Identity Theft Protection in Structured Overlays



Similar documents
Identity Theft Protection in Structured Overlays

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Security in Structured P2P Systems

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Security Issues and Solutions in Peer-topeer Systems for Real-time Communications

CS5412: TIER 2 OVERLAYS

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November ISSN

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Asymmetric cryptosystems fundamental problem: authentication of public keys

8 Conclusion and Future Work

Approximate Object Location and Spam Filtering on Peer-to-Peer Systems

Midterm. Name: Andrew user id:

How To Create A P2P Network

Midterm Solutions. ECT 582, Prof. Robin Burke Winter 2004 Take home: due 2/4/2004 NO LATE EXAMS ACCEPTED

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Scalable Source Routing

Network Security Demonstration - Snort based IDS Integration -

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Secure Communication in a Distributed System Using Identity Based Encryption

Lawful Interception in P2Pbased

CS 494/594 Computer and Network Security

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

RELOAD Usages for P2P Data Storage and Discovery

DDoS Vulnerability Analysis of Bittorrent Protocol

Tema 5.- Seguridad. Problemas Soluciones

Octopus: Anonymous and Secure DHT Lookup

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

SIP and VoIP 1 / 44. SIP and VoIP

MAXCS Release 7.0. Application Note: Remote MultiVoIP Gateway Configuration. Intended audience: AltiGen Authorized Partners

Attacking the Kad network---real world evaluation and high fidelity simulation using DVN

Public Key Infrastructure (PKI)

Security of Cloud Storage: - Deduplication vs. Privacy

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

Distributed Denial of Service Attacks & Defenses

DNS security: poisoning, attacks and mitigation

How To Make A Trustless Certificate Authority Secure

Lecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT

Plaxton routing. Systems. (Pastry, Tapestry and Kademlia) Pastry: Routing Basics. Pastry: Topology. Pastry: Routing Basics /3

Attacks Against Peer-to-peer Networks and Countermeasures

R-Chain: A Self-Maintained Reputation Management System in P2P Networks

Communications and Networking

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Should the IETF do anything about DDoS attacks? Mark Handley

Authentication Applications

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Lecture 19: Chapter 8, Section 1 Sampling Distributions: Proportions

Chapter 8 Security Pt 2

Analysis of Automated Model against DDoS Attacks

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Peer-to-peer Cooperative Backup System

Denial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung

Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management

Secure Network Provenance

Bit Chat: A Peer-to-Peer Instant Messenger

A Survey and Comparison of Peer-to-Peer Overlay Network Schemes

CS 356 Lecture 16 Denial of Service. Spring 2013

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Computer Networks: Domain Name System

OpenStack Private Cloud

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

Network Security. Mobin Javed. October 5, 2011

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

Denial of Service. Tom Chen SMU

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Scaling 10Gb/s Clustering at Wire-Speed

How To Make A Network Overlay More Efficient

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat

Network Security - ISA 656 Security

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

The p2pweb model: a glue for the Web

Plaxton Routing. - From a peer - to - peer network point of view. Lars P. Wederhake

DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!

An Introduction to Peer-to-Peer Networks

Securing IP Networks with Implementation of IPv6

MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned

Client Server Registration Protocol

MPLS RSVP-TE Auto-Bandwidth: Practical Lessons Learned. Richard A Steenbergen <ras@gt-t.net>

User authentication in SIP

co Characterizing and Tracing Packet Floods Using Cisco R

Protographs: Graph-Based Approach to NetFlow Analysis. Jeff Janies RedJack FloCon 2011

Transcription:

Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005

Background: Structured Overlays network abstraction IDs, not IPs app level entities assigned keys from same namespace as IDs keys mapped to nodes (IDs) key based 7171 routing (KBR) 6576 5771 many applications eg, dist. db Alice wants to store her files key(file) = hash(meta info) root(file) = ID closest to key(file) 0353 1024 5770 file1 1456 Alice 2380 file2 6557 file3 5701 2380 5002 4377 3202 Lakshmi Ganesh University of California, Santa Barbara 2

The Identity Attack Structured overlays rely on Key-based Routing Nodes maintain limited state Route messages by forwarding progressively closer to destination Routing stops when a node claims it is the closest to the key Relies on KBR for setting up connections between application nodes Identity Attacks hijacks key node mappings A hijacker would (falsely) claim that it is the closest node to the given key. Hijack responsibility for storing / retrieving data, forwarding data, or any other application level responsibility Lakshmi Ganesh University of California, Santa Barbara 3

Identity Theft: Illustration Eg: Network with namespace length = 4 and base = 8 Bad could be criminal records! Actual root 5771 5701 Hijacker: Carl! 5770 Bad! No node is closer to 5770 than I am! So here s the file you requested.. 1024 Source: Bob Looking for 5770 5770 could be Alice s employee records 5002 Lakshmi Ganesh University of California, Santa Barbara 4

Structured Peer-to-Peer Security Sybil Attack Relies on: nodeids are free Obtain large number of nodeids Resulting virtual identities can collude as a group Defense: centralized Certificate Authority Eclipse Attack Relies on: routing table optimization for performance Leverage Sybil, then fill victim s routing table with colluders Now what Sybil or Eclipse get you close to the victim, now what? DoS easily detected, Identity Attack more powerful Can also perform Identity attack independently w/ single node, hence more general than Sybil or Eclipse Lakshmi Ganesh University of California, Santa Barbara 5

Outline What we ve covered Background Structured Overlays Attacks Identity, Sybil, Eclipse Preventing Identity attacks will disempower Sybil, Eclipse attacks Now we ll see How to detect Identity Attacks Analysis of our solution Lakshmi Ganesh University of California, Santa Barbara 6

How to detect Identity Attacks First we get suspicious, then we seek proof Step 1: Figure out when some responder is suspicious How far must the responder s ID be from the key to warrant suspicion? Step 2: So now you re suspicious: how to verify? Ask others? But how do they know? Certification! Based on its ID, each node picks some nodes to certify itself with You can now ask these proof managers Lakshmi Ganesh University of California, Santa Barbara 7

Geographical Analogy: Intuition for Step 1 I look He I know contact want says at my to 12 he s person ppl the route address in guy the to my from I closest Cairo, know book: country each Egypt in there I can Africa continent are get (Africa) (Nigeria) to 3 ppl Cairo in my (Liar!) country isn t there even one in Egypt?? I m unconvinced! ppl I know me Lakshmi Ganesh University of California, Santa Barbara 8

Step 1: How it looks for Bob Bob examines his routing table His assumption: node density in the key s neighborhood ~ node density in his neighborhood 1024 He sees up to 3 nodes in the 102x range Is it likely that there isn t even one node in the 577x range? NO! Node 1024 s Routing Table 0353 1024 1001 1020 5771 1024 2380 1177 1254 10 1024 102 102 3202 1300 10 102 5701 4377 5002 1456 1570 1044 1051 1024 102 6576 1606 10 1026 5002 7171 1711 10 102 How many nodes in 102X XXXX 1XXX 10XX range? Lakshmi Ganesh University of California, Santa Barbara 9

Step 2: Proof Certificates Ok, we re suspicious.. Now what? Intuition: Each node tells a set of other nodes about its existence Periodic certification (signed, time-stamped certificates) These proof managers can now be contacted for proofs You verify the neighborhood you are in 5770 verifies 57xx and 577x (for example) Proof manager (PM) set computed based on prefix certified PMs for 57xx = {hash(57,1), hash(57,2), hash(57,3)} PMs for 577x = {hash(577,1), hash(577,2), hash(577,3)} Bob would now ask hash(577,x) for proofs Scalable You don t verify every possible neighbourhood You don t need to Lakshmi Ganesh University of California, Santa Barbara 10

Verification Clients requesting verification Estimate several prefixes of key that should exist E.g., key = 5770 Test prefixes 577x, then 57x For each prefix Calculate location of proof managers by hashing prefix Issue request to proof managers for certificates If certificates exist Proof of attack Lakshmi Ganesh University of California, Santa Barbara 11

Tying it all together: Illustration 1. Certification (of 577x, say) 2. Routing 3. Verification Hash(577,3) No node is closer to 5770 than I am! Really? Actual root 5771 1024 Source: Bob Looking for 5770 Attempted Identity Theft caught! Carl: Hijacker! 5701 Hash(577,1) 5002 Hash(577,2) Lakshmi Ganesh University of California, Santa Barbara 12

System Analysis: Performance Effectiveness of the verification system under ideal conditions (no denials, no certificate hijacks, no node churn). Lakshmi Ganesh University of California, Santa Barbara 13

System Analysis: Factors Message Hijacks The Identity attack Certificate Hijacks Malicious node on path between node and its proof manager Verification Denials Malicious proof manager Node churn Nodes come and go Lakshmi Ganesh University of California, Santa Barbara 14

System Analysis: Performance Use of replication factor to increase verification effectiveness (certificate denials, hijacks, and node churn assuming 20% malicious nodes). Lakshmi Ganesh University of California, Santa Barbara 15

System Analysis: Overhead Verification Overhead Bandwidth: certs sent per node per second P*RF/T (=3*4/500 = 0.024 certs/sec ~ 1.25 bytes/sec) Storage: certs stored per node P*RF (=3*4 certs ~ 600 bytes) where P = num PGs certified by each node RF = replication factor, T = certification interval (secs) cert size ~ 50 bytes Small price to pay to keep Alice happy Lakshmi Ganesh University of California, Santa Barbara 16

Looking ahead Dynamic computation of prefixes to verify Load balancing among members of a prefix group Extension to other protocols For protocols that do not use prefix routing Replace prefix groups with range specifiers Each specifier includes central point and range on each side i.e. 123X range(1234.5, 4.5) Lakshmi Ganesh University of California, Santa Barbara 17

Thank You! Questions?

Certification: Scalability The probability of the cusp including more than 2 routing levels is P b/e b, where b = base of the prefix digit. P < 0.07 for b = 4 and P < 1.8 10 6 for b = 16. Lakshmi Ganesh University of California, Santa Barbara 19

System Analysis: Performance Use of replication factor to increase verification effectiveness (certificate denials, no hijacks, no node churn). Lakshmi Ganesh University of California, Santa Barbara 20

System Analysis: Performance Use of replication factor to increase verification effectiveness (certificate denials and hijacks, no node churn). Lakshmi Ganesh University of California, Santa Barbara 21