JELENA MIRKOVIC (USC) PETER REIHER (UCLA) Building Accountability into the Future Internet In Proc. IEEE NPSec, 2009 Speaker: Yun Liaw.

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

Holding the Internet Accountable David Andersen, Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, Scott Shenker.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
CSC 774 Advanced Network Security
Using Capability to prevent Internet Denial-of-Service attacks  Tom Anderson  Timothy Roscoe  David Wetherall  Offense Team –Khoa To –Amit Saha.
Leveraging Good Intentions to Reduce Unwanted Network Traffic Marianne Shaw (U. Washington) USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on.
CIS 459/659 – Introduction to Network Security – Spring 2005 – Class 13 – 4/5/05 1 D-WARD 1  Goal: detect attacks, reduce the attack traffic, recognize.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Survey of Secure Wireless Ad Hoc Routing
NPLA: Network Prefix Level Authentication Ming Li,Yong Cui,Matti Siekkinen,Antti Ylä-Jääski Aalto University, Finland Tsinghua University, China.
FastPass: Availability Tokens to Defeat DoS Presented at CMU Systems Seminar by: Dan Wendlandt Work with: David Andersen & Adrian Perrig.
Chapter 5 Network Security Protocols in Practice Part I
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Efficient and Secure Source Authentication with Packet Passports Xin Liu (UC Irvine) Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas.
Wide-area cooperative storage with CFS
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
SSH Secure Login Connections over the Internet
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
The Case for Public Work Wu-chang Feng, Ed Kaiser Supported by:
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Implementing EFECT Easy Fast Efficient Certification Technique Ivan Nestlerode Bell Labs Lucent Technologies Based on EFECT paper by: Phil MacKenzie, Bell.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Karlstad University IP security Ge Zhang
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Merkle trees Introduced by Ralph Merkle, 1979 An authentication scheme
Shambhu Upadhyaya 1 Ad Hoc Networks – Network Access Control Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 20)
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Ari Juels, J. Alex Halderman and Edward W. Felten.
Prepared by Dr. Lamiaa Elshenawy
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
By Team Trojans -1 Arjun Ashok Priyank Mohan Balaji Thirunavukkarasu.
Adam Bender, Neil Spring Dave Levin, Bobby Bhattacharjee University of Maryland, College Park In Proc. USENIX SRUTI, 2007 Speaker: Yun Liaw Accountability.
Ch 6: DNSSEC and Beyond Updated DNSSEC Objectives of DNSSEC Data origin authentication – Assurance that the requested data came from the genuine.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
K. Salah1 Security Protocols in the Internet IPSec.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Cryptography CSS 329 Lecture 13:SSL.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
Preventing Internet Denial-of-Service with Capabilities
ITIS 6010/8010 Wireless Network Security
Presentation transcript:

JELENA MIRKOVIC (USC) PETER REIHER (UCLA) Building Accountability into the Future Internet In Proc. IEEE NPSec, 2009 Speaker: Yun Liaw

Nuggets of Wisdom for Accountability 07/21/09 Speaker : Yun Liaw 1 Accountability mandates perfect identification of actors Identification of sources must be cheap enough to be universal Traffic filtering should occur as close to the sources as possible It is desirable that servers can identify malicious clients before having any interaction with them

Contribution and Overview 07/21/09 Speaker : Yun Liaw 2 Identify Spoofing Elimination: Lightweight unspoofable signature Reducing Unwanted Traffic: Capability scheme built on top of unspoofable identities Client reputation system

Identity Spoofing Elimination 07/21/09 Speaker : Yun Liaw 3 Solution: To attach an unspoofable source signature to each packet Mechanism: Trapdoor hash function with inversion property

Trapdoor Hash Functions 07/21/09 Speaker : Yun Liaw 4 Hash key (public key): HK Trapdoor key (Private key): TK One-way trapdoor hash function: h( )  Cheap to compute h(x) by knowing HK  Collision free  If TK is known, it is easy to find collision

Using Trapdoor Hash Functions for Identity Spoofing Elimination 07/21/09 Speaker : Yun Liaw 5 1. Source publishes HK and the verification token V. And also enumerates sending packets with an increasing sequence number. 2. Verifiers store HK and V to verify the source. And also keep a short record of sequence numbers to prevent replay attacks

Using Trapdoor Hash Functions for Identity Spoofing Elimination 07/21/09 Speaker : Yun Liaw 6 3. The source use any hash function to compute a hash m over the packets and the sequence number, then use the trapdoor key TK to find r so that h(m,r) = V+SEQ p. The packet’s signature is r 4. Verifiers check the packet’s signature by calculating the hash over (m, r)

Using Trapdoor Hash Functions for Identity Spoofing Elimination 07/21/09 Speaker : Yun Liaw 7 SourceVerifier Public Key HK, Verification Token V m: the hash of packet content r: the signature of the packet that can be found by TK Packet, Seq. Number, m, r h(m,r) = V+SEQ p Verifier use HK to compute if h(m,r) = V+SEQ p And check Seq. Number to prevent replay attacks Verifier stores HK, V to perform following verification

Scalability and Cost 07/21/09 Speaker : Yun Liaw 8 Hierarchical signature scheme  Each host signs its packet by the proposed approach  When the packets leave the source AS, the border router verifies the host-level signature and replaces it by the AS-level signature  In case of some untrusted ASes that do not verify host, the capability scheme could restrict the traffic from these Ases Header space: total of 256 bits (including “ticket”) Computing Cost  Signing: 5 modular exponentions  Verification: One hash operation

Key Management 07/21/09 Speaker : Yun Liaw 9 Update of V and HK: Once per day via a push from the source to a representative node in the AS  Representative node: A server or router that updates the new key information to all other routers in the same AS Bootstrapping Key Exchange for Peering Ases  Use traditional public-key approach for key exchange  ASes exchange the public key using out-of-band communication as they establish a peering relation

Reducing Unwanted Traffic 07/21/09 Speaker : Yun Liaw 10 Destination-Generated Ticket Scheme 1. Client issues a ticket request with server ticket to a server 2. Server generates a client ticket T = {sID, sAS, cID, type=‘client’, lastValidTime, S h )  S h = sign(sID, sAS, cID, type=‘client’, lastValidTime) 3. Server’s border router verify S h and replaces it with AS-level signature 4. The client attaches T and S as to each packet 5. The routers on the path validate the freshness and the ticket T The validity of ticket should be short-lived – expected for several seconds

Building Client Reputations 07/21/09 Speaker : Yun Liaw 11 Client-based reputation system: Be used for servers to issue ticket  Whether the ticket should be issued  To prioritize the ticket request handling

Client-Based Reputation System The system collects reports from servers about client who have misbehaved  The report contains client’s identity and the context of the misbehavior  Example: Worm traffic with a rate of x scans to port y per second  Each report need to be accompanied with a traffic sample for proving the report context  The report from a server must be authenticated  The client that was a object of a bad report should be notified by the system  The system would aggregate the report into a reputation score 07/21/09 Speaker : Yun Liaw 12

Client-Based Reputation System Short-term reputation system  Giving a higher weight to recent reports and discounting old ones  Are used by servers to accept redeemed clients’ traffic during normal operation Long-term reputation system  Using all reports submitted in a recent and long time interval  Are used during an attack, which leads to dropping of redeemed clients’ traffic 07/21/09 Speaker : Yun Liaw 13

Deployment of Reputation System Peer-to-peer design  Each AS deploys a local reputation center  Reputation centers propagate reports or reputation scores Compromised reputation center  A center’s peer can monitor its updates and vouch for correct score calculation  A server may need to contact several reputation centers for an update to minimize the risk of lying 07/21/09 Speaker : Yun Liaw 14

Deployment of Reputation System The overhead of reputation system communication  May be large due to large-scale security incident, such as worm attack  A server should aggregate all its report within some interval into a combined report The distribution of reputation scores  Periodically download by reputation users (server)  Push by center when numerous bad reports indicate a large- scale Internet incident 07/21/09 Speaker : Yun Liaw 15

Related Work Spoofing Elimination  Passport, SPM Unwanted Traffic Handling  TVA, SIFF: Route-dependent DoS limiting architecture  Routers mark packets on route to destination, if destination accepts the communication, it would return the marks to the source as the “ticket”  Route-dependent architecture is invalid when route changes  Inflict collateral damage when ticket-request flooding Client Reputations 07/21/09 Speaker : Yun Liaw 16

Future Works Implementation PKI (for bootstrapping) Issue of handling packets that come from malicious sources: indemnification system Algorithms for computing reputation score 07/21/09 Speaker : Yun Liaw 17

Comments This is a conceptual paper which introduce some useful thoughts for enhance accountability No concrete analysis or system implementation Still have much issues to breakthrough 07/21/09 Speaker : Yun Liaw 18