100 likes | 206 Views
Explore a DoS-resistant Distributed Hash Table system designed for information security in the face of insider and outsider attacks. Joint work by Christian Scheideler from Technische Universität München and Baruch Awerbuch from JHU. The system provides a scalable and robust solution for large information systems, minimizing replication and resource requirements. Learn how the innovative hashing and random placement approach ensures data consistency and makes attacks difficult. This platform is ideal for e-commerce and critical information services. Presented at DISC 2007.
E N D
A Denial-of-Service Resistant DHT Christian Scheideler Technische Universität München Joint work with Baruch Awerbuch, JHU
Motivation On Feb 6, a major DoS attack was launched against the root servers of the DNS system d d Internet d d d d
DoS-resistant Information System Problem: DNS-approach of full replication not feasible in large information systems off-the-shelfservers Internet
DoS-resistant Information System Scalable information system: storage over-head limited to logarithmic factor d Internet d d
Fundamental Dilemma • Scalability: minimize replication of information • Robustness: maximize resources needed by attacker d Internet d d
Fundamental Dilemma • Limitation to „legal“ attacks / information hiding • Information hiding difficult under insider attacks d Internet d d
You are fired! DoS-resistent Information System Past-Insider-Attack: Attacker knows every-thing about system till (unknown) time t0 Goal:scalable information system so that everything that was inserted or updated aftert0 is safe (w.h.p.) against any past-insider DoS attack that can shut down any -fraction of the servers, for some >0, and create any legal set of requests
Past Insider DoS Attack Dilemma: • Explicit data structure: problems with consistency and robustness • Fixed hash function: consistency much easier to maintain, but easy to attack • Random placement: difficult to attack, but also difficult to search for data Combine hashing with random placement!!
DoS-resistant DHT Our solution is a DHT-based system on • n completely interconnected, reliable servers • with O(log n) data redundancy (coding) Theorem: Under any -bounded past-insider attack (for some constant >0), our lookup protocol can serve any set of requests (one per server) in polylog time s.t. every request to a data item inserted or updated aftert0 is served correctly, w.h.p.
Conclusion Application: DoS-resistant platform for e-commerce or critical information services (Akamai) Regular paper: DISC 2007. Any questions?