Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying

被引:7
作者
Abdou, AbdelRahman [1 ]
Matrawy, Ashraf [2 ]
van Oorschot, Paul C. [3 ]
机构
[1] Carleton Univ, Ottawa, ON K1S 5B6, Canada
[2] Carleton Univ, Sch Informat Technol, Ottawa, ON K1S 5B6, Canada
[3] Carleton Univ, Sch Comp Sci, Ottawa, ON K1S 5B6, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Middlebox detection; traffic relaying; client puzzles; queueing theory;
D O I
10.1109/LCOMM.2014.2349973
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
When employed by online content providers, access-control policies can be evaded whenever clients masquerade behind a middlebox (MB) that meets the policies. An MB, commonly being the gateway of a virtual private network (VPN), typically contacts the content provider on behalf of the clients it colludes with, and relays the provider's outbound traffic to those clients. We propose a solution to hinder MBs from unauthorized relaying of traffic to a large number of clients. To the best of our knowledge, this is the first work to address this problem. Our solution increases the cost of collusion by leveraging client puzzles in a novel way, and uses network properties to help the content provider detect if its outbound traffic is being further relayed beyond a transport-layer connection. Our evaluation shows that the number of colluding clients follows a hyperbolic decay with the rate of creation of puzzles and the time required to solve a puzzle-both factors are influenced by the content provider, but grows almost linearly with the MB's computational resources.
引用
收藏
页码:42 / 45
页数:4
相关论文
共 18 条
[1]  
BBC News-US Employee, OUTS JOB CHIN
[2]  
Bertino Elisa., 2005, SACMAT 05, P29
[3]   Advances in network simulation [J].
Breslau, L ;
Estrin, D ;
Fall, K ;
Floyd, S ;
Heidemann, J ;
Helmy, A ;
Huang, P ;
McCanne, S ;
Varadhan, K ;
Xu, Y ;
Yu, HB .
COMPUTER, 2000, 33 (05) :59-+
[4]  
Crovella M., 2006, Internet measurement: infrastructure, traffic and applications
[5]  
Detal Gregory, 2013, P 2013 C INT MEAS C, P1, DOI DOI 10.1145/2504730.2504757
[6]  
Dietrich Christian J, 2009, ISSE 2008 SECURING E, P163
[7]  
Doshi S., 2006, APPL CRYPTOGRAPHY NE
[8]  
Gross D., 2009, Fundamentals of Queueing Theory, V4th
[9]  
JIN C., 2003, CCS '03, P30
[10]  
Juels A., 1999, Proceedings 1999 Network and Distributed System Security Symposium, P151