Top Banner
ACM SIGCOMM Workshop on Information-Centric Networking 12/08/2013 1/16 PIT Overload Analysis in Content Centric Networks Matteo Virgilio, Guido Marchetto, Riccardo Sisto Department of Control and Computer Engineering Politecnico di Torino
16

PIT Overload Analysis in Content Centric Networks - Slides ICN '13

Jul 03, 2015

Download

Technology

Matteo Virgilio

Analysis of the Pending Interest Table behavior in the context of a distributed denial of service attack.
Slides presented at:
3rd ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2013) - Hong Kong, China
The paper is available at:
http://conferences.sigcomm.org/sigcomm/2013/papers/icn/p67.pdf
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

1/16

PIT Overload Analysis in Content

Centric Networks

Matteo Virgilio, Guido Marchetto, Riccardo Sisto Department of Control and Computer Engineering

Politecnico di Torino

Page 2: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

2/16

A stateful protocol: the Pending Interest Table

• Used to store all seen Interests

• One entry for each requested piece of content

• Multiple Interests for a single name are merged in a single

entry (Interest merging)

Name PendingInterfaces

/acm.org/papers/paperA.pdf/1 etho

/acm.org/papers/paperB.pdf/1 eth1

/acm.org/papers/paperA.pdf/2 eth0

/acm.org/papers/paperB.pdf/2 eth1

CCN Router PIT

Page 3: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

3/16

Problem Description

• Malicious users could craft Interests for non existing

resources: Interest Flooding Attack (IFA)

– Very long random names

– possibly long lifetime values (even hundreads of seconds)

• Why do we have to consider so “long” requests? The

answer is long-polling!

• Supporting publish/subscribe paradigm may require to

store long (potentially unanswered) requests for a long

period of time

• No information about when the response will be generated

(routers cannot make any assumption)

• Simply dropping Interests with high lifetime is too simplistic

Page 4: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

4/16

What has been done in recent literature?

• A wide part of the research activity focused on privacy and

data integrity issues

• What about the PIT?

– Some architecture proposals

• Bloom filter implementation of the PIT (DiPIT)

• Hash based PIT implementation with some interesting variants

(Name Prefix Tree encoding)

– Reactive algorithms for IFA handling:

• Statistics based reaction to attackers activity;

• Poseidon Framework (very recent)

Page 5: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

5/16

Our contribution

• Simulation based approach

– we developed a full custom Java ccnSimulator

• Different target: evaluating attack impact on a real

topology

• Evaluate different PIT architectures in various network load

(and attack) scenarios

Page 6: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

6/16

Simulation scenario

• Reference topology from Telecom Italia (the most prominent

Italian ISP)

• 9 milions of subscribers

• ADSL with 7Mbps/1Mbps(downlink/uplink)

• Zipf content distribution

• Metrics gathered

– Chunk retransmission rate

at the endpoints

• Fixed PIT size

– 1 GB

Page 7: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

7/16

Attack model

• Distributed bot net

• Different simulation campaigns

1) Variable lifeTime

2) Variable bandwidth

• Different URI size

≈1000 bytes for the SimplePIT

case

20 bytes for the HashedPIT

case (SHA-1 as hashing

algorithm)

Page 8: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

8/16

Attacker’s transmission efficiency

SimplePIT

Attack efficiency

HashedPIT, DiPIT

Attack efficiency

Interest Header(20 bytes)

Resource name(1000 bytes)

Interest Header(20 bytes)

Resource name(20 bytes)

%98)100020(

1000

bytes

bytes%50

)2020(

20

bytes

bytes

Page 9: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

9/16

Simulation Results (1)

AttackSettings SimplePITRetransmissions /RAM usage

HashedPITRetransmissions/RAM usage

DiPITRetransmissions/RAM usage

Band = 100 Mbps

LifeTime= 4 sec0 49 MB 0 25 MB 0.01 % 1 GB

Band = 500 Mbps

LifeTime= 4 sec0 245 MB 0 125 MB 2.42 % 1 GB

Band = 2 Gbps

LifeTime= 4 sec0 980 MB 0 500 MB 87.6 % 1 GB

Band = 4 Gbps

LifeTime= 4 sec15 % FULL 83 % FULL 90 % 1 GB

Band = 100 Mbps

LifeTime= 60 sec0 735 MB 0 375 MB 21 % 1 GB

Band = 100 Mbps

LifeTime= 120 sec37 % FULL 0 750 MB 86 % 1 GB

Band = 100 Mbps

LifeTime= 180 sec52 % FULL ∞ FULL 88 % 1 GB

Page 10: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

10/16

Simulation Results (1)

AttackSettings SimplePITRetransmissions /RAM usage

HashedPITRetransmissions/RAM usage

DiPITRetransmissions/RAM usage

Band = 100 Mbps

LifeTime= 4 sec0 49 MB 0 25 MB 0.01 % 1 GB

Band = 500 Mbps

LifeTime= 4 sec0 245 MB 0 125 MB 2.42 % 1 GB

Band = 2 Gbps

LifeTime= 4 sec0 980 MB 0 500 MB 87.6 % 1 GB

Band = 4 Gbps

LifeTime= 4 sec15 % FULL 83 % FULL 90 % 1 GB

Band = 100 Mbps

LifeTime= 60 sec0 735 MB 0 375 MB 21 % 1 GB

Band = 100 Mbps

LifeTime= 120 sec37 % FULL 0 750 MB 86 % 1 GB

Band = 100 Mbps

LifeTime= 180 sec52 % FULL ∞ FULL 88 % 1 GB

Page 11: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

11/16

Simulation Results (1)

AttackSettings SimplePITRetransmissions /RAM usage

HashedPITRetransmissions/RAM usage

DiPITRetransmissions/RAM usage

Band = 100 Mbps

LifeTime= 4 sec0 49 MB 0 25 MB 0.01 % 1 GB

Band = 500 Mbps

LifeTime= 4 sec0 245 MB 0 125 MB 2.42 % 1 GB

Band = 2 Gbps

LifeTime= 4 sec0 980 MB 0 500 MB 87.6 % 1 GB

Band = 4 Gbps

LifeTime= 4 sec15 % FULL 83 % FULL 90 % 1 GB

Band = 100 Mbps

LifeTime= 60 sec0 735 MB 0 375 MB 21 % 1 GB

Band = 100 Mbps

LifeTime= 120 sec37 % FULL 0 750 MB 86 % 1 GB

Band = 100 Mbps

LifeTime= 180 sec52 % FULL ∞ FULL 88 % 1 GB

Page 12: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

12/16

Simulation Results (1)

AttackSettings SimplePITRetransmissions /RAM usage

HashedPITRetransmissions/RAM usage

DiPITRetransmissions/RAM usage

Band = 100 Mbps

LifeTime= 4 sec0 49 MB 0 25 MB 0.01 % 1 GB

Band = 500 Mbps

LifeTime= 4 sec0 245 MB 0 125 MB 2.42 % 1 GB

Band = 2 Gbps

LifeTime= 4 sec0 980 MB 0 500 MB 87.6 % 1 GB

Band = 4 Gbps

LifeTime= 4 sec15 % FULL 83 % FULL 90 % 1 GB

Band = 100 Mbps

LifeTime= 60 sec0 735 MB 0 375 MB 21 % 1 GB

Band = 100 Mbps

LifeTime= 120 sec37 % FULL 0 750 MB 86 % 1 GB

Band = 100 Mbps

LifeTime= 180 sec52 % FULL ∞ FULL 88 % 1 GB

Page 13: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

13/16

Simulation Results (2)

• Settings: Band = 100 Mbps, LifeTime = 180 sec

• Settings: Band = 4 Gbps, LifeTime = 4 sec

Page 14: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

14/16

Conclusion

• All the architectures work properly in normal network

conditions and also in presence of low intensity attack

• HashedPIT is the most affected PIT in our context

• Other scenarios could be designed to worsen SimplePIT too

– Distribute more zombies around the network;

– Combine both high bandwidth and high lifetime to maximize

the attack effectiveness;

– …

• Scalable and robust solutions are needed to ensure an

adequate level of confidence to the CCN paradigm.

Page 15: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

15/16

Future contribution

• Very recent solutions have been proposed to mitigate the

impact of Interest Flooding Attacks

• Our plan for the future is to evaluate them in our scenarios

in terms of:

– Resilience

– CPU usage

– Memory usage

Page 16: PIT Overload Analysis in Content Centric Networks - Slides ICN '13

ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013

16/16

Thank you for the attention!