Dealing with Receiver Misbehavior in Multicast Congestion Control

نویسندگان

  • Vijay Arya
  • Thierry Turletti
چکیده

In multicast congestion control, receivers can misbehave by maliciously causing congestion to steal network bandwidth from well behaved flows. In source driven congestion control protocols (SDCC), receivers misbehave by sending a wrong feedback to the source. In receiverdriven congestion control protocols(RDCC), receivers misbehave by inflating their subscriptions. In this report, we present techniques to deal with these misbehaviours. Firstly, we show that when network tomography tools such as MINC are used in conjunction with SDCC protocols, they can aid in misbehavior detection. But in order to use MINC for misbehaviour detection, MINC itself must be made immune to misbehaviour. we analyze the effect of misbehavior within MINC and propose two techniques to detect and prevent misbehavior in MINC. For RDCC protocols, a misbehaviour prevention mechanism based on in-band distribution of keys was recently proposed for FLID-DL protocol. In this report, we show how we can design keys which can prevent misbehaviour in most RDCC protocols. Key-words: MINC, Network Tomography, Misbehavior, Multicast Congestion Control, secret sharing. Gestion du mauvais comportement des récepteurs dans les Protocoles de Contrôle de Congestion Multipoint Résumé : Les protocoles de contrôle de congestion actuels peuvent permettre à des récepteurs peu scrupuleux de mal se conduire en accaparant plus de bande passante qu’ils ne devraient. Avec les protocoles de contrôle de congestion contrôlés par la source (SDCC), il est possible à des récepteurs malveillants de falsifier les rapports de réception qu’ils envoeint à la source. En ce qui concerne les protocoles de contrôle de congestion contrôlés par les récepteurs (RDCC), certains récepteurs peuvent décider de s’abonner à toutes les couches de la source sans tenir compte des débits qui leur sont alloués. Dans ce rapport, nous présentons des techniques pour prévenir ces comportements indésirables. Nous montrons comment un outil de tomographie de réseau comme MINC peut être utilisé pour détecter ces comportements malveillants avec les protocoles SDCC. L’outil de tomographie doit dans un premier temps être rendu insensible à ces attaques. Nous analysons le comportement de MINC et proposons des mécanismes de détection et prévention contre ces comportements malicieux. Pour les protocoles RDCC, un mécanisme de prévention de comportement malicieux basé sur la distribution de clés a été proposé récemment pour le protocole FLID-DL. Nous proposons un nouveau mécanisme de génération de clés pour la plupart des protocoles RDCC. Mots-clés : Attaques, Contrôle de Congestion Multipoint, MINC, Outils de Tomographie du Réseau, partage de secrète. Dealing with Receiver Misbehavior in Multicast Congestion Control 3

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Congestion Control for Multicast: Challenges and Opportunities

Trust is the foundation of most congestion control protocols developed and deployed in the Internet today. Unfortunately, with the growth of the Internet, the assumption of universal trust is no longer tenable. A communicating entity can misbehave to obtain a self-beneficial bandwidth allocation. Thus, design of congestion control protocols that are robust to such misbehavior has become an impo...

متن کامل

Multicast Congestion Control with Distrusted Receivers

ABSTRACT Congestion ontrol proto ols rely on re eivers to support fair bandwidth sharing. However, a re eiver has in entives to eli it self-bene ial bandwidth allo ations and hen e may manipulate its ongestion ontrol proto ol. Whereas the issue of re eiver misbehavior has been studied for uni ast ongestion ontrol, the impa t of re eiver misbehavior in multi ast remains unexplored. In this paper...

متن کامل

Congestion Control with a Misbehaving Receiver: Robust TFRC and Other Protocols

This paper examines the operation of TFRC (TCPFriendly Rate Control) in scenarios where the receiver is untrustworthy. By misbehaving, a TFRC receiver can obtain a higher data rate at the expense of competing traffic. We identify and experimentally confirm several such attacks and designed Robust TCP-Friendly Rate Control (RTFRC), a TFRC variant which is resilient to receiver misbehavior. We al...

متن کامل

Studying Multi-rate Multicast Congestion Control with Explicit Router Feedback

Congestion control with the positive use of explicit notification that indicates internal network conditions is a promising way to address the performance issues of congestion control in high-speed networks. We previously proposed SIRENS, a scalable, robust, and flexible fine-grained explicit notification framework where each router captures a snapshot of the various kinds of downstream link st...

متن کامل

Performance Evaluation of Layered Multicast Congestion Control Protocols: FLID-DL vs. PLM

Packet-pair receiver-driven cumulative Layer Multicast (PLM) and Fair Layer Increase Decrease with Dynamic Layering (FLID-DL) are two of the recently proposed receiver-driven layered multicast congestion control protocols improved from the famous layered multicast protocols (RLM and RLC). Both have been evaluated by their authors and claim a few advances for layered multicast congestion control...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007