Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Privacy-preserving quantification of cross-domain network reachability

Published: 01 June 2015 Publication History

Abstract

Network reachability is an important characteristic for understanding end-to-end network behavior and helps in detecting violations of security policies across the network. While quantifying network reachability within one administrative domain is a difficult problem in itself, performing the same computation across a network spanning multiple administrative domains presents a novel challenge. The problem of quantifying network reachability across multiple administrative domains is more difficult because the privacy of security policies of individual domains is a serious concern and needs to be protected through this process. In this paper, we propose the first cross-domain privacy-preserving protocol for quantifying network reachability. Our protocol constructs equivalent representations of the Access Control List (ACL) rules and determines network reachability while preserving the privacy of the individual ACLs. This protocol can accurately determine the network reachability along a network path through different administrative domains. We have implemented and evaluated our protocol on both real and synthetic ACLs. The experimental results show that the online processing time of an ACL containing thousands of rules is less than 25 s. Given two ACLs, each containing thousands of rules, the comparison time is less than 6 s, and the total communication cost is less than 2100 kB.

References

[1]
F. Chen, B. Bruhadeshwar, and A. X. Liu, "Privacy-preserving cross-domain network reachability quantification," in Proc. IEEE ICNP, 2011, pp. 155--164.
[2]
D. Oppenheimer, A. Ganapathi, and D. A. Patterson, "Why do Internet services fail, what can be done about it?," in Proc. USITS, 2003, pp. 1--15.
[3]
Z. Kerravala, "As the value of enterprise networks escalates, so does the need for configuration management," Enterprise Computing & Networking, The Yankee Group Report, 2004.
[4]
E. Al-Shaer, W. Marrero, A. El-Atawy, and K. ElBadawi, "Network configuration in a box: Towards end-to-end verification of network reachability and security," in Proc. IEEE ICNP, 2009, pp. 123--132.
[5]
K. Ingols, R. Lippmann, and K. Piwowarski, "Practical attack graph generation for network defense," in Proc. ACSAC, 2006, pp. 121--130.
[6]
A. X. Liu and A. R. Khakpour, "Quantifying and verifying reachability for access controlled networks," IEEE/ACM Trans. Netw., vol. 21, no. 2, pp. 551--565, Apr. 2013.
[7]
P. Matousek, J. Rab, O. Rysavy, and M. Sveda, "A formal model for network-wide security analysis," in Proc. IEEE Int. Conf. Workshop Eng. Comput. Based Syst., 2008, pp. 171--181.
[8]
Y.-W. E. Sung, C. Lund, M. Lyn, S. Rao, and S. Sen, "Modeling and understanding end-to-end class of service policies in operational networks," in Proc. SIGCOMM, 2009, pp. 219--230.
[9]
G. G. Xie et al., "On static reachability analysis of IP networks," in Proc. IEEE INFOCOM, 2005, pp. 2170--2183.
[10]
A. Wool, "A quantitative study of firewall configuration errors," Computer, vol. 37, no. 6, pp. 62--67, Jun. 2004.
[11]
M. G. Gouda and A. X. Liu, "Firewall design: Consistency, completeness and compactness," in Proc. ICDCS, 2004, pp. 320--327.
[12]
M. G. Gouda and A. X. Liu, "Structured firewall design," Comput. Netw. J., vol. 51, no. 4, pp. 1106--1120, 2007.
[13]
E. A. Emerson, "Temporal and modal logic," in Handbook of Theoretical Computer Science. Cambridge, MA, USA: MIT Press, 1990, pp. 995--1072.
[14]
S. Bandhakavi, S. Bhatt, C. Okita, and P. Rao, "Analyzing end-to-end network reachability," in Proc. IFIP/IEEE Int. Symp. Integrated Netw. Manage., 2009, pp. 585--590.
[15]
B. Zhang, T. S. E. Ng, and G. Wang, "Reachability monitoring and verification in enterprise networks," presented at the SIGCOMM, 2008, (poster).
[16]
M. Casado et al., "Sane: A protection architecture for enterprise networks," in Proc. USENIX Security Symp., 2006, pp. 137--151.
[17]
F. Le, S. Lee, T. Wong, H. S. Kim, and D. Newcomb, "Detecting network-wide and router-specific misconfigurations through data mining," IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 66--79, Feb. 2009.
[18]
T. Benson, A. Akella, and D. Maltz, "Unraveling the complexity of network management," in Proc. NSDI, 2009, pp. 335--348.
[19]
J. Cheng, H. Yang, S. H. Wong, and S. Lu, "Design and implementation of cross-domain cooperative firewall," in Proc. IEEE ICNP, 2007, pp. 284--293.
[20]
A. X. Liu and F. Chen, "Collaborative enforcement of firewall policies in virtual private networks," in Proc. PODC, 2008, pp. 95--104.
[21]
A. X. Liu and F. Chen, "Privacy preserving collaborative enforcement of firewall policies in virtual private networks," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 887--895, May 2011.
[22]
F. Chen, B. Bruhadeshwar, and A. X. Liu, "Cross-domain privacy-preserving cooperative firewall optimization," IEEE/ACM Trans. Netw., vol. 21, no. 3, pp. 857--868, Jun. 2013.
[23]
M. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection," in Proc. EUROCRYPT, 2004, pp. 1--19.
[24]
L. Kissner and D. Song, "Privacy-preserving set operations," in Proc. CRYPTO, 2005, pp. 241--257.
[25]
Y. Sang and H. Shen, "Efficient and secure protocols for privacy-preserving set operations," Trans. Inf. Syst. Security, vol. 13, no. 1, pp. 9:1--9:35, 2009.
[26]
O. Goldreich, Foundations of Cryptography: Volume II (Basic Applications). Cambridge, U.K.: Cambridge Univ. Press, 2004.
[27]
R. Chen, I. E. Akkus, and P. Francis, "SplitX: High-performance private analytics," in Proc. SIGCOMM, 2013, pp. 315--326.
[28]
A. X. Liu and M. G. Gouda, "Complete redundancy detection in firewalls," in Proc. DBSec, 2005, pp. 196--209.
[29]
Y.-K. Chang, "Fast binary and multiway prefix searches for packet forwarding," Comput. Netw., vol. 51, no. 3, pp. 588--605, 2007.
[30]
S. C. Pohlig and M. E. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," IEEE Trans. Inf. Theory, vol. IT-24, no. 1, pp. 106--110, Jan. 1978.
[31]
D. K. H. D. R. Safford and D. L. Schales, "Secure RPC authentication (SRA) for TELNET and FTP," Tech. Rep., 1993.
[32]
A. X. Liu and M. G. Gouda, "Diverse firewall design," IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 8, pp. 1237--1251, Aug. 2008.
[33]
R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," in Proc. SIGMOD, 2003, pp. 86--97.
[34]
O. Goldreich, "Secure multi-party computations," ver. 1.4, Working draft, 2002.
[35]
P. Gupta and N. McKeown, "Algorithms for packet classification," IEEE Netw., vol. 15, no. 2, pp. 24--32, Apr. 2001.
[36]
S. Singh, F. Baboescu, G. Varghese, and J. Wang, "Packet classification using multidimensional cutting," in Proc. SIGCOMM, 2003, pp. 213--224.
[37]
R. A. DeMillo, R. J. Lipton, and F. G. Sayward, "Hints on test data selection: Help for the practicing programmer," Comput., vol. 11, no. 4, pp. 34--41, Apr. 1978.

Cited By

View all
  • (2021)NREngine: A Graph-Based Query Engine for Network ReachabilityDatabase Systems for Advanced Applications. DASFAA 2021 International Workshops10.1007/978-3-030-73216-5_7(90-106)Online publication date: 11-Apr-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking  Volume 23, Issue 3
June 2015
337 pages
ISSN:1063-6692
  • Editor:
  • R. Srikant
Issue’s Table of Contents

Publisher

IEEE Press

Publication History

Published: 01 June 2015
Published in TON Volume 23, Issue 3

Author Tags

  1. cross domain
  2. network reachability quantification
  3. privacy preserving

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)NREngine: A Graph-Based Query Engine for Network ReachabilityDatabase Systems for Advanced Applications. DASFAA 2021 International Workshops10.1007/978-3-030-73216-5_7(90-106)Online publication date: 11-Apr-2021

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media