Security Architecture and Protocols for Overlay Network Services

Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis...

Full description

Bibliographic Details
Main Author: Srivatsa, Mudhakar
Published: Georgia Institute of Technology 2007
Subjects:
Online Access:http://hdl.handle.net/1853/16284
id ndltd-GATECH-oai-smartech.gatech.edu-1853-16284
record_format oai_dc
spelling ndltd-GATECH-oai-smartech.gatech.edu-1853-162842013-01-07T20:20:47ZSecurity Architecture and Protocols for Overlay Network ServicesSrivatsa, MudhakarPerformance and scalabilityApplied cryptographySystems securityOverlay networksComputer architecture Security measuresComputer networks Security measuresPlug-ins (Computer programs)Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a proactive approach that cleanly retrofits security solutions into existing system architectures. The first step in this approach is to identify security threats, vulnerabilities and potential attacks on a system or an application. The second step is to develop security tools in the form of customizable and configurable plug-ins that address these security issues and minimally modify existing system code, while preserving its performance and scalability metrics. This thesis uses overlay network applications to shepherd through and address challenges involved in supporting security in large scale distributed systems. In particular, the focus is on two popular applications: publish/subscribe networks and VoIP networks. Our work on VoIP networks has for the first time identified and formalized caller identification attacks on VoIP networks. We have identified two attacks: a triangulation based timing attack on the VoIP network's route set up protocol and a flow analysis attack on the VoIP network's voice session protocol. These attacks allow an external observer (adversary) to uniquely (nearly) identify the true caller (and receiver) with high probability. Our work on the publish/subscribe networks has resulted in the development of an unified framework for handling event confidentiality, integrity, access control and DoS attacks, while incurring small overhead on the system. We have proposed a key isomorphism paradigm to preserve the confidentiality of events on publish/subscribe networks while permitting scalable content-based matching and routing. Our work on overlay network security has resulted in a novel information hiding technique on overlay networks. Our solution represents the first attempt to transparently hide the location of data items on an overlay network.Georgia Institute of Technology2007-08-16T17:57:57Z2007-08-16T17:57:57Z2007-05-16Dissertationhttp://hdl.handle.net/1853/16284
collection NDLTD
sources NDLTD
topic Performance and scalability
Applied cryptography
Systems security
Overlay networks
Computer architecture Security measures
Computer networks Security measures
Plug-ins (Computer programs)
spellingShingle Performance and scalability
Applied cryptography
Systems security
Overlay networks
Computer architecture Security measures
Computer networks Security measures
Plug-ins (Computer programs)
Srivatsa, Mudhakar
Security Architecture and Protocols for Overlay Network Services
description Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a proactive approach that cleanly retrofits security solutions into existing system architectures. The first step in this approach is to identify security threats, vulnerabilities and potential attacks on a system or an application. The second step is to develop security tools in the form of customizable and configurable plug-ins that address these security issues and minimally modify existing system code, while preserving its performance and scalability metrics. This thesis uses overlay network applications to shepherd through and address challenges involved in supporting security in large scale distributed systems. In particular, the focus is on two popular applications: publish/subscribe networks and VoIP networks. Our work on VoIP networks has for the first time identified and formalized caller identification attacks on VoIP networks. We have identified two attacks: a triangulation based timing attack on the VoIP network's route set up protocol and a flow analysis attack on the VoIP network's voice session protocol. These attacks allow an external observer (adversary) to uniquely (nearly) identify the true caller (and receiver) with high probability. Our work on the publish/subscribe networks has resulted in the development of an unified framework for handling event confidentiality, integrity, access control and DoS attacks, while incurring small overhead on the system. We have proposed a key isomorphism paradigm to preserve the confidentiality of events on publish/subscribe networks while permitting scalable content-based matching and routing. Our work on overlay network security has resulted in a novel information hiding technique on overlay networks. Our solution represents the first attempt to transparently hide the location of data items on an overlay network.
author Srivatsa, Mudhakar
author_facet Srivatsa, Mudhakar
author_sort Srivatsa, Mudhakar
title Security Architecture and Protocols for Overlay Network Services
title_short Security Architecture and Protocols for Overlay Network Services
title_full Security Architecture and Protocols for Overlay Network Services
title_fullStr Security Architecture and Protocols for Overlay Network Services
title_full_unstemmed Security Architecture and Protocols for Overlay Network Services
title_sort security architecture and protocols for overlay network services
publisher Georgia Institute of Technology
publishDate 2007
url http://hdl.handle.net/1853/16284
work_keys_str_mv AT srivatsamudhakar securityarchitectureandprotocolsforoverlaynetworkservices
_version_ 1716474718384553984