首页> 外文会议>IEEE International Conference on Distributed Computing Systems >When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography
【24h】

When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography

机译:当眼见为实时:网络断层扫描中偷偷摸摸的可行性和可检测性

获取原文

摘要

Network tomography is a vital tool to estimate link qualities from end-to-end network measurements. An implicit assumption in network tomography is that observed measurements indeed reflect the aggregate of link performance (i.e., seeing is believing). However, it is not guaranteed today that there exists no anomaly (e.g., malicious autonomous systems and insider threats) in large-scale networks. Malicious nodes can intentionally manipulate link metrics via delaying or dropping packets to affect measurements. Will such an assumption render a vulnerability when facing attackers? The problem is of essential importance in that network tomography is developed towards effective network diagnostics and failure recovery. In this paper, we demonstrate that the vulnerability is real and propose a new attack strategy, called scapegoating, in which malicious nodes can substantially damage a network (e.g., delaying packets) and at the same time maliciously manipulate end-to-end measurement results such that a legitimate node is misleadingly identified as the root cause of the damage (thereby becoming a scapegoat) under network tomography. We formulate three basic scapegoating approaches and show under what conditions attacks can be successful. We also reveal conditions to detect such attacks. Our theoretical and experimental results show that simply trusting measurements leads to scapegoating vulnerabilities. Thus, existing methods should be revisited accordingly for security in various applications.
机译:网络断层扫描是从端到端网络测量中估算链路质量的重要工具。网络断层扫描中的一个隐含假设是,观察到的测量值确实反映了链路性能的总和(即,眼见为实)。但是,今天不能保证在大型网络中不存在异常(例如,恶意的自治系统和内部威胁)。恶意节点可以通过延迟或丢弃数据包来故意影响链路度量,从而影响测量。当面对攻击者时,这样的假设会带来漏洞吗?该问题至关重要,因为网络层析成像技术已朝着有效的网络诊断和故障恢复发展。在本文中,我们证明了该漏洞是真实的,并提出了一种新的攻击策略,称为“替罪羊”,在这种策略中,恶意节点可能会严重破坏网络(例如,延迟数据包),同时恶意地操纵端到端的测量结果这样一来,合法的节点就被误导为网络断层扫描造成损坏的根本原因(从而成为替罪羊)。我们制定了三种基本的替代方法,并说明了在什么条件下攻击可以成功。我们还揭示了检测此类攻击的条件。我们的理论和实验结果表明,仅信任测量会导致替代目的漏洞。因此,应当相应地重新考虑现有方法,以用于各种应用中的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号