TY - GEN
T1 - On the security of bottleneck bandwidth estimation techniques
AU - Karame, Ghassan
AU - Gubler, David
AU - Capkun, Srdjan
PY - 2009
Y1 - 2009
N2 - Several wide-area services are increasingly relying on bottleneck bandwidth estimation tools to enhance their network performance. Selfish hosts have, therefore, considerable incentives to fake their band-widths in order to increase their benefit in the network. In this paper, we address this problem and we investigate the vulnerabilities of current bottleneck bandwidth estimation techniques in adversarial settings. We show that finding "full-fledged" solutions for the multitude of attacks on the end-to-end bandwidth estimation process might not be feasible in the absence of trusted network components; we discuss solutions that make use of such trusted components. Nevertheless, we discuss other possible solutions that alleviate these threats without requiring trusted infrastructure support and we evaluate the effectiveness of our proposals on PlanetLab nodes.
AB - Several wide-area services are increasingly relying on bottleneck bandwidth estimation tools to enhance their network performance. Selfish hosts have, therefore, considerable incentives to fake their band-widths in order to increase their benefit in the network. In this paper, we address this problem and we investigate the vulnerabilities of current bottleneck bandwidth estimation techniques in adversarial settings. We show that finding "full-fledged" solutions for the multitude of attacks on the end-to-end bandwidth estimation process might not be feasible in the absence of trusted network components; we discuss solutions that make use of such trusted components. Nevertheless, we discuss other possible solutions that alleviate these threats without requiring trusted infrastructure support and we evaluate the effectiveness of our proposals on PlanetLab nodes.
KW - Bandwidth estimation
KW - Bandwidth shapers
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84885888174&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-05284-2_8
DO - 10.1007/978-3-642-05284-2_8
M3 - Conference contribution
AN - SCOPUS:84885888174
SN - 3642052835
SN - 9783642052835
VL - 19 LNICST
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
SP - 121
EP - 141
BT - Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers
T2 - 5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009
Y2 - 14 September 2009 through 18 September 2009
ER -