SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.

Slides:



Advertisements
Similar presentations
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Advertisements

Kerberos Assisted Authentication in Mobile Ad-hoc Networks Authors: Asad Amir Pirzada and Chris McDonald Sources: Proceedings of the 27th Australasian.
October 31st, 2003ACM SSRS'03 Tolerating Denial-of-Service Attacks Using Overlay Networks – Impact of Topology Ju Wang 1, Linyuan Lu 2 and Andrew A. Chien.
CIS 459/659 – Introduction to Network Security – Spring 2005 – Class 13 – 4/5/05 1 D-WARD 1  Goal: detect attacks, reduce the attack traffic, recognize.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Technische Universität Yimei Liao Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
Overview of Distributed Denial of Service (DDoS) Wei Zhou.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
Zhang Fu, Marina Papatriantafilou, Philippas Tsigas Chalmers University of Technology, Sweden 1 ACM SAC 2010 ACM SAC 2011.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
1 SOS: Secure Overlay Services Angelos Keromytis, Dept. of Computer Science Vishal Misra, Dept. of Computer Science Dan Rubenstein, Dept. of Electrical.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari alakrishnan.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Secure Overlay Services Adam Hathcock Information Assurance Lab Auburn University.
Using Overlays to Improve Security Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University SPIE ITCom Conference on Scalability and.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Survey of Distributed Denial of Service Attacks and Popular Countermeasures Andrew Knotts, Kent State University Referenced from: Charalampos Patrikakis,Michalis.
3/30/2005 Auburn University Information Assurance Lab 1 Simulating Secure Overlay Services.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Exploring the Functions of Routing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
WAN Technologies.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1. SOS: Secure Overlay Service (+Mayday) A. D. Keromytis, V. Misra, D. Runbenstein Columbia University Presented by Yingfei Dong.
Seminar Presentation IP Spoofing Attack, detection and effective method of prevention. Md. Sajan Sana Ansari Id: /8/20151.
Communication (II) Chapter 4
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Jonathan Walpole CSE515 - Distributed Computing Systems 1 Teaching Assistant for CSE515 Rahul Dubey.
1 Reading Report 5 Yin Chen 2 Mar 2004 Reference: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications, Ion Stoica, Robert Morris, david.
Chapter 8: Virtual LAN (VLAN)
Cisco 3 - LAN Perrine. J Page 110/20/2015 Chapter 8 VLAN VLAN: is a logical grouping grouped by: function department application VLAN configuration is.
The Network Layer Introduction  functionality and service models Theory  link state and distance vector algorithms  broadcast algorithms  hierarchical.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
SOS: Secure Overlay Services A.Keromytis, V. Misra, and D. Rubenstein Presented by Tsirbas Rafail.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Tracy Wagner CDA 6938.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
SOS: An Architecture For Mitigating DDoS Attacks Angelos D. Keromytis, Vishal Misra, Dan Rubenstein ACM SIGCOMM 2002 Presented By : Hiral Chhaya CDA 6133.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
P2PSIP Security Analysis and evaluation draft-song-p2psip-security-eval-00 Song Yongchao Ben Y. Zhao
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
SOS: An Architecture For Mitigating DDoS Attacks Authors: Angelos D. Keromytis, Vishal Misra, Dan Rubenstein. Published: ACM SIGCOMM 2002 Presenter: Jerome.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Virtual Local Area Networks or VLANs
Defending Against DDoS
Defending Against DDoS
Presentation transcript:

SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG 2002 Presented by Wei Zhou

References  A. Keromytis, V. Misra and D. Rubenstein, “ SOS: Secure Overlay Services ”, the Proceedings of the ACM SIGCOMM Conference, August 2002  D. Cook, “ Analysis of Routing Algorithms for Secure Overlay Service ”, Computer Science Department Technical Report CUCS , 2002

Outline  Introduction  System Design Rationale  System Architecture  Performance Analysis  Discussion

Introduction – the problem  The Communication by Emergency Services A critical service (the target) that resides in a well-known location (i.e. IP address). A group of pre-confirmed users, located anywhere in the wide-area network, who have authentication to communicate with that location. Example scenario  Without protection, such a service can be easily flooded by DDoS attacks

Design Rationale  Intuition A firewall standing in front of the server  One firewall is NOT enough Firewall Server

Design Rationale (cont.)  Replicate the firewall functionality, thus have a distributed firewall network.  A dedicated router set filtering packets that are not from one of the firewalls.  Assume high-powered routers with light-weight computation. Server Filtering router set

Design Rationale (cont.)  How to deal with spoofed traffic purporting to originate from one of these firewalls.  Target selects a small set of these firewalls as the designated authorized forwarding stations, and hides their identities to the public.  Why overlay network? Highly dynamic nature – a node can easily join in or be taken out from an overlay network. High level of connectivity – there is a (logic) link between any pair of participating nodes in an overlay network.

System Architecture – version 1 Source Point SOAP Secret Servlet Secret Servlet Secret Servlet Target Overlay nodes Filtered region

System Architecture (cont.)  Preliminary routing mechanism Each node receiving a packet forwards the packet to another randomly chosen overlay node, until the packet reaches a secret servlet. Not efficient  suppose N overlay nodes and Ns secret servlets, the expected number of intermediate overlay network nodes that a packet will have to go through is O(N/Ns).  Enhanced routing mechanism Actually CHORD service Enhance the routing efficiency to O(logN) Need to introduce one more type of nodes, beacon, who also knows the identity of the secret servlet

System Architecture – version 2 Source Point SOAP Secret Servlet Secret Servlet Secret Servlet Target Beacon Overlay nodes Filtered region

Overlay Routing Algorithm – CHORD Service m = 5  Each node with an ID via a hash function.  Suppose 2 m possible ids.  Each node contains a table of m entries.  The i th entry in the table of node x is the 1 st node whose id is >= (x + 2 i-1 (mode 2 m ))  If node x receives a packet destined to node y, it forwards the packet to the node in its table whose id is closest to, but <= y  For a node y not in the overlay, the node whose id is closest to but >= y stores information about y (i.e. knows that y is not in the overlay) : : : : : : : : : : : 22 :

Overlay Routing Algorithm – CHORD Service  CHORD guarantees that a packet will get to its destination through no more than logN nodes, where N is the size of the overlay.  Multiple destination nodes for a given identifier can be created by using different hash functions. (e.g. the target ’ s IP can be mapped to several beacons)  By choosing the right class of hash functions, the sequences of nodes used to carry a packet from a node to the destination are independent from one another. (e.g. the paths from a source to different beacons are independent)  CHORD is robust to changes in overlay membership: each node ’ s list is adjusted to account for nodes leaving and joining the overlay.

Architecture Summary  A site (target) selects a number of SOS nodes to act as secret servlets and sets up its filtering perimeter;  A secret servlet, upon informed of its role in the system (request authenticity verified), computes the key k for each of a number of well-known consistent hash functions, based on the target site’s network address range. Each of these keys will identify a number of overlay nodes that will act as beacons for that target site.  Beacons, will be informed by either the servlets or the target of the servlets’ ids (request authenticity verified).  A source must first contact an overlay access point (SOAP). After authenticating and authorizing the request, the SOAP securely routes all traffic from the source to the target to one of the beacons. The SOAP (and all subsequent hops on the overlay) can route the packet to an appropriate beacon in a distributed fashion using Chord by applying appropriate hash function to the target’s address to identify the next hop on the overlay.  The beacon then routes the packet to a secret servlet that then routes the packet (through the filtering) to the target.

Architecture Summary (cont.)  If a SOAP is attacked, the confirmed source point can simply choose an alternate SOAP by which it enters the overlay.  If a node within the overlay is attacked, the node simply exits the overlay until the attack terminates.  If a beacon is attacked, it exits and the CHORD service self-heals by choosing a new node as that beacon for that hash function.  If a secret servlet is attacked or its identity is breached, the target can simply choose alternate secret servlets.

Performance Analysis of SOS  Assumptions An attacker knows all the overlay nodes, and can attack any of them by bombarding them with traffic, however, an attacker can only manipulate finite resources and bandwidth. An attacker does not know which nodes are secret servlets or beacons, nor will they infer these identities. Attackers have not breached the security protocols of the overlay, i.e. their packets can always be identified by SOS nodes as being illegitimate Each legitimate user can access the overlay through a limited number of SOAPs, but different users access the overlay through different SOAPs  Three analysis models A Static Attack Dynamic Attacks and Recovery Attacking the Underlying Network

Performance Analysis (cont.)  A Static Attack P h (a, b, c): the probability that a set of b nodes selected randomly from a ≥ b nodes contains a specific subset of c nodes. Notations:  T – the target  {S i (T)} - the set of secret servlets  U s = |{S i (T)}|  {A i (T)} – the set of SOAPs  U o = |{A i (T)}|  {B i (T)} – the set of beacons  U b = |{B i (T)}|  n a - the number of nodes the attacker attacks  U S,T – a random variable that equals 1 if S can reach T during an ongoing attack and 0 otherwise P r [U T,S = 1] = (1 – P h (N, n a, U s ))(1 – P h (N, n a, U b ))(1 – P h (N, n a, U o ))

Performance Analysis (cont.) U s = U o = U b = 10, n a varies

Discussion  Combines IP Security, IP router filtering, and Overlay network routing techniques.  Proactive mechanism.  SOAPs and secret servlets both are a part of distributed firewalls.  The more the number of nodes in an overlay network, the more effectively the SOS protects its users from DDoS attacks.  Further questions Attacks from inside the overlay A Shared Secure Overlay – scalability issues Timely delivery

Thank you!