threats in content-centric routing matthias wählisch, thomas schmidt, markus vahlenkamp {waehlisch,...

10
Threats in Content- Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

Upload: may-preston

Post on 04-Jan-2016

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

Threats in Content-Centric Routing

Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org

1

Page 2: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

What is a Threat?

• A dedicated event or a set of events that harm the system– Not necessarily by intention

• For a threat, you must be […] *capable* (Steve Kent)

This presentation focuses on threatening the content centric information infrastructure

2

Page 3: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

Basics: Content Centric Routing

• Observation 1: Data-driven states• Observation 2: End-users affect backbone states

3

ContentConsumer

ContentSupplier

Ipeanuts.org

peanuts.org

peanuts.org

peanuts.org

FIB: *.org FIB: *.org

peanuts.org peanuts.or

g

Page 4: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

Example Threat 1: Resource Exhaustion

• Consumer initiates many interests– Content need not

exist• Supplier uploads

content– Might be micro-

content→ Do this for an

‘unlimited’ number of items

→ Affects routing or content states

4

ContentConsumer peanuts.org

FIB: *.org

Ipeanuts.org

Ipeanuts2.org

peanuts2.org

Ipeanuts3.org

peanuts3.orgpeanuts4.orgpeanuts5.org

Ipeanuts4.org

Ipeanuts5.org

peanuts6.orgpeanuts7.orgpeanuts8.orgpeanuts9.orgpeanuts10.orgpeanuts11.orgpeanuts12.orgpeanuts…org

CPU Load

Page 5: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

Example Threat 2: System Overheating

• System works intensively on state management• Gets more and more complex in case of parallel downloads

5

ContentConsumer chunks.pea

nuts.orgchunks.peanuts.org

chunks.peanuts.org

chunks.peanuts.org

Ichunks.peanuts.org

II IIpeanuts.org

Ichunks.peanuts.org

II I

peanuts.org

Page 6: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

Experimental Illustration

• Download of multiple 10 Mbit files• Simple chain topology with 100 Mbit/s links

6

2 files per second 10 files per second 100 files per second

Page 7: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

General Threats• Resource Exhaustion• State Decorrelation– States need to be coherent, otherwise service disruption

or unwanted traffic flows• Path & name infiltration– Current work mainly focus on authenticity of content, but

not on poisonous injections of paths and names• Cache pollution– Spoiled cache reduces overall performance

• Cryptographic breaches– Signatures of long-lived content can be hacked

7

Page 8: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

From Threats to Attacks

• Attacks related to resource exhaustion– Remotely initiated overload– Piling requests due to a slow source– Mobile blockade

• Attacks related to state decorrelation– Infringing content states– Timeout attacks– Jamming attack

8

Page 9: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

Some Thoughts on the Solution Space

• Rate limiting: Limit the frequency of interests– Per end user: Increased complexity of states– Per domain: Threat to additional end users

• Pay per content item– Reduced flexibility for end users– Conflicts with the open paradigm of the Internet?

9

Page 10: Threats in Content-Centric Routing Matthias Wählisch, Thomas Schmidt, Markus Vahlenkamp {waehlisch, t.schmidt}@ieee.org 1

Conclusion

• Data-driven states make – Management of a distributed system very complex– Infrastructure easily vulnerable to threats and

attacks

• Any easy solution to overcome the problems?

• Outlook: Should we go for a detailed problem statement draft on threat and security issues?

10