Security Architecture and Protocols for Overlay Network Services
Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis...
Main Author: | |
---|---|
Published: |
Georgia Institute of Technology
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/16284 |
id |
ndltd-GATECH-oai-smartech.gatech.edu-1853-16284 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-GATECH-oai-smartech.gatech.edu-1853-162842013-01-07T20:20:47ZSecurity Architecture and Protocols for Overlay Network ServicesSrivatsa, MudhakarPerformance and scalabilityApplied cryptographySystems securityOverlay networksComputer architecture Security measuresComputer networks Security measuresPlug-ins (Computer programs)Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a proactive approach that cleanly retrofits security solutions into existing system architectures. The first step in this approach is to identify security threats, vulnerabilities and potential attacks on a system or an application. The second step is to develop security tools in the form of customizable and configurable plug-ins that address these security issues and minimally modify existing system code, while preserving its performance and scalability metrics. This thesis uses overlay network applications to shepherd through and address challenges involved in supporting security in large scale distributed systems. In particular, the focus is on two popular applications: publish/subscribe networks and VoIP networks. Our work on VoIP networks has for the first time identified and formalized caller identification attacks on VoIP networks. We have identified two attacks: a triangulation based timing attack on the VoIP network's route set up protocol and a flow analysis attack on the VoIP network's voice session protocol. These attacks allow an external observer (adversary) to uniquely (nearly) identify the true caller (and receiver) with high probability. Our work on the publish/subscribe networks has resulted in the development of an unified framework for handling event confidentiality, integrity, access control and DoS attacks, while incurring small overhead on the system. We have proposed a key isomorphism paradigm to preserve the confidentiality of events on publish/subscribe networks while permitting scalable content-based matching and routing. Our work on overlay network security has resulted in a novel information hiding technique on overlay networks. Our solution represents the first attempt to transparently hide the location of data items on an overlay network.Georgia Institute of Technology2007-08-16T17:57:57Z2007-08-16T17:57:57Z2007-05-16Dissertationhttp://hdl.handle.net/1853/16284 |
collection |
NDLTD |
sources |
NDLTD |
topic |
Performance and scalability Applied cryptography Systems security Overlay networks Computer architecture Security measures Computer networks Security measures Plug-ins (Computer programs) |
spellingShingle |
Performance and scalability Applied cryptography Systems security Overlay networks Computer architecture Security measures Computer networks Security measures Plug-ins (Computer programs) Srivatsa, Mudhakar Security Architecture and Protocols for Overlay Network Services |
description |
Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a proactive approach that cleanly retrofits security solutions into existing system architectures. The first step in this approach is to identify security threats, vulnerabilities and potential attacks on a system or an application. The second step is to develop security tools in the form of customizable and configurable plug-ins that address these security issues and minimally modify existing system code, while preserving its performance and scalability metrics.
This thesis uses overlay network applications to shepherd through and address challenges involved in supporting security in large scale distributed systems. In particular, the focus is on two popular applications: publish/subscribe networks and VoIP networks. Our work on VoIP networks has for the first time identified and formalized caller identification attacks on VoIP networks. We have identified two attacks: a triangulation based timing attack on the VoIP network's route set up protocol and a flow analysis attack on the VoIP network's voice session protocol. These attacks allow an external observer (adversary) to uniquely (nearly) identify the true caller (and receiver) with high probability. Our work on the publish/subscribe networks has resulted in the development of an unified framework for handling event confidentiality, integrity, access control and DoS attacks, while incurring small overhead on the system. We have proposed a key isomorphism paradigm to preserve the confidentiality of events on publish/subscribe networks while permitting scalable content-based matching and routing. Our work on overlay network security has resulted in a novel information hiding technique on overlay networks. Our solution represents the first attempt to transparently hide the location of data items on an overlay network. |
author |
Srivatsa, Mudhakar |
author_facet |
Srivatsa, Mudhakar |
author_sort |
Srivatsa, Mudhakar |
title |
Security Architecture and Protocols for Overlay Network Services |
title_short |
Security Architecture and Protocols for Overlay Network Services |
title_full |
Security Architecture and Protocols for Overlay Network Services |
title_fullStr |
Security Architecture and Protocols for Overlay Network Services |
title_full_unstemmed |
Security Architecture and Protocols for Overlay Network Services |
title_sort |
security architecture and protocols for overlay network services |
publisher |
Georgia Institute of Technology |
publishDate |
2007 |
url |
http://hdl.handle.net/1853/16284 |
work_keys_str_mv |
AT srivatsamudhakar securityarchitectureandprotocolsforoverlaynetworkservices |
_version_ |
1716474718384553984 |