SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
1/16
PIT Overload Analysis in Content
Centric Networks
Matteo Virgilio, Guido Marchetto, Riccardo Sisto
Department of Control and Computer Engineering
Politecnico di Torino
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
2/16
A stateful protocol: the Pending Interest Table
• Used to store all seen Interests
• One entry for each requested piece of content
• Multiple Interests for a single name are merged in a single
entry (Interest merging)
Name Pending
Interfaces
/acm.org/papers/paperA.pdf/1 etho
/acm.org/papers/paperB.pdf/1 eth1
/acm.org/papers/paperA.pdf/2 eth0
/acm.org/papers/paperB.pdf/2 eth1
CCN Router PIT
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
3/16
Problem Description
• Malicious users could craft Interests for non existing
resources: Interest Flooding Attack (IFA)
– Very long random names
– possibly long lifetime values (even hundreads of seconds)
• Why do we have to consider so “long” requests? The
answer is long-polling!
• Supporting publish/subscribe paradigm may require to
store long (potentially unanswered) requests for a long
period of time
• No information about when the response will be generated
(routers cannot make any assumption)
• Simply dropping Interests with high lifetime is too simplistic
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
4/16
What has been done in recent literature?
• A wide part of the research activity focused on privacy and
data integrity issues
• What about the PIT?
– Some architecture proposals
• Bloom filter implementation of the PIT (DiPIT)
• Hash based PIT implementation with some interesting variants
(Name Prefix Tree encoding)
– Reactive algorithms for IFA handling:
• Statistics based reaction to attackers activity;
• Poseidon Framework (very recent)
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
5/16
Our contribution
• Simulation based approach
– we developed a full custom Java ccnSimulator
• Different target: evaluating attack impact on a real
topology
• Evaluate different PIT architectures in various network load
(and attack) scenarios
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
6/16
Simulation scenario
• Reference topology from Telecom Italia (the most prominent
Italian ISP)
• 9 milions of subscribers
• ADSL with 7Mbps/1Mbps
(downlink/uplink)
• Zipf content distribution
• Metrics gathered
– Chunk retransmission rate
at the endpoints
• Fixed PIT size
– 1 GB
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
7/16
Attack model
• Distributed bot net
• Different simulation campaigns
1) Variable lifeTime
2) Variable bandwidth
• Different URI size
 ≈1000 bytes for the SimplePIT
case
 20 bytes for the HashedPIT
case (SHA-1 as hashing
algorithm)
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
8/16
Attacker’s transmission efficiency
SimplePIT
Attack efficiency
HashedPIT, DiPIT
Attack efficiency
Interest Header
(20 bytes)
Resource name
(1000 bytes)
Interest Header
(20 bytes)
Resource name
(20 bytes)
%98
)100020(
1000

 bytes
bytes
%50
)2020(
20

 bytes
bytes
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
9/16
Simulation Results (1)
AttackSettings SimplePIT
Retransmissions /RAMusage
HashedPIT
Retransmissions/RAMusage
DiPIT
Retransmissions /RAMusage
Band = 100 Mbps
LifeTime= 4 sec
0 49 MB 0 25 MB 0.01 % 1 GB
Band = 500 Mbps
LifeTime= 4 sec
0 245 MB 0 125 MB 2.42 % 1 GB
Band = 2Gbps
LifeTime= 4 sec
0 980 MB 0 500 MB 87.6 % 1 GB
Band = 4Gbps
LifeTime= 4 sec
15 % FULL 83 % FULL 90 % 1 GB
Band = 100 Mbps
LifeTime= 60 sec
0 735 MB 0 375 MB 21 % 1 GB
Band = 100 Mbps
LifeTime= 120 sec
37 % FULL 0 750 MB 86 % 1 GB
Band = 100 Mbps
LifeTime= 180 sec
52 % FULL ∞ FULL 88 % 1 GB
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
10/16
Simulation Results (1)
AttackSettings SimplePIT
Retransmissions /RAMusage
HashedPIT
Retransmissions/RAMusage
DiPIT
Retransmissions /RAMusage
Band = 100 Mbps
LifeTime= 4 sec
0 49 MB 0 25 MB 0.01 % 1 GB
Band = 500 Mbps
LifeTime= 4 sec
0 245 MB 0 125 MB 2.42 % 1 GB
Band = 2Gbps
LifeTime= 4 sec
0 980 MB 0 500 MB 87.6 % 1 GB
Band = 4Gbps
LifeTime= 4 sec
15 % FULL 83 % FULL 90 % 1 GB
Band = 100 Mbps
LifeTime= 60 sec
0 735 MB 0 375 MB 21 % 1 GB
Band = 100 Mbps
LifeTime= 120 sec
37 % FULL 0 750 MB 86 % 1 GB
Band = 100 Mbps
LifeTime= 180 sec
52 % FULL ∞ FULL 88 % 1 GB
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
11/16
Simulation Results (1)
AttackSettings SimplePIT
Retransmissions /RAMusage
HashedPIT
Retransmissions/RAMusage
DiPIT
Retransmissions /RAMusage
Band = 100 Mbps
LifeTime= 4 sec
0 49 MB 0 25 MB 0.01 % 1 GB
Band = 500 Mbps
LifeTime= 4 sec
0 245 MB 0 125 MB 2.42 % 1 GB
Band = 2Gbps
LifeTime= 4 sec
0 980 MB 0 500 MB 87.6 % 1 GB
Band = 4Gbps
LifeTime= 4 sec
15 % FULL 83 % FULL 90 % 1 GB
Band = 100 Mbps
LifeTime= 60 sec
0 735 MB 0 375 MB 21 % 1 GB
Band = 100 Mbps
LifeTime= 120 sec
37 % FULL 0 750 MB 86 % 1 GB
Band = 100 Mbps
LifeTime= 180 sec
52 % FULL ∞ FULL 88 % 1 GB
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
12/16
Simulation Results (1)
AttackSettings SimplePIT
Retransmissions /RAMusage
HashedPIT
Retransmissions/RAMusage
DiPIT
Retransmissions /RAMusage
Band = 100 Mbps
LifeTime= 4 sec
0 49 MB 0 25 MB 0.01 % 1 GB
Band = 500 Mbps
LifeTime= 4 sec
0 245 MB 0 125 MB 2.42 % 1 GB
Band = 2Gbps
LifeTime= 4 sec
0 980 MB 0 500 MB 87.6 % 1 GB
Band = 4Gbps
LifeTime= 4 sec
15 % FULL 83 % FULL 90 % 1 GB
Band = 100 Mbps
LifeTime= 60 sec
0 735 MB 0 375 MB 21 % 1 GB
Band = 100 Mbps
LifeTime= 120 sec
37 % FULL 0 750 MB 86 % 1 GB
Band = 100 Mbps
LifeTime= 180 sec
52 % FULL ∞ FULL 88 % 1 GB
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
13/16
Simulation Results (2)
• Settings: Band = 100 Mbps, LifeTime = 180 sec
• Settings: Band = 4 Gbps, LifeTime = 4 sec
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
14/16
Conclusion
• All the architectures work properly in normal network
conditions and also in presence of low intensity attack
• HashedPIT is the most affected PIT in our context
• Other scenarios could be designed to worsen SimplePIT too
– Distribute more zombies around the network;
– Combine both high bandwidth and high lifetime to maximize
the attack effectiveness;
– …
• Scalable and robust solutions are needed to ensure an
adequate level of confidence to the CCN paradigm.
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
15/16
Future contribution
• Very recent solutions have been proposed to mitigate the
impact of Interest Flooding Attacks
• Our plan for the future is to evaluate them in our scenarios
in terms of:
– Resilience
– CPU usage
– Memory usage
ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013
16/16
Thank you for the attention!

Mais conteúdo relacionado

Mais procurados

Improving NTP Installed Base Time Accuracy
Improving NTP Installed Base Time AccuracyImproving NTP Installed Base Time Accuracy
Improving NTP Installed Base Time AccuracyADVA
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Syuan Wang
 
IEEE 1588 Timing for Mobile Backhaul_Webinar
IEEE 1588 Timing for Mobile Backhaul_WebinarIEEE 1588 Timing for Mobile Backhaul_Webinar
IEEE 1588 Timing for Mobile Backhaul_WebinarSymmetricomSYMM
 
In Service Monitoring and Assurance at ITSF 2014
In Service Monitoring and Assurance at ITSF 2014 In Service Monitoring and Assurance at ITSF 2014
In Service Monitoring and Assurance at ITSF 2014 ADVA
 
FAUST: Fast Per-Scene Encoding Using Entropy-Based Scene Detection and Machin...
FAUST: Fast Per-Scene Encoding Using Entropy-Based Scene Detection and Machin...FAUST: Fast Per-Scene Encoding Using Entropy-Based Scene Detection and Machin...
FAUST: Fast Per-Scene Encoding Using Entropy-Based Scene Detection and Machin...Alpen-Adria-Universität
 
Future services on Janet
Future services on JanetFuture services on Janet
Future services on JanetJisc
 
flowspec @ APF 2013
flowspec @ APF 2013flowspec @ APF 2013
flowspec @ APF 2013Tom Paseka
 
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloudLAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloudJisc
 
Blackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_vossBlackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_vossPavel Odintsov
 
INCEPT: Intra CU Depth Prediction for HEVC
INCEPT: Intra CU Depth Prediction for HEVCINCEPT: Intra CU Depth Prediction for HEVC
INCEPT: Intra CU Depth Prediction for HEVCAlpen-Adria-Universität
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Syuan Wang
 
RDMA programming design and case studies – for better performance distributed...
RDMA programming design and case studies – for better performance distributed...RDMA programming design and case studies – for better performance distributed...
RDMA programming design and case studies – for better performance distributed...NTT Software Innovation Center
 
(Slides) P2P video broadcast based on per-peer transcoding and its evaluatio...
(Slides) P2P video broadcast based on per-peer transcoding and its evaluatio...(Slides) P2P video broadcast based on per-peer transcoding and its evaluatio...
(Slides) P2P video broadcast based on per-peer transcoding and its evaluatio...Naoki Shibata
 
2013 09-02 senzations-bimschas-part1-smart-santander-facility-luebeck
2013 09-02 senzations-bimschas-part1-smart-santander-facility-luebeck2013 09-02 senzations-bimschas-part1-smart-santander-facility-luebeck
2013 09-02 senzations-bimschas-part1-smart-santander-facility-luebeckDaniel Bimschas
 
Skydive, real-time network analyzer
Skydive, real-time network analyzer Skydive, real-time network analyzer
Skydive, real-time network analyzer Sylvain Afchain
 
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause TimePerformance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause TimeAkmal
 
More Efficient Object Replication in OpenStack Summit Juno
More Efficient Object Replication in OpenStack Summit JunoMore Efficient Object Replication in OpenStack Summit Juno
More Efficient Object Replication in OpenStack Summit JunoKota Tsuyuzaki
 
Update on progress: SA#87 e meeting
Update on progress: SA#87 e meetingUpdate on progress: SA#87 e meeting
Update on progress: SA#87 e meeting3G4G
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - OverviewM2M Alliance e.V.
 

Mais procurados (20)

Improving NTP Installed Base Time Accuracy
Improving NTP Installed Base Time AccuracyImproving NTP Installed Base Time Accuracy
Improving NTP Installed Base Time Accuracy
 
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
Labmeeting - 20150831 - Overhead and Performance of Low Latency Live Streamin...
 
IEEE 1588 Timing for Mobile Backhaul_Webinar
IEEE 1588 Timing for Mobile Backhaul_WebinarIEEE 1588 Timing for Mobile Backhaul_Webinar
IEEE 1588 Timing for Mobile Backhaul_Webinar
 
In Service Monitoring and Assurance at ITSF 2014
In Service Monitoring and Assurance at ITSF 2014 In Service Monitoring and Assurance at ITSF 2014
In Service Monitoring and Assurance at ITSF 2014
 
FAUST: Fast Per-Scene Encoding Using Entropy-Based Scene Detection and Machin...
FAUST: Fast Per-Scene Encoding Using Entropy-Based Scene Detection and Machin...FAUST: Fast Per-Scene Encoding Using Entropy-Based Scene Detection and Machin...
FAUST: Fast Per-Scene Encoding Using Entropy-Based Scene Detection and Machin...
 
Future services on Janet
Future services on JanetFuture services on Janet
Future services on Janet
 
flowspec @ APF 2013
flowspec @ APF 2013flowspec @ APF 2013
flowspec @ APF 2013
 
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloudLAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
LAN, WAN, SAN upgrades: hyperconverged vs traditional vs cloud
 
Blackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_vossBlackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_voss
 
INCEPT: Intra CU Depth Prediction for HEVC
INCEPT: Intra CU Depth Prediction for HEVCINCEPT: Intra CU Depth Prediction for HEVC
INCEPT: Intra CU Depth Prediction for HEVC
 
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
Labmeeting - 20151013 - Adaptive Video Streaming over HTTP with Dynamic Resou...
 
RDMA programming design and case studies – for better performance distributed...
RDMA programming design and case studies – for better performance distributed...RDMA programming design and case studies – for better performance distributed...
RDMA programming design and case studies – for better performance distributed...
 
(Slides) P2P video broadcast based on per-peer transcoding and its evaluatio...
(Slides) P2P video broadcast based on per-peer transcoding and its evaluatio...(Slides) P2P video broadcast based on per-peer transcoding and its evaluatio...
(Slides) P2P video broadcast based on per-peer transcoding and its evaluatio...
 
2013 09-02 senzations-bimschas-part1-smart-santander-facility-luebeck
2013 09-02 senzations-bimschas-part1-smart-santander-facility-luebeck2013 09-02 senzations-bimschas-part1-smart-santander-facility-luebeck
2013 09-02 senzations-bimschas-part1-smart-santander-facility-luebeck
 
Skydive, real-time network analyzer
Skydive, real-time network analyzer Skydive, real-time network analyzer
Skydive, real-time network analyzer
 
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause TimePerformance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
Performance Analysis Of AOMDV In Terms Of Mobility Speed And Pause Time
 
More Efficient Object Replication in OpenStack Summit Juno
More Efficient Object Replication in OpenStack Summit JunoMore Efficient Object Replication in OpenStack Summit Juno
More Efficient Object Replication in OpenStack Summit Juno
 
Update on progress: SA#87 e meeting
Update on progress: SA#87 e meetingUpdate on progress: SA#87 e meeting
Update on progress: SA#87 e meeting
 
UDT
UDTUDT
UDT
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - Overview
 

Semelhante a Analysis of PIT Overload in Content Centric Networks

PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...PROIDEA
 
Simplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolSimplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolJose Saldana
 
Introducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksIntroducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksADVA
 
High-performance 32G Fibre Channel Module on MDS 9700 Directors:
High-performance 32G Fibre Channel Module on MDS 9700 Directors:High-performance 32G Fibre Channel Module on MDS 9700 Directors:
High-performance 32G Fibre Channel Module on MDS 9700 Directors:Tony Antony
 
On the feasibility of 40 Gbps network data capture and retention with general...
On the feasibility of 40 Gbps network data capture and retention with general...On the feasibility of 40 Gbps network data capture and retention with general...
On the feasibility of 40 Gbps network data capture and retention with general...Jorge E. López de Vergara Méndez
 
Dataplane networking acceleration with OpenDataplane / Максим Уваров (Linaro)
Dataplane networking acceleration with OpenDataplane / Максим Уваров (Linaro)Dataplane networking acceleration with OpenDataplane / Максим Уваров (Linaro)
Dataplane networking acceleration with OpenDataplane / Максим Уваров (Linaro)Ontico
 
An overview of 100GbE technology, now and the future
An overview of 100GbE technology, now and the futureAn overview of 100GbE technology, now and the future
An overview of 100GbE technology, now and the futureJisc
 
Opinion: What is “Real 5G”? (and “Real 4G”?)
Opinion: What is “Real 5G”? (and “Real 4G”?)Opinion: What is “Real 5G”? (and “Real 4G”?)
Opinion: What is “Real 5G”? (and “Real 4G”?)3G4G
 
The Impact of Software-based Virtual Network in the Public Cloud
The Impact of Software-based Virtual Network in the Public CloudThe Impact of Software-based Virtual Network in the Public Cloud
The Impact of Software-based Virtual Network in the Public CloudChunghan Lee
 
PCIe Gen 3.0 Presentation @ 4th FPGA Camp
PCIe Gen 3.0 Presentation @ 4th FPGA CampPCIe Gen 3.0 Presentation @ 4th FPGA Camp
PCIe Gen 3.0 Presentation @ 4th FPGA CampFPGA Central
 
Cellular LPWA for the IoT
Cellular LPWA for the IoTCellular LPWA for the IoT
Cellular LPWA for the IoTNicolas Damour
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT PROIDEA
 
Cisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentationCisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentationJeff Squyres
 
Extending the life of your device (firmware updates over LoRa) - LoRa AMM
Extending the life of your device (firmware updates over LoRa) - LoRa AMMExtending the life of your device (firmware updates over LoRa) - LoRa AMM
Extending the life of your device (firmware updates over LoRa) - LoRa AMMJan Jongboom
 
David Soldani, Huawei
David Soldani, HuaweiDavid Soldani, Huawei
David Soldani, HuaweiHilary Ip
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus SDN/OpenFlow switch
 

Semelhante a Analysis of PIT Overload in Content Centric Networks (20)

PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
PLNOG 13: Alexis Dacquay: Handling high-bandwidth-consumption applications in...
 
Simplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocolSimplemux: a generic multiplexing protocol
Simplemux: a generic multiplexing protocol
 
Introducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksIntroducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect Networks
 
High-performance 32G Fibre Channel Module on MDS 9700 Directors:
High-performance 32G Fibre Channel Module on MDS 9700 Directors:High-performance 32G Fibre Channel Module on MDS 9700 Directors:
High-performance 32G Fibre Channel Module on MDS 9700 Directors:
 
100 M pps on PC.
100 M pps on PC.100 M pps on PC.
100 M pps on PC.
 
On the feasibility of 40 Gbps network data capture and retention with general...
On the feasibility of 40 Gbps network data capture and retention with general...On the feasibility of 40 Gbps network data capture and retention with general...
On the feasibility of 40 Gbps network data capture and retention with general...
 
Dataplane networking acceleration with OpenDataplane / Максим Уваров (Linaro)
Dataplane networking acceleration with OpenDataplane / Максим Уваров (Linaro)Dataplane networking acceleration with OpenDataplane / Максим Уваров (Linaro)
Dataplane networking acceleration with OpenDataplane / Максим Уваров (Linaro)
 
Rust at Ather
Rust at AtherRust at Ather
Rust at Ather
 
An overview of 100GbE technology, now and the future
An overview of 100GbE technology, now and the futureAn overview of 100GbE technology, now and the future
An overview of 100GbE technology, now and the future
 
Opinion: What is “Real 5G”? (and “Real 4G”?)
Opinion: What is “Real 5G”? (and “Real 4G”?)Opinion: What is “Real 5G”? (and “Real 4G”?)
Opinion: What is “Real 5G”? (and “Real 4G”?)
 
The Impact of Software-based Virtual Network in the Public Cloud
The Impact of Software-based Virtual Network in the Public CloudThe Impact of Software-based Virtual Network in the Public Cloud
The Impact of Software-based Virtual Network in the Public Cloud
 
PCIe Gen 3.0 Presentation @ 4th FPGA Camp
PCIe Gen 3.0 Presentation @ 4th FPGA CampPCIe Gen 3.0 Presentation @ 4th FPGA Camp
PCIe Gen 3.0 Presentation @ 4th FPGA Camp
 
Cellular LPWA for the IoT
Cellular LPWA for the IoTCellular LPWA for the IoT
Cellular LPWA for the IoT
 
CTIA 2010 Corporate Overview
CTIA 2010 Corporate OverviewCTIA 2010 Corporate Overview
CTIA 2010 Corporate Overview
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
 
MWC 2010 LTE
MWC 2010 LTEMWC 2010 LTE
MWC 2010 LTE
 
Cisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentationCisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentation
 
Extending the life of your device (firmware updates over LoRa) - LoRa AMM
Extending the life of your device (firmware updates over LoRa) - LoRa AMMExtending the life of your device (firmware updates over LoRa) - LoRa AMM
Extending the life of your device (firmware updates over LoRa) - LoRa AMM
 
David Soldani, Huawei
David Soldani, HuaweiDavid Soldani, Huawei
David Soldani, Huawei
 
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics WorkshopLagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
Lagopus presentation on 14th Annual ON*VECTOR International Photonics Workshop
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Analysis of PIT Overload in Content Centric Networks

  • 1. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 1/16 PIT Overload Analysis in Content Centric Networks Matteo Virgilio, Guido Marchetto, Riccardo Sisto Department of Control and Computer Engineering Politecnico di Torino
  • 2. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 2/16 A stateful protocol: the Pending Interest Table • Used to store all seen Interests • One entry for each requested piece of content • Multiple Interests for a single name are merged in a single entry (Interest merging) Name Pending Interfaces /acm.org/papers/paperA.pdf/1 etho /acm.org/papers/paperB.pdf/1 eth1 /acm.org/papers/paperA.pdf/2 eth0 /acm.org/papers/paperB.pdf/2 eth1 CCN Router PIT
  • 3. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 3/16 Problem Description • Malicious users could craft Interests for non existing resources: Interest Flooding Attack (IFA) – Very long random names – possibly long lifetime values (even hundreads of seconds) • Why do we have to consider so “long” requests? The answer is long-polling! • Supporting publish/subscribe paradigm may require to store long (potentially unanswered) requests for a long period of time • No information about when the response will be generated (routers cannot make any assumption) • Simply dropping Interests with high lifetime is too simplistic
  • 4. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 4/16 What has been done in recent literature? • A wide part of the research activity focused on privacy and data integrity issues • What about the PIT? – Some architecture proposals • Bloom filter implementation of the PIT (DiPIT) • Hash based PIT implementation with some interesting variants (Name Prefix Tree encoding) – Reactive algorithms for IFA handling: • Statistics based reaction to attackers activity; • Poseidon Framework (very recent)
  • 5. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 5/16 Our contribution • Simulation based approach – we developed a full custom Java ccnSimulator • Different target: evaluating attack impact on a real topology • Evaluate different PIT architectures in various network load (and attack) scenarios
  • 6. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 6/16 Simulation scenario • Reference topology from Telecom Italia (the most prominent Italian ISP) • 9 milions of subscribers • ADSL with 7Mbps/1Mbps (downlink/uplink) • Zipf content distribution • Metrics gathered – Chunk retransmission rate at the endpoints • Fixed PIT size – 1 GB
  • 7. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 7/16 Attack model • Distributed bot net • Different simulation campaigns 1) Variable lifeTime 2) Variable bandwidth • Different URI size  ≈1000 bytes for the SimplePIT case  20 bytes for the HashedPIT case (SHA-1 as hashing algorithm)
  • 8. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 8/16 Attacker’s transmission efficiency SimplePIT Attack efficiency HashedPIT, DiPIT Attack efficiency Interest Header (20 bytes) Resource name (1000 bytes) Interest Header (20 bytes) Resource name (20 bytes) %98 )100020( 1000   bytes bytes %50 )2020( 20   bytes bytes
  • 9. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 9/16 Simulation Results (1) AttackSettings SimplePIT Retransmissions /RAMusage HashedPIT Retransmissions/RAMusage DiPIT Retransmissions /RAMusage Band = 100 Mbps LifeTime= 4 sec 0 49 MB 0 25 MB 0.01 % 1 GB Band = 500 Mbps LifeTime= 4 sec 0 245 MB 0 125 MB 2.42 % 1 GB Band = 2Gbps LifeTime= 4 sec 0 980 MB 0 500 MB 87.6 % 1 GB Band = 4Gbps LifeTime= 4 sec 15 % FULL 83 % FULL 90 % 1 GB Band = 100 Mbps LifeTime= 60 sec 0 735 MB 0 375 MB 21 % 1 GB Band = 100 Mbps LifeTime= 120 sec 37 % FULL 0 750 MB 86 % 1 GB Band = 100 Mbps LifeTime= 180 sec 52 % FULL ∞ FULL 88 % 1 GB
  • 10. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 10/16 Simulation Results (1) AttackSettings SimplePIT Retransmissions /RAMusage HashedPIT Retransmissions/RAMusage DiPIT Retransmissions /RAMusage Band = 100 Mbps LifeTime= 4 sec 0 49 MB 0 25 MB 0.01 % 1 GB Band = 500 Mbps LifeTime= 4 sec 0 245 MB 0 125 MB 2.42 % 1 GB Band = 2Gbps LifeTime= 4 sec 0 980 MB 0 500 MB 87.6 % 1 GB Band = 4Gbps LifeTime= 4 sec 15 % FULL 83 % FULL 90 % 1 GB Band = 100 Mbps LifeTime= 60 sec 0 735 MB 0 375 MB 21 % 1 GB Band = 100 Mbps LifeTime= 120 sec 37 % FULL 0 750 MB 86 % 1 GB Band = 100 Mbps LifeTime= 180 sec 52 % FULL ∞ FULL 88 % 1 GB
  • 11. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 11/16 Simulation Results (1) AttackSettings SimplePIT Retransmissions /RAMusage HashedPIT Retransmissions/RAMusage DiPIT Retransmissions /RAMusage Band = 100 Mbps LifeTime= 4 sec 0 49 MB 0 25 MB 0.01 % 1 GB Band = 500 Mbps LifeTime= 4 sec 0 245 MB 0 125 MB 2.42 % 1 GB Band = 2Gbps LifeTime= 4 sec 0 980 MB 0 500 MB 87.6 % 1 GB Band = 4Gbps LifeTime= 4 sec 15 % FULL 83 % FULL 90 % 1 GB Band = 100 Mbps LifeTime= 60 sec 0 735 MB 0 375 MB 21 % 1 GB Band = 100 Mbps LifeTime= 120 sec 37 % FULL 0 750 MB 86 % 1 GB Band = 100 Mbps LifeTime= 180 sec 52 % FULL ∞ FULL 88 % 1 GB
  • 12. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 12/16 Simulation Results (1) AttackSettings SimplePIT Retransmissions /RAMusage HashedPIT Retransmissions/RAMusage DiPIT Retransmissions /RAMusage Band = 100 Mbps LifeTime= 4 sec 0 49 MB 0 25 MB 0.01 % 1 GB Band = 500 Mbps LifeTime= 4 sec 0 245 MB 0 125 MB 2.42 % 1 GB Band = 2Gbps LifeTime= 4 sec 0 980 MB 0 500 MB 87.6 % 1 GB Band = 4Gbps LifeTime= 4 sec 15 % FULL 83 % FULL 90 % 1 GB Band = 100 Mbps LifeTime= 60 sec 0 735 MB 0 375 MB 21 % 1 GB Band = 100 Mbps LifeTime= 120 sec 37 % FULL 0 750 MB 86 % 1 GB Band = 100 Mbps LifeTime= 180 sec 52 % FULL ∞ FULL 88 % 1 GB
  • 13. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 13/16 Simulation Results (2) • Settings: Band = 100 Mbps, LifeTime = 180 sec • Settings: Band = 4 Gbps, LifeTime = 4 sec
  • 14. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 14/16 Conclusion • All the architectures work properly in normal network conditions and also in presence of low intensity attack • HashedPIT is the most affected PIT in our context • Other scenarios could be designed to worsen SimplePIT too – Distribute more zombies around the network; – Combine both high bandwidth and high lifetime to maximize the attack effectiveness; – … • Scalable and robust solutions are needed to ensure an adequate level of confidence to the CCN paradigm.
  • 15. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 15/16 Future contribution • Very recent solutions have been proposed to mitigate the impact of Interest Flooding Attacks • Our plan for the future is to evaluate them in our scenarios in terms of: – Resilience – CPU usage – Memory usage
  • 16. ACM SIGCOMM Workshop on Information-Centric Networking – 12/08/2013 16/16 Thank you for the attention!