1 / 9

Vulnerabilities of Reliable Multicast Protocols

Vulnerabilities of Reliable Multicast Protocols. Thomas M. Park, David A. Kassay, Clifford J. Weinstein Massachusetts Institute of Technology Lincoln Laboratory Lexinton, Massachusetts Reviewed by: Siu Fung (Andes) Chin. Vulnerabilities of Reliable Multicast Protocols. Outline Introduction

matsu
Télécharger la présentation

Vulnerabilities of Reliable Multicast Protocols

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Vulnerabilities of Reliable Multicast Protocols Thomas M. Park, David A. Kassay, Clifford J. Weinstein Massachusetts Institute of Technology Lincoln Laboratory Lexinton, Massachusetts Reviewed by: Siu Fung (Andes) Chin

  2. Vulnerabilities of Reliable Multicast Protocols • Outline • Introduction • Types of Protocols • Attacks • Defenses • Conclusion

  3. Multiple unicast transmission TCP/IP Multicast transmission RMP SRM Introduction

  4. Introduction (cond.) • Why reliable multicast transmission? • More efficient • Problems? • Lack of security • Solutions? • Network-level security (IPSEC) • Secret-key algorithm • Risk management approach

  5. Types of reliable multicast protocols • Sender-initiated reliability protocol • Positive acknowledgment (ACK) • ACK implosion • Example: RMP(Reliable Multicast Protocol) • Token around ring

  6. Types of reliable multicast protocols (cont) • Receiver-initiated reliability protocol • Negative acknowledgment (NCK) • NCK implosion • Example: SRM(Scalable Reliable Multicast Protocol) • Suppress excess NAK

  7. Vulnerabilities • Flooding attack • Consume network bandwidth/process time • Forged data attack • Corruption of files transmitted (RMP) • Premature ACK • Assign incorrect sequence no. (RMP) • NAK and retransmission suppression • Interfare retransmissions (SRM)

  8. Defense • Fliter received packets • Block attacker’s packet • Digitally signed messages • Identify legitimate members • Employ IGMP v3 (Internet Group Management Protocol) • Prevent flooding • Simple authentication protocol • Prevent spoofing

  9. Conclusion • Different types reliable multicast protocol • Different types attack • Different types defense • Increase protection – increase cost • Questions?

More Related