10 likes | 148 Views
SecMon: End-to-End Quality and Security Monitoring System. SecMon system Designed for Peer-to-Peer Voice over IP service with assurance of Security Quality of Service. SecMon Architecture Network model P2P overlay network Three-layer node architecture Node model
E N D
SecMon: End-to-End Quality and Security Monitoring System • SecMon system • Designed for Peer-to-Peer Voice over IP service with assurance of • Security • Quality of Service • SecMon Architecture • Network model • P2P overlay network • Three-layer node architecture • Node model • Service Layer – SL • session establishment • reputation-based routing • session tear-down • Monitoring Layer – ML • reputation block – building node’s reputation,QoS and security routing decision support, hostile nodes isolation • monitoring block - calculation and evaluation E2E QoS parameters • security block – source and data authentication, integrity, • Transport Layer – TL • network conditions measurements, • real time and hidden data transmission • Communication between layers though Service Access Point – SAP • Reputation system model • Evidence repository feeding and Service Reputation (SR) building • For source node Sdepending on time nbased on Own Experience (OE), recommendations (V), end nodes’ credibility (IR) • QoS metrics and behaviouraldata consolidation • QoS & secure routing decision support • SecMon objectives – build a reliable and secure system for P2P VoIP • Security • Based on hiding techniques with no transmission bandwidth consumption • Digital watermarking and network steganography • Source authentication and data integrity • Quality of Service • Lightweight End-to-End QoS monitoring for network efficiency and performance • DDoS detection • Reliability • Reputation system for QoS and security support • QoS metrics and trust management for best path routing decision support • Misbehaviour detection and defence, hostile nodes isolation Fig. 1 P2P overlay network composition for SecMon Fig. 2 Three-layer node’s model for a flow transmission Fig. 3 Monitoring layer blocks and cooperation diagram Fig. 4 Example scenario of P2P communication in SecMon Contacts Tomasz Ciszkowski, t.ciszkowski@tele.pw.edu.pl Zbigniew Kotulski, z.kotulski@tele.pw.edu.pl Markus Fiedler, markus.fiedler@bth.se Charlott Eliasson, charlott.eliasson@bth.se Radu Lupu, radu.lupu@elcom.pub.ro Wojciech Mazurczyk, w.mazurczyk@tele.pw.edu.pl Fig. 5 Overall reputation management system for SecMon