On the Security of In-Packet Bloom-Filter Forwarding

نویسنده

  • Markku Antikainen
چکیده

Multicast protocols traditionally require that routers store information about the delivery trees. Recently, source-routed in-packet Bloom-filter (iBF) based multicast has been proposed as a remedy to this: instead of storing state in the network, the delivery tree is encoded in the packet itself using a Bloom filter. The packets are then forwarded based on the in-packet information instead of requiring that per-delivery tree state is stored in the network. It is believed that moving the state from the network to the packets makes Internet-wide multicast feasible. In-packet Bloom filter (iBF) forwarding has also been advocated as a secure forwarding solution. It is, for example, believed that the architecture makes it impossible to send traffic to a receiver who has not explicitly allowed traffic from the particular source. This has led to claims that iBF forwarding would be inherently secure to distributed denial of service attacks. The security of iBF forwarding, however, has not yet been studied and these claims have not yet been proven. This thesis takes the first steps in the security analysis of iBF forwarding. The goal is twofold: (1) to find out what information a malicious entity controlling a botnet can get about the network, and (2) to determine how this knowledge could be used to launch attacks against availability of some network node. The analysis is done using analytical methods and high level simulations. The main result of this thesis is to show that the security of iBF forwarding has been exaggerated in the literature: iBF forwarding does not have inherent protection against DDoS attacks. The thesis formulates attacks that allow an attacker controlling a botnet to send unsolicited traffic to the intended target. It is also shown that the security mechanisms proposed for iBF forwarding do not give full protection against these attacks. While this does not mean that iBF forwarding is fundamentally insecure, the found attacks reveal that there is a true need for further security research of iBF forwarding. Acknowledgements I am grateful to Tuomas Aura for providing the funding for this thesis. I sincerely hope that the investment turned out to be worth it. I want to thank both my supervisor Tuomas Aura and my instructor Mikko Särelä for all the time, advice, and feedback they gave me. Their guidance truly helped me in this process. Finally, I would like to thank Peter Sjödin whose comments helped improving the thesis. A x …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BloomCasting: Security in Bloom Filter Based Multicast

Traditional multicasting techniques give senders and receivers little control for who can receive or send to the group and enable end hosts to attack the multicast infrastructure by creating large amounts of group specific state. Bloom filter based multicast has been proposed as a solution to scaling multicast to large number of groups. In this paper, we study the security of multicast built on...

متن کامل

BloomCasting for Publish/Subscribe Networks

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Mikko Särelä Name of the doctoral dissertation BloomCasting for Publish/Subscribe Networks Publisher School of Electrical Engineering Unit Department of Communications and Networking Series Aalto University publication series DOCTORAL DISSERTATIONS 49/2011 Field of research Networking Technology Manuscript submitted 14 October...

متن کامل

Optimized hash for network path encoding with minimized false positives

The Bloom filter is a space efficient randomized data structure for representing a set and supporting membership queries. Bloom filters intrinsically allow false positives. However, the space savings they offer outweigh the disadvantage if the false positive rates are kept sufficiently low. Inspired by the recent application of the Bloom filter in a novel multicast forwarding fabric, this paper...

متن کامل

Compact forwarding: a probabilistic approach to packet forwarding in content-oriented networks

This thesis introduces the concept of compact forwarding in the field of content-oriented net-works. The main idea behind this concept is taking a probabilistic approach to the problem of packetforwarding in networks centered on content identifiers rather than traditional host addresses. Thefundamental question explored is where to place the packet forwarding state, in network nodes...

متن کامل

Defending Against DDoS Attacks in Bloom Filter based Multicasting

Bloom filter (BF) based forwarding is an effective approach to implement scalable multicasting in distributed systems. The forwarding BF carried by each packet can encode either multicast tree or destination IP addresses, which are termed as tree oriented approach (TOA) and destination oriented approach (DOA), respectively. Recent studies have indicated that TOA based protocols have serious vul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011