by: rebecca navarre & michael baker ii persea: making networks more secure since early 2013
TRANSCRIPT
![Page 1: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/1.jpg)
BY: REBECCA NAVARRE& MICHAEL BAKER I I
Persea:Making Networks More Secure Since Early 2013
![Page 2: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/2.jpg)
Biography
Rebecca NavarreWesleyan CollegeApplied Mathematical Sciences
Michael Baker IITarrant County CollegeMechanical Engineering
![Page 3: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/3.jpg)
Background
Peer-to-Peer NetworksDistributed Hash Tables (DHTs)Kad
![Page 4: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/4.jpg)
Peer-to-Peer Networks
Purpose: file & resource sharing networkNodes capable of acting like client and serverAccessible to peers directly( for pure, no
central/intermediary entity)Workload is partitioned between peers.There is no central point of failure.Examples: Napster(centralized),
Freenet(Gnutella protocol), Gnutella2 and Kazaa (hybrid)
![Page 5: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/5.jpg)
Peer-to-Peer cont.
Hybrid vs. Pure For Hybrid:
Allows for a central entity to provide network services or act as a security check.
For Pure All nodes are equal. When one node is removed,
the network continues without suffering a loss.
![Page 6: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/6.jpg)
Distributed Hash Table
Purpose: System of Efficient Resource Discovery
Messages come into DHTs, retrieved by matching keys
Based on <key, value> pairs.If change occurs, minimal disruptionAllows for large scale data recoveryKEY VALUE
1 100
2 200
3 300
4 400
![Page 7: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/7.jpg)
Kad
Purpose: offers consistent search/find protocol
Figure 1
![Page 8: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/8.jpg)
Kad Continued
Nodes know about neighborsK-buckets offer resistance to DOS attacks
Can’t flood out nodes with LIFO
LookupSource selects α # of closest nodes from its k-bucketSource sends look up request to each α node
selectedEach α node returns β # of nodes from searching k-
bucketsSource then has α into β # of nodes in listFrom this, source selects selects α # of closest
nodes from its k-bucketProcess continues until it reaches target node
![Page 9: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/9.jpg)
Persea Security
Initial Security Social Network &
DHT Invitation Only
Kad Message entry
DHT
Social Network
New Node N
N
N
![Page 10: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/10.jpg)
Hierarchical Node ID Distribution
Security
Bootstrap/Initiator Nodes
A B C D
a1 a2
q1
p2p1
d2d1
0
1
2
3
6364 127128 191192 255
1415 28
76 11
4
193 206207 221
Chunk factor: .65
Chunk Factor Calculation
64^(.65) = floor(14.929) = 14
![Page 11: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/11.jpg)
Persea Look Up Effeciency
Replication
Node holding <key,value> pair
k=3, stored in k-closest nodes
KADPERSE
A
![Page 12: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/12.jpg)
What Persea Is Up Against?
Sybil Attack
Advanced Attack Node Insertion Node ID Hijacking
![Page 13: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/13.jpg)
The Roles of the Attackers
Silent
Active
![Page 14: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/14.jpg)
Topologies
SOCIAL NETWORK NODES EDGES
Wiki-Vote 7115 103689
Soc-Epinions1 75879 508837
![Page 15: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/15.jpg)
Silent vs. Active Sybil Attack
Social Network Data Set used: soc-Epinions1
![Page 16: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/16.jpg)
Hop Count: Active Sybil Attack
![Page 17: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/17.jpg)
Active Sybil Attack(wiki-Vote)
Social Network Data Set used: wiki-Vote
![Page 18: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/18.jpg)
Advanced & Sybil Attack
![Page 19: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/19.jpg)
Nodes per Attack Edge
Social Network Data Set used: soc-Epinions1
![Page 20: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/20.jpg)
Active Sybil Attack (wiki-Vote)
Social Network Data Set used: wiki-Vote
![Page 21: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/21.jpg)
Hop Count: Advanced & Sybil Attack
Social Network Data Set used: soc-Epinions1
![Page 22: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/22.jpg)
Acknowledgements
Dr. Matthew WrightPh. D. Students: Mahdi Nasrullah Al-Ameen
& Charles GatzDr. YazdaniUniversity of Texas at ArlingtonNational Science Foundation
![Page 23: BY: REBECCA NAVARRE & MICHAEL BAKER II Persea: Making Networks More Secure Since Early 2013](https://reader035.vdocuments.net/reader035/viewer/2022070413/5697bfe11a28abf838cb39db/html5/thumbnails/23.jpg)
Questions?
Thank you for your time.