90 likes | 98 Views
This review covers the vulnerabilities, attacks, defenses, and protocols related to reliable multicast transmission, including RMP and SRM. Learn about the risks, solutions, and defense mechanisms to enhance network security.
E N D
Vulnerabilities of Reliable Multicast Protocols Thomas M. Park, David A. Kassay, Clifford J. Weinstein Massachusetts Institute of Technology Lincoln Laboratory Lexinton, Massachusetts Reviewed by: Siu Fung (Andes) Chin
Vulnerabilities of Reliable Multicast Protocols • Outline • Introduction • Types of Protocols • Attacks • Defenses • Conclusion
Multiple unicast transmission TCP/IP Multicast transmission RMP SRM Introduction
Introduction (cond.) • Why reliable multicast transmission? • More efficient • Problems? • Lack of security • Solutions? • Network-level security (IPSEC) • Secret-key algorithm • Risk management approach
Types of reliable multicast protocols • Sender-initiated reliability protocol • Positive acknowledgment (ACK) • ACK implosion • Example: RMP(Reliable Multicast Protocol) • Token around ring
Types of reliable multicast protocols (cont) • Receiver-initiated reliability protocol • Negative acknowledgment (NCK) • NCK implosion • Example: SRM(Scalable Reliable Multicast Protocol) • Suppress excess NAK
Vulnerabilities • Flooding attack • Consume network bandwidth/process time • Forged data attack • Corruption of files transmitted (RMP) • Premature ACK • Assign incorrect sequence no. (RMP) • NAK and retransmission suppression • Interfare retransmissions (SRM)
Defense • Fliter received packets • Block attacker’s packet • Digitally signed messages • Identify legitimate members • Employ IGMP v3 (Internet Group Management Protocol) • Prevent flooding • Simple authentication protocol • Prevent spoofing
Conclusion • Different types reliable multicast protocol • Different types attack • Different types defense • Increase protection – increase cost • Questions?