230 likes | 236 Views
Learn about pollution attacks on Internet proxy caches, effects on cache efficiency, detection mechanisms, and counter-pollution techniques to safeguard cache systems. Find out how to recognize and combat locality-disruption and false-locality attacks through advanced detection methods and algorithms.
E N D
Internet Cache Pollution Attacks and Countermeasures Yan Gao, Leiwen Deng, Aleksandar Kuzmanovic, and Yan Chen Electrical Engineering and Computer Science Department Northwestern University
Outline • Motivation • Pollution Attacks • Evaluation of Pollution Effects • Counter-Pollution Techniques & Evaluation • Conclusion
Motivation • Caching has been widely applied in the Internet • Decrease the amount of requests in server side • Reduce the amount of traffic in the network • Improve the client-perceived latency • Open proxy caches are used for various abuse-related activities • Proxy caches themselves become victims • Little attention given to such attacks • Existing pollution attacks mostly on content pollutions on P2P systems
Contributions • Propose a class ofpollution attackstargeted against Internet proxy caches • Locality-disruption (LD) attacks • False-locality (FL) attacks • Analyze the resilience of the current cache replacement algorithms to pollution attacks • Propose two cache pollution detection mechanisms • Detect LD, FL attacks, and their combination • Leverage data streaming computation techniques
Outline • Motivation • Pollution Attacks • Evaluation of Pollution Effects • Counter-Pollution Techniques & Evaluation • Conclusion
Pollution Attack Scenarios (I) Attacking a web cache Attacking an ISP cache
Pollution Attack Scenarios (II) ③ ④ ② ⑤ ⑥ ⑦ ① ⑧ Pollution attack against a local DNS server
Pollution Attack: Locality Disruption Before attack After attack New unpopular files Popular files ….... ….... ….... ….... Cache Cache • Goal: degrade cache efficiency by ruining its file locality • Activities: continuously generate requests fornew unpopular files
Pollution Attack: False Locality Before attack After attack Bogus popular files Popular files ….... ….... ….... ….... Cache Cache • Goal: degrade the hit ratio by creating false file locality • Activities: repeatedly requestthe same set of unpopular files
Outline • Motivation • Pollution Attacks • Evaluation of Pollution Effects • Counter-Pollution Techniques & Evaluation • Conclusion
Evaluation Methodology • Discrete-event simulator • Multiple DoS behaviors • Multiple workload characterizing behaviors • Effects of access and local network capacities • Workloads • P2P[K. Gummadi et al. ACM SOSP 03] • Web[F. Smith et al. SIGMETRICS 01] • NAT effects
Cache Replacement Algorithms • Least Recently Used (LRU) algorithm • Evict the least recently accessed document first • Least Frequently Used (LFU) algorithm • Evict the least frequently accessed document first • Greedy Dual-Sized Frequency (GDSF) algorithm • Consider the frequency of the documents • Allow smaller document to be cached first • Use dynamic aging policy
Baseline Experiments • Locality-disruption attacks Total hit ratio = Including attackers’ requests and regular users’ requests Stealthy! (4%) Small percent of malicious requests can significantly degrade the overall hit ratio
Baseline Experiments • False-locality attacks Total hit ratio is not a good indicator for attacks
Byte damage ratio = BHR(n)—byte hit ratio of regular clients without attacks BHR(a)—byte hit ratio of regular clients with attacks
Replacement Algorithms • Locality-disruption attacks LRU and LFU are more resilient to attacks, but still can not protect cache from pollution
Outline • Motivation • Pollution Attacks • Evaluation of Pollution Effects • Counter-Pollution Techniques & Evaluation • Conclusion
Detecting Locality Disruption Attacks • Observations: • Low total hit ratio • Short average life-time of all cached files • Design: • Detection: compute the average durations for all files in the cache • Mitigation: recognize the attackers
Detecting False Locality Attacks • Observations: • Clients who request a similar set of files residing in the cache • The repeated requests from the same IP to cached files • Design: • Large number of repeated requests • Large percent of repeated requests • Scalability: • Attacker-based detection: Bloom filter • Object-based detection: Probabilistic Counting with Stochastic Averaging (PCSA)
Evaluation of Pollution Detection • Results for false-locality attacks, more in paper For attacker’s file detection: True positive ratio =
Implementation • Realize the counter-pollution mechanisms • Code and more details http://networks.cs.northwestern.edu/AE/
Conclusions • Propose and evaluate two classes of attacks: locality-disruption and false-locality attacks • Show that pollution attacks are stealthy, but powerful, and different replacement algorithms have different resiliency • Propose and evaluate a set of scalable and effective counter-pollution mechanisms