Top Banner
Page 1 DITEN University of Genoa NATO M&S COE Evaluation of Delay/Disruptive Tolerant Network (DTN) Solutions in Networks under Intentional Attack Speaker: Authors: LT(N) Eng. Alessandro CIGNONI PhD Marco CELLO LT(N) Eng. Alessandro CIGNONI Prof. Mario MARCHESE
25

Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

May 12, 2015

Download

Documents

acignoni

Presented during 7th NATO CAX Forum. Hotel Ergife, Rome, 24th September 2012
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 1

DITEN University of GenoaNATO M&S COE

Evaluation of Delay/Disruptive Tolerant Network (DTN) Solutions in Networks under Intentional Attack

Speaker: Authors:

LT(N) Eng. Alessandro CIGNONI PhD Marco CELLO

LT(N) Eng. Alessandro CIGNONI

Prof. Mario MARCHESE

Page 2: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 2

DITEN University of GenoaNATO M&S COE

Outline

• Introduction to Delay/Disruptive Tolerant Network (DTN)

• DTN as a Strategy for Information Assurance and Infrastructure Network Reliability

• Cyber Hyper-Domain

• M&S for Cyber Battle Labs and CAX

Page 3: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 3

DITEN University of GenoaNATO M&S COE

DTN concept

• The DTN architecture embraces the concepts of occasionally-connected networks

• The basis for this architecture lies on the Interplanetary Internet

• Various operational environments, including those subject to disruption and disconnection and those with high-delay;

• Deep space is one specialized example • Other networks to which DTN architecture applies

Page 4: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 4

DITEN University of GenoaNATO M&S COE

DTN concept

DTN solution applies when End-to-end connection is : not permanently guaranteed; intentionally and not intentionally interrupted; operating with very large delays; operating intermittently

Page 5: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 5

DITEN University of GenoaNATO M&S COE

DTN application scenarios

Emergency operations, interventions in hazardous areas,…

Page 6: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 6

DITEN University of GenoaNATO M&S COE

–DTN architecture based on the introduction of an overlay above transport or other lower layer protocols

–The essential point is that in such an overlay, delays and disruptions can be handled at each DTN ‘hop’ in a path between sender and dest

–Nodes on the path can provide storage–The DTN architecture does not require contemporaneous end-to-

end connectivity

DTN architecture and Bundle ProtocolDTN Architecture Bundle Protocol

Page 7: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 7

DITEN University of GenoaNATO M&S COE

DTN architecture Bundle protocol

– The basic unit of data in the Bundle Protocol is a “bundle” which is a message that carries application layer protocol data units

– The BP can interface with different lower layer (usually transport) protocols through “Convergence Layer Adapters”, (CLAs)

Application

CLA x

Lower Layer x (e.g. transport,…)

Other Layers Network x

Network x

Bundle

CLA z

Lower Layer z (e.g. transport,…)

Other Layers Network z

Network z

Application

Bundle

CLA z

Lower Layer z (e.g. transport,…)

Bundle

CLA x

Lower Layer x (e.g. transport,…)

Other Layers Network x

Other Layers Network z

Page 8: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 8

DITEN University of GenoaNATO M&S COE

DTN as an overlay solution

–DTN architecture is suited for acting as overlay on top of a heterogeneous network

–By installing a Bundle Protocol Agent (BPA) on end-points and nodes at the border of homogeneous segments, the end-to-end path can be divided into many DTN hops.

–On each DTN hop different CLAs can be used

Page 9: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 9

DITEN University of GenoaNATO M&S COE

Information storage Int Nodes

Another important difference between DTN and traditional TCP/IP networking is related to information storage

In standard networks information is persistently stored only at end nodes

This may not be the case in challenged networks. In DTN networks information is persistently (long-term) stored at intermediate DTN nodes

Page 10: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 10

DITEN University of GenoaNATO M&S COE

Information storage Int Nodes

• This feature differentiates the DTN architecture also from PEPs.

• In contrast, bundles can be stored at intermediate nodes for extended durations, and also be saved in persistent memory

Page 11: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 11

DITEN University of GenoaNATO M&S COE

DTN as Network Defense Strategy

The new idea is to use DTN to increment Infrastructrure Network Resilience, mitigating the effects of an intention attack to network links/nodes;

The attack is considered as a bandwidth reduction up until no bandwidth availability

Page 12: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 12

DITEN University of GenoaNATO M&S COE

Network Resilience and Cyber Defence

Page 13: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 13

DITEN University of GenoaNATO M&S COE

Network Resilience and Cyber Defence

Network Resilience to:Protect Core Infrastructure

Assure Information Superiority in the Cyber Battle Field- Sithuation Awarness- Common Operational Picture

Page 14: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 14

DITEN University of GenoaNATO M&S COE

DTN as Network Defense Strategy

Effect of the attack

Attack

Bandwidth Cancellation

Link Disruption and no service

Page 15: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 15

DITEN University of GenoaNATO M&S COE

DTN as Network Defense Strategy

If network nodes use the DTN architecture, can this help managing and mitigating the negative effect of the attack?

Even if the hypothesis must be deeper verified, preliminary analysis support the idea

Page 16: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 16

DITEN University of GenoaNATO M&S COE

Preliminary results

Page 17: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 17

DITEN University of GenoaNATO M&S COE

Very simple model

S 1 3 D2

Links behavior modeled as 4 independent continuous Time Markov Chains

πG stationary probability of Good state (no interruption); πB stationary probability of Bad state (interruption) TB sojourn time in Bad state (exponentially distributed with

parameter λB) 1/λB average sojourn time in Bad state Tx transmission time

Page 18: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 18

DITEN University of GenoaNATO M&S COE

Very simple model

Single IP packet generated by S to D;TCP/UDP latency (must wait to complete a path)

– (πB/ λB) 4 + 4Tx

DTN latency– 4(πB/ λB) + 4Tx

Page 19: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 19

DITEN University of GenoaNATO M&S COE

Very simple model

Comparison of TCP/IP and DTN latency

0

50

100

150

200

250

300

1 3 5 7 9 11 13 15 17 19

Sojourn Time in Bad state [s]

Lat

ency

bet

wee

n S

an

d D

[s]

TCP/IP latency

DTN latency

Page 20: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 20

DITEN University of GenoaNATO M&S COE

M&S Pillar

More accurate Protocol Model;Protocol Behaviour Simulation - NS3 Based /

OPNET Based

Network Infrastracture Simulation – OPNET Based

Page 21: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 21

DITEN University of GenoaNATO M&S COE

Cyber Hyper-Domain

DTN in Software Defined Networking Hypothesis: Cyber Hyper Dimensional or Cyber Hyper-Domain

– Free BSD Jials – Stanford Clean Slate Projects

Page 22: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 22

DITEN University of GenoaNATO M&S COE

Cyber Hyper-Domain

Hyper-Dimentional Cyber Domain (men-driven and/or autonomus cognitive processes to inter-dimension switch);– Time– Space– Virtual Space– Autonomous Systems Domains /Topology / Routing Strategies and Protocols

Different NetworkTopology and Routing Strategy are separated in different Jails.

Page 23: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 23

DITEN University of GenoaNATO M&S COE

Cyber Defence CAX

Cyber Hyper-Domain M&S Distributed Battle Labs Interconnection

Men and Autonomous Agents CAX in the simulated Cyber Hyper-Domain

Page 24: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 24

DITEN University of GenoaNATO M&S COE

Cyber Defence CAX

Assure Information Superiority in the Cyber Hyper-Domain which directly translates into Power

Superiority in the Battlefield

Page 25: Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under Intentional Attack

Page 25

DITEN University of GenoaNATO M&S COE

Contact :

NATO M&S COE: DITEN – University of Genoa:

LT(N) Eng. Alessandro CIGNONI Prof. Mario Marchese

[email protected] [email protected]

PhD Marco Cello

[email protected]