Chair for Network Architectures and Services – Prof. Carle Department for Computer Science TU München Overview Master Course Computer Networks (IN2097) Introduction to I. Terminology II. Challenges g in the current Internet III. Resilience Mechanisms Network Resilience Dr. Ali Fessi Dr. Nils Kammenhuber Prof. Dr.-Ing. Georg Carle Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Overview I. Terminology II II. Challenges in the current Internet III. Resilience Mechanisms Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 2 Terminolgy - Overview 3 1. The “fault Î error Î failure” chain 2. Fault tolerance 3. Resilience 4 4. Dependability 5. Security 6. Availability vs. Reliability Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 4 The “fault Î error Î failure” chain Service: Sequence of the system‘s external state Correct service is delivered when the service implements the system function Definition A service failure, or simply failure, is an event that occurs when the delivered service deviates from correct service i.e., at least one external state of the system deviates from the correct service state (de: Ausfall) The “fault Î error Î failure” chain Definition The deviation of an external state of the system from the correct service state is called an error Thus,, an error is the part p of the total state of the system y that may lead to its subsequent failure (de: Defekt) Definition The cause of an error (adjuged or hypothesized) is called a fault (de: Fehler) & “fault fault Î error Î failure failure” Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 5 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Fault Tolerance 6 Resilience Definition A system is fault-tolerant if it can mask the presence of faults i th in the system t b by using i redundancy d d Origin Latin verb: “resilire” ~ jump back Resilience definition in different fields Physics y • A material’s property of being able to recover to a normal state after a deformation resulting from external forces; Redundancy means 1 Replication of the same object (software or hardware) or 1. 2. Diversity • • Ecology E l • Moving from a stability domain to another under the influence of disturbance;; Design or implementation Hardware or software Psychology and psychiatry • Living and developing successfully when facing adversity; Business • the capacity to reinvent a business model before circumstances force to; Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 7 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 8 Resilience Dependability Attributes Definition: “Resilience is the persistence of dependability when facing changes.” Availability Readiness for correct service J.-C. Laprie. p “From Dependability p y to Resilience”. In 38th International Conference On Dependable Systems and Networks. IEEE/IFIP, 2008. Changes can be particularly attacks Continuity of correct service Resilience Reliability (Zuverlässigkeit) ( ä ) Integrity (Integrität) e environment o e t Security (Sicherheit) Safety y ((Sicherheit)) 9 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Security Attributes “CIA” model R(t) = Pr [ unit is operating until t ] Availability Readiness for correct service Integrity The availability of a unit at a point of time t is the probability that the unit is operational at t Absence of improper system alterations The reliability of a unit at a point of time t is the probability that the unit is operational until t Confidentiality Absence of unauthorized disclosure of information 10 Reliability vs. Availability Confidentiality, Integrity, Availability Maintainability Ability to undergo repair and modification Confidentiality (Vertraulichkeit) Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Integrity Absence Ab off improper i system t alterations lt ti Maintainability (Wartbarkeit) Safety Absence of catastrophic consequences on the user(s) and the Availability (Verfügbarkeit) Dependability (Verlässlichkeit) Reliability A(t) = Pr [ unit is operating at t ] Notes: CIA model d l actually t ll nott sufficient ffi i t tto d describe ib ““security” it ” “Security” addresses all kind of possible attacks which may lead to th d the deviation i ti ffrom correctt service i Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 11 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 12 MTTF & MTTR Examples Mean Time To Failure (MTTF) Mean time between • Point of time when a unit is put into operation • Point of time when the unit fails for the next time Mean Time To Repair (MTTR) Mean time between & One can achieve high hi h availability il bilit with low reliability (low MTTF) if MTTR is sufficiently low • Point of time when a unit fails • Point of time when the unit is p put into operation p again g This results into an average availability Aavgg = MTTF MTTF + MTTR 13 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 DNS lookup (stateless service) MTTF: 30 min MTTR: 1 ms Aavg = 0.998 Examples Conference bridge (statefull service) Each time, the bridge fails, participants need to re-dial g that Even if MTTR is sufficientlyy low,, it has to be guaranteed the MTTF is sufficiently high to assure service quality Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 14 Overview Web servers 1 2 … k Proxy Rsystem t (t ) = R proxy (t ) ⋅ Rwebserver b pooll (t ) I. Terminology II II. Challenges in the current Internet III. Resilience Mechanisms Rweb server pool (t ) = 1 − (1 − Rwebserver(t ))k Same holds for the availability Asystem (t ) = Aproxy (t ) ⋅ Awebserver pool (t ) Aweb server pool (t ) = 1 − (1 − Awebserver(t ))k Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 15 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 16 Challenges in the current Internet Challenges in the current Internet 1. Topology Failures 1. Topology Failures 2. Overload 2. Overload 3. Lack of Integrity 3. Lack of Integrity 4 4. Software Faults 4. S ft Software Faults F lt 5. Domino Effects 5. Domino Effects Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 17 Topology Failures Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 18 Topology Failures; Sub-Marine Cables Failures in the “network graph” Network graph Physical topology Logical topology including service dependencies, e.g., DNS & Dependency graphs ~99% of inter-continental Internet traffic (less than 1% using satellites) High redundant But vulnerable to Fishing and anchoring (70% of sub-marine cable failures) Natural disasters (12%) Cable theft Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 19 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 20 Submarine Cables; Natural Disasters Submarine Cables; Natural Disasters Hengchun earthquake (December 2006) Hengchun earthquake (December 2006) Impact p Affected countries: China, Taiwan, Hong Kong, Philippines China‘s s Internet connectivity reduced by 70% China Hong Kong‘s Internet access completely disabled Recovery BGP automatic re-routing re routing helped to reduce disconnectivity But resulted into congested links Manual M l BGP policy li changes h + switch it h portt re-configuration fi ti were necessary Hong Kong‘s Internet users were still experiencing slow Internet connections 5 days after the earthquake Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 21 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 22 Submarine Cables; Cable Theft Submarine Cables; Failures in the Mediterranean Sea In Jan. + Feb. 2008, 3 successive events In March 2007, pirates stole an 11 kilometers section of the submarine cable connecting Thailand Thailand, Vietnam and Hong Kong Kong, Impact: significant downgrade in Internet speed in Vietnam. Impact Intention: The thieves wanted to sell 100 tons of cable as scrap. Affected countries: Egypt, Iran, India and a number of other middle east countries Disruption of • 70% in Egypt • 60% in India Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 23 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 24 Topology Failures; Routing Topological Failures; Routing Failures in the IP topology graph Time to Recovery Failures of routers (nodes) Intra-domain Intra domain routing (OSPF (OSPF, RIP RIP, IS IS-IS, IS EIGRP): up to Failure of links between routers several 100ms Failure of links between routers generally caused by disconnection at Inter-domain routing (BGP): up to several minutes lower layers Failure of routers DoS attacks Failures due to software bugs Examples of reported bugs • Vulnerability to too long AS (BGP Autonomous Systems) paths • Long passwords to login to the router • Overflow O fl off connection ti tables t bl in i some commercial i l firewalls fi ll Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 25 Topological Failures; Routing Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 26 Challenges in the current Internet Other reasons Misconfiguration which leads to false modification of the Internet topology Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 27 1. Topology Failures 2. Overload 3. Lack of Integrity 4. S ft Software Faults F lt 5. Domino Effects Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 28 Overload Lack of Congestion at the Network Layer Topology failures are binary (link or node is up or down) Routing protocols react to the failure of a link or a router. But equipment in the network (routers (routers, servers servers, etc etc.)) have But not to network congestions limited capacity ARPANET had some mechanisms to react to congestions Queue length But they resulted into oscillations CPU power Congestion control was introduced in the Internet as etc. enhancement of TCP But TCP has no knowledge about the network topology & Overload (congestion) is not rare no way of re-wiring the traffic path in case of congestion Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 29 DoS Attack vs. Flash Crowds Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 30 DoS Attacks Some DoS attacks have a political or ethnical reasons Big challenge Ambiguous differentiation between DoS attacks and flash crowds Flash crowds: unusual but legitimate traffic Even if attacks are identified as such, such it remains difficult to separate between malicious and legitimate traffic and to eliminate the malicious traffic ff Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 31 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 32 Challenges in the current Internet Lack of Integrity Majority of Internet traffic (signaling and data) is not integrityprotected 1. Topology Failures 2. Overload 3. Lack of Integrity 4. S ft Software Faults F lt Forged BGP announcements 5. Domino Effects Forged DNS responses This leads to several security vulnerabilities ARP poisoning SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM SPAM etc etc. Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 33 Challenges in the current Internet 1. Topology Failures 2. Overload 3. Lack of Integrity 4 4. Software Faults 5. Domino Effects Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 34 Software Faults Developments faults Introduced during the development phase Configuration faults Introduced during the deployment phase 35 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 36 Software Faults Challenges in the current Internet Examples Buffer overflows in server or router implementation BGP Youtube misconfiguration O On Jan. J 31st 2009, 2009 G Google l search h engine i marked k d every search result with “This site may harm your computer”; Root cause: Database of suspected sites was mistakenly extended by ‚/‘ Software update of the Authentication Server (Home Location Register HLR) of T-Mobile on April 21st 2009 1. Topology Failures 2. Overload 3. Lack of Integrity 4 4. Software Faults 5. Domino Effects • Impact: p p phone calls and text messaging g g were not p possible for 4 hours Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 37 38 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Domino Effects Domino Effects Any kind of challenges mentioned above may lead to other challenges E.g., E failure f il off a server in i a server pooll may llead d tto overload l d of neighboring servers Router failures may lead to congestion of neighboring links and routers DNS failure mayy lead to unavailability y of other services, E.g., DoS attack on Microsoft router on 24th + 25th Jan. 2001 lead to unavailability of DNS and thus of services located in other MS sites microsoft.com DNS msn.com msnbc.com R Router microsoft.de h hotmail.co.jp il j Internet Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 39 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 40 Overview Resilience Mechanisms I. Terminology 1. Topology Protection II. Challenges g in the current Internet 2. Congestion Control III. Resilience Mechanisms 3. Signaling Integrity 4 4. Server Redundancy 5. Virtualization 6. Overlay and P2P Networks Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 41 Resilience Mechanisms Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 42 Topology-based Resilience Metrics Several metrics exist But not all are useful 1. Topology Protection 2. Congestion g Control 3. Signaling Integrity 4. S Server Redundancy R d d 5. Virtualization 6. Overlay and P2P Networks Definitions k-link (edge) connectivity is the minimal number of links g p whose removal would disconnect the graph k-node (vertex) connectivity is the minimal number of nodes whose h removall (i (including l di removall off adjacent dj t links) li k ) would ld disconnect the graph A k-regular graph is k-node-connected if there are k nodedisjoint paths between any pair of nodes nodes. Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 43 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 44 Path Protection Local Protection src dst Node or link failures are detected locally and backup paths are used until routing re-converges & This Thi can reduces d the th MTTR b by th the order d off a magnitude it d compared to path protection & Contra: higher signaling and equipment overhead Primary path Backup path Link protection Traffic is forwarded using backup path in case of failure src dst Source needs to monitor the operation of primary path & Info about node or link failure needs to be propagated back to src Node protection 45 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Example src Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 dst 46 IEEE 802.3ad: Link Aggregation R1 IEEE Link Aggregation allows for bundling several physical Ethernet connections into a logical one Connection between Two hosts Two Ethernet switches Host H t and d switch it h R2 src dst R3 R4 Location protection at IP layer Routing protocol: OSPF IEEE Link Aggregation allows for increasing bandwidth But is also a fault tolerance mechanism out, If a cable is plugged out Local L l protection t ti according di tto IP Fast F t Reroute R t (IPFRR) (RFC 5714) 1. Normal operation: Routing from src to dst via R3 and R4 2. After failure of link between R4 and dst: Rerouting from R4 to dst via R2 • e.g., for maintenance reasons, 3. Then, info is propagated in the network, OSPF routing converges and a new the two layer layer-2 2 devices remain connected connected. path is used from src to dst via R1 and R2. Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 47 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 48 Multihoming Resilience Mechanisms Multihoming refers to a network setup where a host or a network is connected to the Internet via more than 1 connection It can be applied in various contexts Host Multihoming 1. Topology Protection 2. Congestion g Control 3. Signaling Integrity 4. S Server Redundancy R d d 5. Virtualization 6. Overlay and P2P Networks • An IP host connected via multiple p network interfaces • Each network interface might be connected to a different access network Multihoming at the transition point between networks • An enterprise network connected to the Internet via multiple ISPs • BGP peering with multiple providers Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 49 Congestion Control 50 Traffic Engineering Addresses network congestion at the network layer Goals Optimize network throughput, packet loss, delay Input Network topology Traffic matrix (may change over time, e.g., daily patterns) Output O t t (Eventually modified) link weights used to compute routing tables TCP congestion control Traffic Engineering Protection again DoS attacks Rate limiting: vulnerable to • “false false positives” positives , i.e., i e legitimate traffic is classified as malicious • “false negatives”, i.e., malicious traffic is classified as legitimate Cookies Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 51 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 52 Denial-of-Service Protection with Cookies (1) Denial-of-Service Protection with Cookies (2) 1: request Bob Advantage: allows to counter simple address spoofing attacks 2: Cookie Alice Drawbacks 3: request, Cookie Cookies discussion: • Requires CPU resources Upon receiving a request from Alice, Bob calculates a Cookie and sends it to Bob. Alice will receive the Cookie and resend the request with the Cookie together. Bob verifies that the Cookie is correct and then starts to process Alice‘s Alice s request. request An attacker that is sending requests with a spoofed (i.e. forged) source address will not be able to send the Cookie. • In some applications, e.g., DNS, it might be easier to respond to the request than generating the cookie • Requires one additional message roundtrip roundtrip. • Network may remain congested “Request” Attacker Bob Alice “Cookie” Cookie Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 53 Resilience Mechanisms Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 54 Signaling Integrity; “ARP” protection Manual configuration, e.g., ARP messages with wrong matching 1. Topology Protection 2. Congestion Control 3. Signaling Integrity 4. S Server Redundancy R d d 5. Virtualization 6. Overlay and P2P Networks Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 (IP to MAC) are discarded & Too costly IPv6 SEcure Neighbor Discovery (SEND) (RFC 2461 and 2462) Uses a Cryptographically Generated Address (CG ) (CGA) Routing prefix 55 Hash62(Host public key) Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 56 Signaling Integrity; DNSSEC Signaling Integrity; BGP Security Protects DNS responses with cryptographic signatures Not trivial In a dedicated DNS record: the RRSIG record (RFC4034) Can not be solved by simply adding message integration protection of BGP announcements DNS Records can be verified with a “chain of trust” E.g., what is if “Pakistan Telecom” signs BGP Public key of the DNS root zone must be known by clients p announcements for a Youtube prefix? Authority delegation is restricted to sub sub-domains domains & Integrity of BGP announcements needs to be validated by a e.g., system administrator of “net.in.tum.de” can not sign records combination of for “lrz.de” & topology authentication, Note: this is not the case for PKIs currently used in the web & BGP path authentication and & announcement announcement's s origin authentication Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 57 Signaling Integrity Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 58 Signaling Integrity Domain Keys Identified Mail (DKIM) Spammers can still sign their outgoing messages Allows for validation of a domain name associated with an & DKIM should be used with reputation: email address • Email messages sent by a domain that is known for signing good messages can be accepted An organization takes responsibility for a message in a way • while others may require further examination. p that can be validated byy a recipient Prominent email service providers implementing DKIM • Yahoo, Gmail, and FastMail. • Any mail from these organizations should carry a DKIM signature Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 59 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 60 Resilience Mechanisms Server Redundancy Server redundancy as a fault tolerance mechanism 1. Topology Protection Servers instances may be 2. Congestion Control in the same LAN or 3. Signaling Integrity different sub-networks & Geographic diversity 4 4. Server Redundancy 5. Virtualization 6. Overlay and P2P Networks Supporting mechanisms IP Takeover NAT Takeover DNS 61 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Server Redundancy; IP Takeover 62 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Server Redundancy; IP Takeover with 2 Switches Both master and backup servers are connected to 2 switches Same procedure with ARP & Incoming requests from both switches is forwarded to the backup server Any component (server or switch or cable) can be removed removed, e.g., for maintenance reasons, while the service keeps on being available Simple redundancy mechanism Backup server receives periodic “keep keep alive alive” messages from master server, e.g., every 10ms In case of no response Backup server broadcasts an ARP message in the LAN Master server Backup server From now on, all IP traffic is forwarded to the backup server keepalive Drawbacks Existing session state gets lost Master server Backup server keepalive Ethernet switch is a single point of failure Internet Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 63 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 64 Server Redundancy; NAT Takeover Server Redundancy; DNS Similar to IP Takeover DNS can provide several IP addresses for the same name “Keep p alive” messages g from backup p to master server By monitoring the availability of servers from a server pool pool, Change NAT binding upon lack of response from master server unavailable servers can be removed from DNS responses & Incoming requests are forwarded to the backup server DNS Master server Backup server Keep alive 1 keepalive 2 Server pool NAT Moreover, M DNS responses can b be adjusted dj t d according di tto th the currentt Internet load Note: Master and backup server do not have to be in the same LAN Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 & See, e.g., Content Distribution Networks (CDN) 65 Resilience Mechanisms Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 66 Virtualization Different virtualization techniques, e.g., KVM, Xen, etc. Can be used to enhance resilience of network services 1. Topology Protection 2. Congestion Control 3. Signaling Integrity • To address overload situations 4 4. Server Redundancy • In I case servers in i other h llocations i crash h 5. Virtualization 6. Overlay and P2P Networks Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Start new servers from existing images on demand, e.g., 67 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 68 Resilience Mechanisms Overlay Routing Overlay networks 1. Topology Protection Are networks built on top of existing networks 2. Congestion Control They typically provide additional functionality not provided at 3. Signaling Integrity 4 4. Server Redundancy 5. Virtualization End hosts can organize themselves in a P2P network 6. Overlay and P2P Networks and provide routing using the overlay in case the underlay the „underlay“ network Overlay routing g fails routing 69 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 Overlay Routing Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 70 Overlay Routing Example Upon link failure between R1 and R2 A can reach B via D or C Typical reasons for lack of connectivity in the underlay Misconfigured middleboxes (firewalls (firewalls, NATs) Slow BGP convergence Systems supporting overlay routing Tor B R1 A • while it is actually designed with anonymization in mind, it R2 provides overlay routing and can be useful in case of network partial failures C Skype E • Skype supernodes typically provide connectivity for Skype D clients behind firewalls or NATs Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 71 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 72 P2P Networks P2P Networks Drawback: several attacks are possible Sybil attacks: Resilience properties Decentralization • Attacker participate with several fake identities • In order to control a portion of the network Geographic diversity Eclipse attacks attacks, Ability to cope with “churn” • Attacker control the neighborhood of a peer or content • In order to make unavailable for other participants in the P2P networks • “Churn” “Ch ” means th thatt peers jjoin i and d lleave att any titime etc. „Sybil“ attack & Replication of each data item on several peers & Autonomic recovery from stale P2P routing tables „Eclipse“ attack Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 73 Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 P2P Networks 74 Summary Common approaches & Managed P2P networks (or supervised P2P networks) & E.g., Google File System (GFS), Skype I. II. III. Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 P2P 75 Terminology The “fault fault Î error Î failure failure” chain Fault tolerance, Resilience, Dependability, Security A il bilit vs. R Availability Reliability li bilit Challenges g in the current Internet Topological Failures, Overload, Lack of Integrity Software Faults, Faults Domino Effects Resilience Mechanisms Topology Protection, Congestion Control, Signaling Integrity Server Redundancy, Virtualization, Overlay and P2P Networks Network- Master IN2097 Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2010/2011 76
© Copyright 2026 Paperzz