首页> 外文学位 >An overlay architecture for end -to -end service availability.
【24h】

An overlay architecture for end -to -end service availability.

机译:用于端到端服务可用性的覆盖体系结构。

获取原文
获取原文并翻译 | 示例

摘要

Perhaps one of the most compelling problems of the modern Internet is the lack of a comprehensive and unifying approach to dealing with service security and resilience. Although many such individual reliability mechanisms exist, no general set of policies or standards exists for how these mechanisms can be combined to achieve an overall robust state of security for the network. In short, no "security and availability" architecture exists. This thesis introduces and analyzes mechanisms that boost the security, resilience, and performance of network systems in a manner that is transparent to both the existing infrastructure and the end-users.;In this dissertation, we discuss our work on defending against distributed denial of service (DDoS) attacks. Such attacks involve large numbers of compromised hosts (bots) that send unsolicited traffic toward a target, thereby congesting the network links close to it, rendering its services unusable. To frustrate these types of attacks, we propose and evaluate practical mechanisms that can protect a wide range of services while maintaining or even improving their performance characteristics. Our approach is focused on network-level faults and attacks; we do not focus our attention on application-level service vulnerabilities. We do, however, offer protection against malicious or unexpected increases in network-bound service requests. Our end goal is to provide a practical end-to-end framework that significantly improves service availability and connectivity without incurring a prohibitive deployment or performance cost. Ideally, the protection system should be able to scale to millions of users and accommodate any applications' requirements including network latency and throughput. We developed a number of systems (PROOFS, WebSOS, MOVE, and packet spreading via multi-path overlays) that illustrate a progression toward the aforementioned goals.;Because our solutions depend on large scale overlay networks, we present a novel mechanism for protecting a wide class of these networks against insider attacks. For overlay networks that exhibit well-defined properties (due to their topology or structure), we demonstrate how to defend such networks against non-conforming (i.e., abnormal) behavior of participating nodes. In particular, we can defend against DoS attacks from within the overlay itself. We use a lightweight distributed detection mechanism that exploits inherent structural invariants of Distributed Hash Tables (DHTs) to ferret out anomalous flow behavior. Upon detection, we invoke a Pushback-like protocol to notify and prompt into action (e.g., throttle the traffic) the predecessor node: the node from which the offending traffic arrives. In addition, we demonstrate how to remain TCP-friendly by using packet spreading and replication techniques with regular TCP connections in addition to our UDP-based techniques. Our experiments show that our system can take advantage of the underlying multi-path link capacity without starving other flows over shared links. For TCP flows, we show that there is no significant throughput or latency degradation when using regular TCP connections.;To demonstrate the applicability of our system for real-time and interactive applications, we introduce Access Assured Mobile desktop computing (A 2M), a secure and attack-resilient remote desktop computing hosting infrastructure. A2M combines a stateless and secure communication protocol, a single-hop Indirection-based network (IBN) and a remote display architecture to provide mobile users with continuous access to their desktop computing sessions. Our architecture protects both the hosting infrastructure and the client's connections against a wide range of service disruption attacks. Unlike any other DoS protection system, A2M takes advantage of its low-latency remote display mechanisms and asymmetric traffic characteristics by using multi-path routing to send a small number of of each packet transmitted from client to server. This multi-path packet replication diversifies the client-server communication, boosts system resilience, and reduces end-to-end latency. Through deployment on a planet-lab, a distributed network, we show that A2M significantly increases the hosting infrastructure's attack resilience. Using current ISP bandwidth data, we can protect against attacks involving millions of bots while providing good performance for multimedia and web applications and basic GUI interactions even when up to 30% and 50%, respectively, of indirection nodes become completely unresponsive.
机译:现代互联网最引人注目的问题之一可能是缺乏处理服务安全性和弹性的全面统一的方法。尽管存在许多此类单独的可靠性机制,但是对于如何组合这些机制以实现网络的总体鲁棒性安全状态,没有通用的策略或标准集。简而言之,不存在“安全性和可用性”架构。本文介绍并分析了以既对现有基础架构又对最终用户透明的方式增强网络系统安全性,弹性和性能的机制。本论文讨论了防御分布式拒绝服务的工作。服务(DDoS)攻击。此类攻击涉及大量受损的主机(机器人),这些主机将未经请求的流量发送到目标,从而使靠近目标的网络链路拥塞,从而使其服务无法使用。为了挫败这些类型的攻击,我们提出并评估了可以保护广泛的服务同时维持甚至改善其性能特征的实用机制。我们的方法专注于网络级的故障和攻击。我们不会将注意力集中在应用程序级服务漏洞上。但是,我们确实提供了保护,以防止恶意的或意外的网络绑定服务请求增加。我们的最终目标是提供一个实用的端到端框架,该框架可显着提高服务可用性和连接性,而不会产生过高的部署或性能成本。理想情况下,保护系统应该能够扩展到数百万个用户,并适应任何应用程序的需求,包括网络延迟和吞吐量。我们开发了许多系统(PROOFS,WebSOS,MOVE和通过多路径覆盖进行数据包传播),说明了实现上述目标的过程。由于我们的解决方案依赖于大规模覆盖网络,因此我们提出了一种新颖的机制来保护这些网络可以抵御内部攻击。对于展现出明确定义的属性(由于其拓扑或结构)的覆盖网络,我们演示了如何保护此类网络免受参与节点的不合格(即异常)行为的侵害。特别是,我们可以从覆盖本身内部防御DoS攻击。我们使用一种轻量级的分布式检测机制,该机制利用分布式哈希表(DHT)的固有结构不变性来找出异常流行为。一经检测,我们就调用类似Pushback的协议来通知并提示先行节点(即有问题的流量从其到达的节点)采取行动(例如,限制流量)。此外,除了基于UDP的技术外,我们还将展示如何通过使用具有常规TCP连接的数据包扩展和复制技术来保持TCP友好。我们的实验表明,我们的系统可以利用基本的多路径链接容量,而不会导致共享链接上的其他流量不足。对于TCP流,我们显示使用常规TCP连接时不会显着降低吞吐量或延迟。为了演示我们的系统对实时和交互式应用程序的适用性,我们引入了Access Assured Mobile桌面计算(A 2M),安全和具有攻击力的远程桌面计算托管基础架构。 A2M结合了无状态和安全的通信协议,基于单跳基于方向的网络(IBN)和远程显示体系结构,可为移动用户提供对其桌面计算会话的连续访问。我们的体系结构可以保护主机基础架构和客户端的连接免受各种服务中断攻击。与任何其他DoS保护系统不同,A2M通过使用多路径路由发送少量从客户端到服务器传输的每个数据包,从而利用了其低延迟远程显示机制和不对称流量特性。这种多路径数据包复制使客户端与服务器之间的通信多样化,增强了系统弹性,并减少了端到端延迟。通过在星球实验室,分布式网络上进行部署,我们表明A2M大大提高了主机基础架构的攻击弹性。使用当前的ISP带宽数据,即使当多达30%和50%的间接节点完全不响应时,我们也可以抵御数百万个机器人的攻击,同时为多媒体和Web应用程序以及基本的GUI交互提供良好的性能。

著录项

  • 作者

    Stavrou, Angelos.;

  • 作者单位

    Columbia University.;

  • 授予单位 Columbia University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 206 p.
  • 总页数 206
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号