BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

23
BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013

Transcript of BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Page 1: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

BY: REBECCA NAVARRE& MICHAEL BAKER I I

Persea:Making Networks More Secure Since Early 2013

Page 2: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Biography

Rebecca NavarreWesleyan CollegeApplied Mathematical Sciences

Michael Baker IITarrant County CollegeMechanical Engineering

Page 3: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Background

Peer-to-Peer NetworksDistributed Hash Tables (DHTs)Kad

Page 4: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Peer-to-Peer Networks

Purpose: file & resource sharing networkNodes capable of acting like client and serverAccessible to peers directly( for pure, no

central/intermediary entity)Workload is partitioned between peers.There is no central point of failure.Examples: Napster(centralized),

Freenet(Gnutella protocol), Gnutella2 and Kazaa (hybrid)

Page 5: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Peer-to-Peer cont.

Hybrid vs. Pure For Hybrid:

Allows for a central entity to provide network services or act as a security check.

For Pure All nodes are equal. When one node is removed,

the network continues without suffering a loss.

Page 6: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Distributed Hash Table

Purpose: System of Efficient Resource Discovery

Messages come into DHTs, retrieved by matching keys

Based on <key, value> pairs.If change occurs, minimal disruptionAllows for large scale data recoveryKEY VALUE

1 100

2 200

3 300

4 400

Page 7: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Kad

Purpose: offers consistent search/find protocol

Figure 1

Page 8: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Kad Continued

Nodes know about neighborsK-buckets offer resistance to DOS attacks

Can’t flood out nodes with LIFO

LookupSource selects α # of closest nodes from its k-bucketSource sends look up request to each α node

selectedEach α node returns β # of nodes from searching k-

bucketsSource then has α into β # of nodes in listFrom this, source selects selects α # of closest

nodes from its k-bucketProcess continues until it reaches target node

Page 9: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Persea Security

Initial Security Social Network &

DHT Invitation Only

Kad Message entry

DHT

Social Network

New Node N

N

N

Page 10: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Hierarchical Node ID Distribution

Security

Bootstrap/Initiator Nodes

A B C D

a1 a2

q1

p2p1

d2d1

0

1

2

3

6364 127128 191192 255

1415 28

76 11

4

193 206207 221

Chunk factor: .65

Chunk Factor Calculation

64^(.65) = floor(14.929) = 14

Page 11: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Persea Look Up Effeciency

Replication

Node holding <key,value> pair

k=3, stored in k-closest nodes

KADPERSE

A

Page 12: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

What Persea Is Up Against?

Sybil Attack

Advanced Attack Node Insertion Node ID Hijacking

Page 13: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

The Roles of the Attackers

Silent

Active

Page 14: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Topologies

SOCIAL NETWORK NODES EDGES

Wiki-Vote 7115 103689

Soc-Epinions1 75879 508837

Page 15: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Silent vs. Active Sybil Attack

Social Network Data Set used: soc-Epinions1

Page 16: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Hop Count: Active Sybil Attack

Page 17: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Active Sybil Attack(wiki-Vote)

Social Network Data Set used: wiki-Vote

Page 18: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Advanced & Sybil Attack

Page 19: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Nodes per Attack Edge

Social Network Data Set used: soc-Epinions1

Page 20: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Active Sybil Attack (wiki-Vote)

Social Network Data Set used: wiki-Vote

Page 21: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Hop Count: Advanced & Sybil Attack

Social Network Data Set used: soc-Epinions1

Page 22: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Acknowledgements

Dr. Matthew WrightPh. D. Students: Mahdi Nasrullah Al-Ameen

& Charles GatzDr. YazdaniUniversity of Texas at ArlingtonNational Science Foundation

Page 23: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013.

Questions?

Thank you for your time.