DocumentCode :
1756294
Title :
Effective Statistical Detection of Smart Confidentiality Attacks in Multi-Domain Networks
Author :
Gharbaoui, M. ; Paolucci, Francesco ; Giorgetti, A. ; Martini, Ben ; Castoldi, Piero
Author_Institution :
TeCIP Inst., Scuola Superiore Sant´Anna, Pisa, Italy
Volume :
10
Issue :
4
fYear :
2013
fDate :
41609
Firstpage :
383
Lastpage :
397
Abstract :
The need to preserve information confidentiality among network providers has prevented the actual deployment of effective Traffic Engineering (TE) solutions for QoS-enabled end-to-end connectivity services in multi-domain multi-provider networks. The use of Path Computation Element (PCE) architecture can foster the effective implementation of TE through a centralized engine devoted to end-to-end path computations. However, despite authentication, authorization and encryption, confidentiality issues may arise due to abuses of information included in path computation replies to bogus requests issued by malicious PCEs. This paper first demonstrates the security leak allowing the exposure of intra-domain information in current inter-PCE path computation procedures. Then it proposes an anomaly-based approach, namely PCE Anomaly Detector (PAD) in order to detect malicious utilization of path computation services. The proposed PAD employs a novel double-step multi-dimensional formulation based on the Sequential Hypothesis Testing (SHT) statistical classification procedure, able to recognize a suspicious sequence of requests while aiming at inferring confidential information about other domains. PAD is extensively evaluated through simulations. Results show good performance in terms of detection capabilities while guaranteeing the trade-off between accuracy and responsiveness, minimizing false alarm occurrences. Robustness against smart attacks is also proved with respect to a comprehensive set of attack patterns and under different network load conditions. Finally, intra-domain information exposition is evaluated, showing the PAD ability to preserve confidentiality.
Keywords :
authorisation; computer network security; cryptography; message authentication; quality of service; statistical analysis; telecommunication traffic; PAD; PCE anomaly detector; PCE architecture; QoS-enabled end-to-end connectivity services; SHT; TE solutions; anomaly-based approach; attack patterns; authentication; authorization; bogus requests; encryption; end-to-end path computations; information confidentiality; inter-PCE path computation; intradomain information exposition; intradomain information exposure; malicious PCE; malicious utilization detection; multidomain multiprovider networks; network load conditions; network providers; path computation element; security leak; sequential hypothesis testing; smart confidentiality attacks; statistical classification procedure; statistical detection; traffic engineering; Computer architecture; Network security; Network topology; Quality of service; Statistical analysis; BGP; Multi-domain networks; PCE; control plane security; sequential hypothesis testing; traffic engineering;
fLanguage :
English
Journal_Title :
Network and Service Management, IEEE Transactions on
Publisher :
ieee
ISSN :
1932-4537
Type :
jour
DOI :
10.1109/TNSM.2013.111113.130482
Filename :
6662354
Link To Document :
بازگشت