1

ꝉDepartment of Electrical Engineering, College of Engineering, … · 2019-12-28 · • Grey hole attack: attackers drop partial packets passing through them. But they are very

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ꝉDepartment of Electrical Engineering, College of Engineering, … · 2019-12-28 · • Grey hole attack: attackers drop partial packets passing through them. But they are very

U N I V E R S I T Y O F S O U T H F L O R I D AU N I V E R S I T Y O F S O U T H F L O R I D A

Dataset: We use Rockfuel dataset for wireline network topology, and random

geometric graph for wireless network topology.

Vulnerability Analysis, Attack Strategies and Countermeasures Design in Network Tomography

Shangqing Zhaoꝉ, Zhe Quꝉ, Zhuo Luꝉ, Cliff Wangǂ

ꝉ Department of Electrical Engineering, College of Engineering, University of South Florida, Tampa, FL 33630;

ǂ Department of Electrical & Computer Engineering, College of Engineering, North Carolina State University, Raleigh, NC 27695

Abstract

Network tomography is a vital tool to estimate link metrics from end-to-end

measurements. However, simply trusting end-to-end measurements leads to

measurement integrity vulnerabilities when attackers occur in a network because

they can intentionally manipulate link metrics via delaying or dropping packets to

affect measurements.

In this proposed poster, we show that the vulnerability in network tomography is

real and describe our attack strategy, called scapegoating. We present three basic

scapegoating approaches and show the conditions that attacks can be successful. In

addition, we show how to detect and locate such attacks in a network.

Vulnerability and Attacks

Vulnerability

Network tomography relies on a seeing-is-believing assumption, i.e., measurements

indeed reflect the real performance aggregates over individual links, i.e., is true.

However, Such assumption does not always hold in the presence of malicious

nodes.

Existing Attacks

• Black hole attack: attackers drop all packets passing through it.

• Grey hole attack: attackers drop partial packets passing through them.

But they are very easy to be detected by network tomography!

Scapegoating Attack

Idea: attackers cooperatively delay or drop packets to manipulate end-to-end

measurements such that a legitimate node is incorrectly identified by network

tomography as the root cause of the problem.

Methodology: attackers only damage paths which contain victims, and do nothing

on other paths.

All packets going through A are blocked,and packets do not pass A are delivered.

Therefore, A or link 1 must have problems. A is a scapegoat!

Attack strategies:

Detection and Locating

1

2 Walking

Area0

5

6

34

7

concrete walls

wood door

wood door

long table

1. Detection

mechanism:

Not detectable Detectable

2. Locating

path 1:

path 2:

path 3:

Link 1 is the only shared link among these 3 paths. So once attack is detected, the

only explanation is that link 1 is malicious.

Conclusion & Acknowledgment

(i) All three attack strategies are practical threats in network tomography scenarios.

(ii) We should not simply trust the measurements.

(iii) Existing network tomography methods in various applications need to be

revisited to increase attack resilience.

(iv) This work at University of South Florida in this paper was supported in part by

NSF CNS-1717969.

Background

Network Tomography

• Motivation: if we can’t see what’s going on in a network directly, how to

measure the network performance?

• Definition: Study internal characteristics (e.g. link delay) of the network from

external measurements (e.g. path delay).

o infer the link performance from end-to-end path measurements.

• Formulation:

: link performance (e.g., link delay)

: path performance (e.g., path delay)

linear system:

matrix form: where

Given and , network tomography wish to

infer link metrics

Network

Network Tomography

0

1

2 3

1y 2y

1x

2x 3x

ix

iy

1 1 2

2 1 3

y x x

y x x

y = Rx

101

011R

y R

x

yRRRxTT 1)(ˆ

iy

M2A

C D

B

M3

M11 2 3

5

7

4

6

8

9

10

M2A

C D

B

M3

M11 2 3

5

7

4

6

8

9

10

B: Drop !!

C: do not drop

M2A

C D

B

M3

M11 2 3

5

7

4

6

8

9

10

M2A

C D

B

M3

M11 2 3

5

7

4

6

8

9

10

C: Drop !!

B: Drop !!

Delivered

DC

M1

B

A1

A2

M2

E

M3…

(a) Perfect Cut (b) Imperfect Cut

DC

M1

B

A1

A2

M2

E

M3…

M4Victim

link

Victim

link

ˆexists, if Rx y ',scapegoating=

ˆdoes not exist, if Rx=y'.

1 3

1 4

1 5

M M

M M

M M

Experimental Results

Link Index1 2 3 4 5 6 7 8 9 10

Delay

Attacker-Controlled

Maximum-Damage

Obfuscation

Chosen-Victim