Securing Phoenix Network Coordinate System: Difference between revisions
(7 intermediate revisions by one other user not shown) | |||
Line 2: | Line 2: | ||
{{Project Description | {{Project Description | ||
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | |supervisor=[http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen] | ||
|duration= | |duration=Since Oct 2010, 4 months | ||
|type= | |type=Student Project | ||
|status= | |status=ongoing | ||
}} | }} | ||
Line 13: | Line 13: | ||
There are some existing NC security solutions [4][5] proposed in Vivaldi NC system, which could be our good reference. | There are some existing NC security solutions [4][5] proposed in Vivaldi NC system, which could be our good reference. | ||
Good understanding of C/C++ is necessary for this project. | |||
== Reference == | == Reference == | ||
[http://www.springerlink.com/content/20qt876131833081/] | * [http://www.springerlink.com/content/20qt876131833081/]Y. Chen, X. Wang, X. Song, et al. Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System. In Proc. of IFIP/TC6 Networking, 2009 | ||
[planete.inria.fr/dabbous/publis/lsad06.pdf] | * [http://planete.inria.fr/dabbous/publis/lsad06.pdf] M.A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous. Real Attacks on Virtual Networks: Vivaldi out of tune. In Proc of the ACM SIGCOMM workshop Large Scale Attack Defense, 2006. | ||
[portal.acm.org/ft_gateway.cfm?id=1368453&type=pdf] | * [http://portal.acm.org/ft_gateway.cfm?id=1368453&type=pdf] M.A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous. Virtual Networks under Attack: Disrupting Internet Coordinate Systems. In Proc. of ACM CoNEXT, 2006. | ||
[micah.cis.upenn.edu/papers/veracity-usenix-atc09.pdf] | * [http://micah.cis.upenn.edu/papers/veracity-usenix-atc09.pdf] Micah Sherr, Matt Blaze, and Boon Thau Loo. Veracity: Practical Secure Network Coordinates via Vote-based Agreements. In Proc. of USENIX Annual Technical Conference, 2009. | ||
[www.springerlink.com/index/f348530225120185.pdf] | * [http://www.springerlink.com/index/f348530225120185.pdf] D. Saucez, B. Donnet and O. Bonaventure. A Reputation-Based Approach for Securing Vivaldi Embedding System. Proc. 13th EUNICE Open European Summer School and IFIP TC6.6 Workshop on Dependable and Adaptable Networks and Service, 2007. |
Latest revision as of 15:38, 1 October 2010
Details
Supervisor: | Yang Chen |
Duration: | Since Oct 2010, 4 months |
Type: | Student Project |
Status: | ongoing |
Description
Phoenix [1] is an accurate and decentralized Network Coordinate (NC) system. It can be used to predict the distance (latency) between two Internet hosts without performing directly measurement. We have demonstrated and evaluated Phoenix through Internet traces.
In this project, we are going to consider the security issues in Phoenix NC. There are different kinds of attacks [2] [3] in NC systems, and we are going to design and deploy some security method in Phoenix NC. Finally, we will use typical attacks with real measured Internet data sets to evaluate our design.
There are some existing NC security solutions [4][5] proposed in Vivaldi NC system, which could be our good reference.
Good understanding of C/C++ is necessary for this project.
Reference
- [1]Y. Chen, X. Wang, X. Song, et al. Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System. In Proc. of IFIP/TC6 Networking, 2009
- [2] M.A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous. Real Attacks on Virtual Networks: Vivaldi out of tune. In Proc of the ACM SIGCOMM workshop Large Scale Attack Defense, 2006.
- [3] M.A. Kaafar, L. Mathy, T. Turletti, and W. Dabbous. Virtual Networks under Attack: Disrupting Internet Coordinate Systems. In Proc. of ACM CoNEXT, 2006.
- [4] Micah Sherr, Matt Blaze, and Boon Thau Loo. Veracity: Practical Secure Network Coordinates via Vote-based Agreements. In Proc. of USENIX Annual Technical Conference, 2009.
- [5] D. Saucez, B. Donnet and O. Bonaventure. A Reputation-Based Approach for Securing Vivaldi Embedding System. Proc. 13th EUNICE Open European Summer School and IFIP TC6.6 Workshop on Dependable and Adaptable Networks and Service, 2007.