Securing Internet Coordinate System: Embedding Phase

نویسندگان

  • Mohamed Ali Kaafar
  • Laurent Mathy
  • Chadi Barakat
  • Kave Salamatian
  • Thierry Turletti
  • Walid Dabbous
چکیده

This paper addresses the issue of the security of Internet Coordinate Systems, by proposing a general method for malicious behavior detection during coordinate computations. We first show that the dynamics of a node, in a coordinate system without abnormal or malicious behavior, can be modeled by a Linear State Space model and tracked by a Kalman filter. Then we show, that the obtained model can be generalized in the sense that the parameters of a filter calibrated at a node can be used effectively to model and predict the dynamic behavior at another node, as long as the two nodes are not too far apart in the network. This leads to the proposal of a Surveyor infrastructure: Surveyor nodes are trusted, honest nodes that use each other exclusively to position themselves in the coordinate space, and are therefore immune to malicious behavior in the system. During their own coordinate embedding, other nodes can then use the filter parameters of a nearby Surveyor as a representation of normal, clean system behavior to detect and filter out abnormal or malicious activity. A combination of simulations and PlanetLab experiments are used to demonstrate the validity, generality, and effectiveness of the proposed approach for two representative coordinate embedding systems, namely Vivaldi and NPS.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Reputation-Based Approach for Securing Vivaldi Embedding System

Many large-scale Internet applications optimize their overlay network to reduce latencies. Embedding coordinate systems like Vivaldi are valuable tools for this new range of applications since they propose light-weight algorithms that permit to estimate the latency between any pair of nodes without having to contact them first. It has been recently demonstrated that coordinate systems in genera...

متن کامل

Securing Internet Coordinates Systems

Internet coordinate-based systems allow easy network positioning. In such systems, the basic idea is that if network distances between Internet nodes can be embedded in an appropriate space, unmeasured distances can be estimated using a simple distance computation in that space. Recently, these coordinates-based systems have been shown to be accurate, with very low distance prediction error. Ho...

متن کامل

Veracity: A Fully Decentralized Secure Network Coordinate Service

Decentralized network coordinate systems have been proposed as a means of efficiently estimating network distances among end-hosts over the Internet without having to contact them directly. These systems support a wide range of network services, including proximity-based routing, neighbor selection in overlays, and replica placement in content-distribution networks. Unfortunately, these systems...

متن کامل

Title of Dissertation : Discovering and Securing Shared Resources on the Internet

Title of Dissertation: Discovering and Securing Shared Resources on the Internet Rob Sherwood, Doctor of Philosophy, 2008 Dissertation directed by: Associate Professor Samrat Bhattacharjee and Assistant Professor Neil Spring Department of Computer Science The Internet is a collection of shared resources. Internet users share bandwidth and processing resources both in the network at routers and ...

متن کامل

The Design of Embedded GPS Navigation System Based on Internet Structure

Combining wireless devices, GPS, and client-server system in the Internet, we could run a current guidance system and query all the computerized data. The problem in using GPS in Taiwan is the accuracy between actual latitude and longitude position and the data in the coordinate system, therefore when combining real data we have to take into account the coordinate system conversion problem, and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008