. 2 How works.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Introduction to Amazon Web Services (AWS)
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Tony McGregor RIPE NCC Visiting Researcher The University of Waikato DAR Active measurement in the large.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
Firewall Security.
Network security Product Group 2 McAfee Network Security Platform.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
1 Agility in Virtualized Utility Computing Hangwei Qian, Elliot Miller, Wei Zhang Michael Rabinovich, Craig E. Wills {EECS Department, Case Western Reserve.
Embedded system security
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
By: Keith Reiter COSC 356. Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary.
KEYNOTE OF THE FUTURE 3: DAVID BECKETT CSIT PhD Student QUEEN’S UNIVERSITY BELFAST.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Skype.
Sheng Jiang (Speaker) Xu Chen Xuan Song Huawei Neighbor Cache Protection in Neighbor Discover Protocol draft-jiang-v6ops-nc-prtection-01 IETF 77 V6OPS.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Web Services Security.
CPS 512 midterm exam #1, 10/5/17 Your name please: NetID:_______ Sign for your honor:____________________________.
Security of a Local Area Network
Jon Peppler, Menlo Security Channels
Using SSL – Secure Socket Layer
Distributed Peer-to-peer Name Resolution
Cloud Computing for Wireless Networks
Presentation transcript:

DipZoom: A Marketplace for Internet Measurements Michael Rabinovich, Sipat Tiukose, Limin Wang EECS Department Case Western Reserve University

Internet Measurements A-priori measurement platforms (e.g. IDMaps) - Great for large-scale characterrizations On-demand measurements (Keynote, Scriptroute/PlanetLab, traceroute servers) –Hard to deploy sufficient platform to serve unpredictable needs –Vulnerable to being gamed –Limited choice of measurements

Needs Focused on-demand measurements Infrastructure that scale with Internet –Measuring host (MH) location –MH type (platform, connectivity) –Measurement type and regime

Example 1: Choosing a CDN CDN measurements –Chinese readership –With/without persistent connections –Repeat/new users Keynote limitations –Only one location in China –Not all measurements offered –Losing CDN cries foul

Example 2: Latency Measurements Measuring latency between a laptop connected through VZACCESS BroadbandAccess and a Linux PC on Case network RTT measured by average of 2000 pings: 280 msec King Measurements

Our Approach Coax Internet users to become measurement providers Deploy a matchmaking service instead of measurement infrastructure Use market approach with real money as the means to control the system

DipZoom: Deep Internet Performance Zoom Anyone can offer measurements Anyone can request measurements Anyone can offer measuring software Participants are free to set their prices, compete for requests, bit and solicit bids, etc. Facilitates open echosystem, ebay for Internet measurements

Some Questions Will anyone want to become a provider? upromise.com, gomez.com suggest yes. Will anyone pay for the measurements? –Keynote and Gomez suggest yes

Related Work Gomez.com –Closed system DIMES, –No incentives –Users participate in a particular measurement Band-X –Marketplace for network capacity

Pros and Cons of Real Money (-) Raises the bar for security (+) Provides incentive for providers (+) Encourages innovation and measurement diversity (+) Addresses the frivolous usage problem (+) Helps prevent some DoS attacks

System Overview UDDI/WSDL/SOAP SSL IOTP

Issues Security and trust Traversing firewalls and NATs

Security Issues Induced DoS attacks against measurment target Open ports on measuring hosts High-level DoS attack against measuring host Measurement side-effects

Trust Payment trust –Trusted core helps –Replay-based cheating Measurement trust –Fake MH registrations –MH impersonation –Fake measurements

Core Needs Integrity of measuring software Globally unique ID of measuring host (MHID) Duplicate detection + request/response matching Measurement rate limiting Building blocks of a solution: –Unique embedded secret –GUID or MAC address or hostID –Nonces –Ranking and calibration

DipZoom Request Credential DipZoom core returns an encrypted credential with response to requesters query Requester includes the credential with request Measuring host –Decrypts nonce –Modifies it using a well known operation (nonce + 1) –Return encrypted nonce with response –Caches nonces for early duplicate detection Nonce/modified nonce addresses request replay and response replay, and third-party response replay attacks MHID addresses the random nonce attack

Ranking and Calibration Security measures raise the bar but do not guarantee protection from malicious MH. If cant protect - detect and blacklist! –Deploy calibrating measurement targets –Purchase measurements from suspect MHs –Compare responses with passive measurements by calibrating hosts Can calibrating hosts be gamed? –Keynote advertises its measuring hosts location –Calibrating hosts are secret –The risk of blacklisting deters data mining

Summary Growing Internet diversity (devices, links, applications) entails growing needs for focused measurements Proprietary platforms are insufficient DipZoom: a facilitator instead of infrastructure –Open system (pricing, measurements, participants) –Market approach to system control –Based on P2P principles Many challenges ahead