24
On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Embed Size (px)

Citation preview

Page 1: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

On Detecting Pollution Attacksin Inter-Session Network Coding

Anh Le, Athina MarkopoulouUniversity of California, Irvine

Page 2: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Linear Inter-Session Network Coding

Anh Le, UC Irvine, Inter-Session Pollution Detection 2

S1 S2

R2 R1

A

B

x1+x2

x2

x1 x2x1 x2x1 x2

x1+x2

x1

• Multiple sources

• Packets from different sources may be (linearly) coded together

Page 3: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Pollution Attacks in Inter-Session Coding

Malicious Intermediate Nodes

3

S1 S2

R2 R1

A

B

x2

x1 x2

y y

x1

x1

x2

• Can be detected by existing intra-session approaches

y

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 4: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Homomorphic MAC-Based DetectionNo Pollution

4

S1 S2

R2 R1

A

B

x1, t1 x2,t2

x2,t2x1, t1

x2,t2x1, t1

x1+x2, t1+t2

x1+x2, t1+t2 x1+x2, t1+t2

ü üü ü

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 5: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Homomorphic MAC-Based DetectionAttack Case

5

S1 S2

R2 R1

A

B

x1, t1 x2,t2

x2,t2x1, t1

x2,t2x1, t1

x1+x’2, t

x1+x’2, t x1+x’2, t

ü üûû

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 6: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Pollution Attacks in Inter-Session Coding

6

S1 S2

R2 R1

A

B

x'2

x'2

x1

x1

x2

Malicious sources

• Inconsistent source packets

• New and main challenge in inter-session pollution

• The main focus of the paper

x1

x1+x2

x1+x2 x1+x2

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 7: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Intra-Session MAC-Based Detection Failed for Malicious Sources

7

S1 S2

R2 R1

A

B

x1, t1 x2, t2

Anh Le, UC Irvine, Inter-Session Pollution Detection

x'2, t’2

x’2, t’2 ü

x1+x2, t1+t2

x1+x2, t1+t2 ü

Page 8: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Prior Work on Inter-Session Pollution Defense

8

• Homomorphic signature for Detection [Agrawal, PKC ’10]

• Expensive computation• Large signature

• Signature-based Identification[Dong, WiNC ‘09]

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 9: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

1. Background and Motivationo Inter-Session Pollution Attackso Main Challenges

2. Prior Work

3. InterMac Detection (more in the paper: Hash and SpaceMac based Detection)

4. Evaluation

5. Conclusion

Outline

9Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 10: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

InterMac: Threat Model

10

• S - 1 sourcesmay be malicious

• Intermediate nodes may be malicious

• Receivers are trusted

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 11: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Main Challenge and Key Observation

11

• Main Challenge: Malicious sources

Sources must generate tags using different keys

S1 S2

R2 R1

A

B

x1 x2

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 12: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Overview of InterMac

12

• Homomorphic (MAC) for inter-session network coding

– Each source generate MAC tags using different keys

– The tags are still combinable without knowing the key

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 13: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

13

InterMac DetectionMain technique

Anh Le, UC Irvine, Inter-Session Pollution Detection

x2, t2=x2·k2S1 S2

R2 R1

A

B

k1

k1, k2

x1, t1=x1·k1

k2

k1, k2

x1+x2, t1+t2

x1+x2, t1+t2

Verify:(x1 + x2) (k1 + k2) = t1 + t2

x1k1 + x2k2 + x1k2 + x2k1 = t1+ t2

Inner Product Homomorphic MAC[Le, NetCod ’10][Li, INFOCOM ’10]

Main technique: Orthogonality of ki and xj

ü

Page 14: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

InterMac Construction

14Anh Le, UC Irvine, Inter-Session Pollution Detection

Inner Product Homomorphic MAC• [Le, NetCod ’10]• [Li, INFOCOM ’10]

Multiple Keys

Using a Trusted Controller:

ki · xj = 0

Page 15: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

InterMac: Security Game

15

o Adversary wins if:• id* = idj for some j

• y* • t* is a valid tag of y*

Anh Le, UC Irvine, Inter-Session Pollution Detection

S1 S2

R2 R1

A

B

x1, t1 x2,t2

(idi, Vi)

Vi :

committed source space

(id*, y*, t*)

Tags of basis vectors of Vi

S-1 keys of Vi

Adversary

Challenger

Page 16: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Security of InterMac

Anh Le - UCI - NC Pollution Defense 16

Page 17: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Basic Key Generation in InterMac

17

k1, k2

x1 x2

commit

x1

commit

x2

C

k1, p1 k2, p2

(x1 | p1) · k2 = 0

(x2 | p2) · k1 = 0

S1 S2

Send (x1 | p1) Send (x2 | p2)

Anh Le, UC Irvine, Inter-Session Pollution Detection

Key Property: Orthogonality of ki and (xj | pj)

Page 18: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

Efficient Key Generation in InterMac

18

k1= (ḵ1 | k’1) k2= (ḵ2 | k’2)

x1 x2

commit

Enc(x1·ḵ2)commit

Enc(x2·ḵ1)

k1, p1 k2, p2

(x1·ḵ2) + p1 k’2 = 0

Enc(ḵ2) Enc(ḵ1)

C

S1 S2

(x2·ḵ1) + p2 k’1 = 0

Bandwidth Efficiency: Sending Enc. of a single symbol instead of a full vector

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 19: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

x2

k1, k2

19

S1 S2

R2 R1

A

B

InterMac Detection Illustration

CGen Gen

k1, p1 k2, p2

p1, t1p1, t1

p1+p’2, t1+t’2

p1+p’2, t1+t’2

p'2, t’2

(p1+p’2) dropped because p’2 not orthogonal to k1!

(p1k1+p’2k2+p’2k1) ≠ t1+t’2

p2, t2

now what S2 sends must be orthogonal to k1

Anh Le, UC Irvine, Inter-Session Pollution Detection

x1

k1, k2

Page 20: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

1. Background and Motivationo Inter-Session Pollution Attackso Main Challenges

2. Prior Work

3. InterMac Detection

4. Evaluation

5. Conclusion

Outline

20Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 21: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

21

InterMac Performance Evaluation

Bandwidth Overhead

[27] Agrawal et al. [PKC ‘10] [20] Zhang et al. [INFOCOM ‘11]

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 22: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

22

InterMac Performance Evaluation

Computation Overhead

[27] Agrawal et al. [PKC ‘10] [20] Zhang et al. [INFOCOM ‘11]

Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 23: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

o Inter-session: Malicious sources

o InterMac: First multi-key MAC scheme for inter-session• Each source signs using its own key• Still homomorphic

o In-network detection based on InterMac• 100 times faster than [PKC ‘10]

• 5 times less bandwidth than [PKC ’10]

• Require a trusted controller ( [PKC ’10] does not )

o More in the paper: Hash and SpaceMac-based detection

Conclusion

23Anh Le, UC Irvine, Inter-Session Pollution Detection

Page 24: On Detecting Pollution Attacks in Inter-Session Network Coding Anh Le, Athina Markopoulou University of California, Irvine

24

Links:

• Network Coding Security:http://www.ics.uci.edu/~anhml/projects.html#nc-security

• UC Irvine Networking Group – Network Coding Project:http://odysseas.calit2.uci.edu/doku.php/public:network-coding

Anh Le, UC Irvine, Inter-Session Pollution Detection