persea : making networks more secure since early 2013

23
BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013

Upload: aletha

Post on 23-Mar-2016

43 views

Category:

Documents


0 download

DESCRIPTION

Persea : Making Networks More Secure Since Early 2013. By: Rebecca Navarre & Michael Baker II. Biography. Rebecca Navarre Wesleyan College Applied Mathematical Sciences Michael Baker II Tarrant County College Mechanical Engineering. Background. Peer-to-Peer Networks - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Persea : Making Networks More Secure Since Early 2013

BY: REBECCA NAVARRE& MICHAEL BAKER I I

Persea:Making Networks More Secure

Since Early 2013

Page 2: Persea : Making Networks More Secure Since Early 2013

Biography

Rebecca NavarreWesleyan CollegeApplied Mathematical Sciences

Michael Baker IITarrant County CollegeMechanical Engineering

Page 3: Persea : Making Networks More Secure Since Early 2013

Background

Peer-to-Peer NetworksDistributed Hash Tables (DHTs)Kad

Page 4: Persea : Making Networks More Secure Since Early 2013

Peer-to-Peer Networks

Purpose: file & resource sharing networkNodes capable of acting like client and serverAccessible to peers directly( for pure, no

central/intermediary entity)Workload is partitioned between peers.There is no central point of failure.Examples: Napster(centralized),

Freenet(Gnutella protocol), Gnutella2 and Kazaa (hybrid)

Page 5: Persea : Making Networks More Secure Since Early 2013

Peer-to-Peer cont.

Hybrid vs. Pure For Hybrid:

Allows for a central entity to provide network services or act as a security check.

For Pure All nodes are equal. When one node is removed,

the network continues without suffering a loss.

Page 6: Persea : Making Networks More Secure Since Early 2013

Distributed Hash Table

Purpose: System of Efficient Resource Discovery

Messages come into DHTs, retrieved by matching keys

Based on <key, value> pairs.If change occurs, minimal disruptionAllows for large scale data recoveryKEY VALUE

1 1002 2003 3004 400

Page 7: Persea : Making Networks More Secure Since Early 2013

Kad

Purpose: offers consistent search/find protocol

Figure 1

Page 8: Persea : Making Networks More Secure Since Early 2013

Kad Continued

Nodes know about neighborsK-buckets offer resistance to DOS attacks

Can’t flood out nodes with LIFOLookup

Source selects α # of closest nodes from its k-bucketSource sends look up request to each α node selectedEach α node returns β # of nodes from searching k-

bucketsSource then has α into β # of nodes in listFrom this, source selects selects α # of closest nodes

from its k-bucketProcess continues until it reaches target node

Page 9: Persea : Making Networks More Secure Since Early 2013

Persea Security

Initial Security Social Network & DHT Invitation Only

Kad Message entry

DHT

Social Network

New Node N

N

N

Page 10: Persea : Making Networks More Secure Since Early 2013

Hierarchical Node ID Distribution

Security

Bootstrap/Initiator Nodes

A B C D

a1 a2

q1

p2p1

d2d1

0

1

2

3

6364 127128 191192 255

1415 28

76 11

4

193 206207 221

Chunk factor: .65

Chunk Factor Calculation

64^(.65) = floor(14.929) = 14

Page 11: Persea : Making Networks More Secure Since Early 2013

Persea Look Up Effeciency

Replication

Node holding <key,value> pair

k=3, stored in k-closest nodes

KAD PERSEA

Page 12: Persea : Making Networks More Secure Since Early 2013

What Persea Is Up Against?

Sybil Attack

Advanced Attack Node Insertion Node ID Hijacking

Page 13: Persea : Making Networks More Secure Since Early 2013

The Roles of the Attackers

Silent

Active

Page 14: Persea : Making Networks More Secure Since Early 2013

Topologies

SOCIAL NETWORK NODES EDGES

Wiki-Vote 7115 103689

Soc-Epinions1 75879 508837

Page 15: Persea : Making Networks More Secure Since Early 2013

Silent vs. Active Sybil Attack

Social Network Data Set used: soc-Epinions1

Page 16: Persea : Making Networks More Secure Since Early 2013

Hop Count: Active Sybil Attack

Page 17: Persea : Making Networks More Secure Since Early 2013

Active Sybil Attack(wiki-Vote)

Social Network Data Set used: wiki-Vote

Page 18: Persea : Making Networks More Secure Since Early 2013

Advanced & Sybil Attack

Page 19: Persea : Making Networks More Secure Since Early 2013

Nodes per Attack Edge

Social Network Data Set used: soc-Epinions1

Page 20: Persea : Making Networks More Secure Since Early 2013

Active Sybil Attack (wiki-Vote)

Social Network Data Set used: wiki-Vote

Page 21: Persea : Making Networks More Secure Since Early 2013

Hop Count: Advanced & Sybil Attack

Social Network Data Set used: soc-Epinions1

Page 22: Persea : Making Networks More Secure Since Early 2013

Acknowledgements

Dr. Matthew WrightPh. D. Students: Mahdi Nasrullah Al-Ameen

& Charles GatzDr. YazdaniUniversity of Texas at ArlingtonNational Science Foundation

Page 23: Persea : Making Networks More Secure Since Early 2013

Questions?

Thank you for your time.