Intentional and Unintentional Denial-of- Service in Broadband Access Networks Dr. Jim Martin Associate Professor School of Computing Clemson University.

Slides:



Advertisements
Similar presentations
Requirements Based Evaluation of BPL for Power System Sensing, Command and Control Applications Erich W. Gunther EnerNex Corporation
Advertisements

Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Rahul Amin, Dr. Jim Martin Clemson University, Clemson SC Contact:
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
1 Cyberinfrastructure Framework for 21st Century Science & Engineering (CIF21) NSF-wide Cyberinfrastructure Vision People, Sustainability, Innovation,
Fault Tolerant Routing in Tri-Sector Wireless Cellular Mesh Networks Yasir Drabu and Hassan Peyravi Kent State University Kent, OH
1 Cyberinfrastructure Framework for 21st Century Science & Engineering (CF21) IRNC Kick-Off Workshop July 13,
The Networking Lab in the School of Computing 1 Dr. Jim Martin Associate Professor School of Computing Clemson University
OVERVIEW OF NETWORKING RESEARCH IN NETLAB 1 Dr. Jim Martin Associate Professor School of Computing Clemson University
Priority Queuing Achieving Flow ‘Fairness’ in Wireless Networks Thomas Shen Prof. K.C. Wang SURE 2005.
TECHNOLOGY GUIDE 5 Basics of the Internet and the World Wide Web.
University of Kansas ITTC Research Overview Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science Executive.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Lecture Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web.
Wireless Internet Center for Advanced Technology NSF Industry/University Cooperative Research Center Challenges and Impact of User-provided Networking.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
Lecture 1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network structure,
G52CCN Computer Communications and Networks Milena Radenkovic Room: B47
The Networking Lab in the School of Computing (and how we are helping to evolve broadband access technology) 1 Dr. Jim Martin Associate Professor School.
Submission doc.: IEEE /1258r2 November 2012 Fang Xie (China Mobile)Slide 1 Operator Deployed WLAN for Cellular offload Date:
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
WIRELESS MESH NETWORKS Ian F. AKYILDIZ* and Xudong WANG** * Georgia Institute of Technology BWN (Broadband Wireless Networking) Lab ** TeraNovi Tachnologies.
SMART ANTENNA SYSTEMS IN BWA Submitted by M. Venkateswararao.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
COLUMBIA UNIVERSITY Department of Electrical Engineering The Fu Foundation School of Engineering and Applied Science IN THE CITY OF NEW YORK Networking.
Chapter 7- Mobile and Wi-Fi Networks Taking signals on and off the air Connections to other networks Need to manage spectrum Managing and billing for services.
1 Dr. Jim Martin Associate Professor School of Computing Clemson University Networking Lab’s.
G52CCN Computer Communications and Networks Milena Radenkovic Room: B47
WiMAX, meaning Worldwide Interoperability for Microwave Access Emerging technology that provides wireless transmission of data using a variety of transmission.
5G MOBILE TECHNOLOGY.
Wireless Networks Breakout Session Summary September 21, 2012.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Performance Analysis of Decentralized RAN (Radio Access Network) Selection Schemes December 28 th, 2004 Yang, Sookhyun.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
Assessing the Sensitivity of WiMAX Parameters to MAC-level DoS Attacks Juan Deng and Richard Brooks* Clemson University Abstract The research community.
Overview of Research Activities Aylin Yener
OPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System Karim Habak†, Khaled A. Harras‡, and Moustafa Youssef† †Egypt-Japan University of Sc.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
US Ignite: Track 1: Enabling Connected Vehicle Applications through Advanced Network Technology SC-CVT: South Carolina Connected Vehicle Testbed Jim Martin,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
3G wireless system  Speeds from 125kbps-2Mbps  Performance in computer networking (WCDMA, WLAN Bluetooth) & mobile devices area (cell.
HR/AB/VS, IIT-Bombay 1 Feb 8, 2006 An Opportunistic DRR (O-DRR) Uplink Scheduling Scheme for IEEE based Broadband Wireless Networks Hemant Kr Rath,
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless Networks Instructor: Fatima Naseem Computer Engineering Department, University of Engineering and Technology, Taxila.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 2 Omar Meqdadi Department of Computer Science and Software Engineering.
WiMAX Chapter 11. Wireless Technologies WWAN (proposed) WMAN 70 Mbps ~50 Km a/e WiMAX New standard for Fixed broadband Wireless. Trying to.
1 Wireless Networks Lecture 31 Wireless Mesh Networks Dr. Ghalib A. Shah.
TECHNICAL SEMINAR S V Suresh 08731A1254 By. 1 st GENERATION:  Introduced in 1980  Analog cellular mobile,Data speed 2.4kbps  1G mobiles- AMPS,NMT,TACS.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
Communication Protocol Engineering Lab. A Survey Of Converging Solutions For Heterogeneous Mobile IEEE Wireless Communication Magazine December 2014 Minho.
Chapter 1: Explore the Network
University of Maryland College Park
big data at ericsson research
Smart Learning concepts to enhance SMART Universities in Africa
Presentation transcript:

Intentional and Unintentional Denial-of- Service in Broadband Access Networks Dr. Jim Martin Associate Professor School of Computing Clemson University Website: 1

Talk Overview Introduction Background Network Denial of Service (DoS) Example Research Projects – CyberTiger – Wireless HetNet 2

Clemson’s School of Computing To address the importance of computing throughout all fields, we evolved from a ‘Department’ to a ‘School of Computing’ with Three Divisions – Computer Science – Human Centered Computing – Visual Computing

Academic partners Business partners Government agencies Research & Medical centers Libraries, Museums Policy Biometrics Clouds, Clusters, Data centers Large facilities: turbine windmills, generators windmills, generators Sensors – river, forest, human, automotive, … human, automotive, … Analytics, Forecasting Access, Management Databases, File systems Data Intensive computing Mining Broadband access Campus test beds CybersecurityInternetworking Mobile and wireless systems Applications, Middleware, Systems Interfaces Mobile applications Software engineering Trustworthy computing Virtual environments Accessibility Human computer interaction Learning technologies Simulation and modeling Social computing Education, outreach, training EducationDiscoveryInnovation Clemson Computing Research Ecosystem Algorithms, Theory Computational science Digital Production Arts Eye tracking, Graphics High Performance Computing Visualization Expertise Organizations Scientific Instruments Computation Data Networking Software

Networking Lab’s Mission Vision Statement: – Computing and the Internet are converging – Traditional broadcast video (Cable/Satellite) is converging with the Internet – Networks are becoming more and more ‘heterogeneous’ – The scope of the lab’s interests is more than networking, it includes operating systems, distributed systems, secure and trustworthy systems, and next generation Internet. Collectively these define the term ‘cybersystems’ The networking group focuses on a range of problems that are at the heart of developing and analyzing emerging cybersystems. The mission of the lab is to support cutting edge research in cybersystems AND to train researchers to address the needs of the changing world.. 5

Background: Broadband Internet Access Wired technologies: – DSL, Cable, Fiber-to-the-home Wireless – 3G, WiMAX, 4G Trends – Bigger pipes (Comcast and Verizon both now offer 50 Mbps access connections!) Concern: the Internet works well because core routers serve thousands of flows at any given time. The behavior of one flow is insignificant. The concept applies at the access network. This is changing…. – Emerging wireless networks will involve multiple technologies (femtocells, heterogeneous networks) Concern: wireless systems traditionally have been single, closed systems. Future systems will involve more open, cooperative wireless networks. 6

Network Denial of Service (shared medium access networks) 7 MAC Layer DoS: A DoS that leverages a MAC layer vulnerability. Example: a vulnerability of centralized broadband access schemes (like cable, WiMAX, and emerging 4G systems) have relatively inefficient methods for supporting low bandwidth upstream flows. Intentional DoS: A large number of 4G subscriber station’s are infected with malicious software that is part of a botnet. Unintentional DoS: In a cable access network, a subscriber consumes all available channel bandwidth causing ‘over-the-top’ VoIP calls (e.g., Vonage) by other subscribers to experience poor call quality.

Example Research Projects (intentional DoS) 8 “DoS Vulnerabilities in WiMAX networks” (R. Brooks, J. Martin, Student: J. Deng): Question: how sensitive is the choice of WiMAX system parameters to the effects of DoS attacks caused by infected subscriber computers? “Death by Scanning: Analysis of Worm-like Scanning in a cable network” (J. Martin, Student: Jordan Jueckstock) Question: what is the impact of the scanning activity of modern botnets such as Slammer and Conficker on a cable network?

CyberTiger Creative Inquiry Engage undergrads to work with PhD students on projects that develop applications that facilitate the study of large scale broadband wireless systems Current focus is building tools (server back end, smartphone apps) that provide a measurement and assessment capability of broadband cellular and WiFi data services Recent activities include a report to the FCC on the LACK of cellular infrastructure in SC outside of populated areas CyberTiger serves as a Honeypot – partnering with Clemson’s CCIT, the goals are: To entice and monitor bad guys to attempt to break in Detect infected smartphones on behalf of our user community One contribution of this work is the broader impact on society- we want to ensure everyone in the USA has equal access to measurably robust wireless services CyberTiger Creative Inquiry

Building Cooperative Heterogeneous Wireless Networks With Re-Configurable Devices 10 Internet Access Network Exit SmartPhone Global Resource Controller Autonomous Wireless Systems Open Spectrum Future handhelds will contain multiple radios that can be used concurrently AND that are reconfigurable. Future wireless networks will be heterogeneous with cooperative mechanisms in place (early examples are femtocells and WiFi off loading)

Results and Discussion – Spectral Efficiency Use Case 1 No co-operation between the two carriers Users use multiple static radios that can connect to its own carrier’s access technologies Use Case 2 Co-operation exists between the two carriers Reconfigurable radios are used to support access technologies implemented by the other carrier R. Amin, J. Martin, J. Deaton, L. DaSilva, A. Hussien, A. Eltawil, "Balancing Spectral Efficiency, Energy Consumption, and Fairness in Future Heterogeneous Wireless Systems with Reconfigurable Devices", To appear in the IEEE Journal on Selected Areas In Communications, J. Martin, R. Amin, A. Eltawil, A. Hussien, “Spectral Efficiency and Energy Consumption Tradeoffs for Reconfigurable Devices in Heterogeneous Wireless Systems”, Proceedings of the IEEE WCNC2012 Conference, (Paris, France, April 2012).

Simulation Topology Gateway Sink Node Stationary User 1 Stationary User 2 Mobile User e AP Start Stop e BS Rogue Users Topology Key  e Coverage Radius: 1 Km  e Coverage Radius: 150 m  # Stationary Users: 2  # Mobile User: 1  # Rogue Users: 0-30 (increments of 5)  Stationary/Mobile User Traffic: Downlink CBR TCP (From Sink Node to Stationary/Mobile User)  Rogue User Traffic: Uplink CBR UDP (From Rogue User to Sink Node) Talking points: Goal is for the 4G operator to benefit when using an open network Can a hierarchical allocation scheme work when faced with potential ‘DoS’ ?

Wrap Up…..Final Message Trends in Internet access networks: – Bigger pipes – Heterogeneous wireless networks These advancements are exposing new DoS concerns. – The impact of one user can be significant. – MAC layer vulnerabilities in emerging access networks, particularly in heterogeneous wireless systems, need to be studied. This motivates our research in intentional and unintentional DoS in broadband access networks. 13

Supplemental Slides 14

Simulation Details Stationary users 1 and 2 always use the e radio (400 seconds) – Receives infinite downlink traffic from Sink Node (15 Mbps TCP CBR Flow) Mobile user starts out using e radio (70 seconds), then uses e when it moves inside e coverage area (300 seconds) and finally switches back to e (30 seconds) when it moves outside of e coverage – However, due to Denial of Service attacks by the rogue users, if mobile user cannot connect to e even when it is in e coverage, it will fall back to e usage – Receives infinite downlink traffic from Sink Node (15 Mbps TCP CBR Flow) Rogue users always use e radio (400 seconds) – Impact of 3 different packet generation rates studied for rogue user UDP CBR traffic flows in uplink direction – 500 kbps, 1000 kbps, 1500 kbps Mobile User Traffic: – High Priority (over e) – CW Min = 7, CW Max = 15 Rogue User Traffic: – Low Priority – CW Min = 31, CW Max = 1023 (same as regular g CW Min and CW Max settings)

Simulation Results – Mobile User Throughput Talking points: preliminary results