100 likes | 218 Views
Decoy Router Placement. Jacopo Cesareo, Michael Schapira, and Jennifer Rexford Princeton University. Decoy Router Placement. Decoy router along the path to decoy destination … directs traffic to the covert destination. decoy destination. decoy router. client. covert destination.
E N D
Decoy Router Placement Jacopo Cesareo, Michael Schapira, and Jennifer Rexford Princeton University
Decoy Router Placement • Decoy router along the path to decoy destination • … directs traffic to the covert destination decoy destination decoy router client covert destination
Placement Problem • Given clients, destinations, and paths • Clients: {ci} • Decoy destinations: {dj} • Paths: {Pij} from client ci to decoy destination dj • Select K decoy routers • Decoy routers: {rk} from a set of candidates R • To maximize • # client/decoy pairs that traverse a decoy router, or • # clients traversing a decoy router for some decoy dest P11 c1 d1 c2 d2 c3 P32
Greedy Placement Algorithm • Computational limits • NP hard to find the optimal solution • Best approximation has ~2/3 bound • Heuristic based on “popularity” • # of (ci, dj) pairs traversing the router, or • # of ci traversing the router to reach some decoy dest • Greedy algorithm achieves the ~2/3 bound! • Select the most popular candidate • Remove all parties it “covers” • Recompute the popularities • Repeat until K routers are chosen P11 c1 d1 c2 d2 c3 P32
Initial Experiment • Autonomous System (AS) level model • RouteViews measurements of interdomain routing • CAIDA inferences of AS-level relationships • Simulation of AS-level routing decisions • Example experiment • Clients: all ASes located in Australia • Decoy destinations: ASes for Amazon and eBay • Candidate decoy routers: all ASes outside Australia • Results for two scenarios • # of client/decoy pairs that traverse a decoy router, or • # of clients that traverse a decoy router for some decoy
Conclusions and Future Work • Good coverage with relatively few decoy routers • Effective placement algorithm with good bound • Clients concentrated through a few regional ISPs • A few large ISPs provide most wide-area connectivity • Future work • Wider range of clients and decoy destinations • Direct measurements of AS paths and router-level paths • Selection of decoy destinations given the decoy routers • Reactions of adversaries to circumvent decoy routers
Decoy Router ASes • For clients in Australia • Decoy routers for clients • Cogent, AOL, NTT, ReachNetworks, Verizon • 174, 1668, 2914, 4637, 701 • Decoy routers for client/decoy-destination pairs • Singapore Telecom, ReachNetworks, Tata Communications, Cogent, Level3, Telecom New Zealand, NTT, KDDI, NetAccess • For clients in China • Decoy routers for clients • Cogent, SwissCom, NetAccess, … • Decoy routers for client/decoy-destination pairs • Cogent, Qwest, SwissCom, AOL, NetAccess, KDDI, Verizon, Deutsche Telekom, …