On the security of bottleneck bandwidth estimation techniques

Ghassan Karame, David Gubler, Srdjan Capkun

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Several wide-area services are increasingly relying on bottleneck bandwidth estimation tools to enhance their network performance. Selfish hosts have, therefore, considerable incentives to fake their band-widths in order to increase their benefit in the network. In this paper, we address this problem and we investigate the vulnerabilities of current bottleneck bandwidth estimation techniques in adversarial settings. We show that finding "full-fledged" solutions for the multitude of attacks on the end-to-end bandwidth estimation process might not be feasible in the absence of trusted network components; we discuss solutions that make use of such trusted components. Nevertheless, we discuss other possible solutions that alleviate these threats without requiring trusted infrastructure support and we evaluate the effectiveness of our proposals on PlanetLab nodes.

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers
Pages121-141
Number of pages21
Volume19 LNICST
DOIs
Publication statusPublished - 2009
Event5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009 - Athens, Greece
Duration: 14 Sep 200918 Sep 2009

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume19 LNICST
ISSN (Print)1867-8211

Other

Other5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009
CountryGreece
CityAthens
Period14/09/0918/09/09

Keywords

  • Bandwidth estimation
  • Bandwidth shapers
  • Security

Fingerprint Dive into the research topics of 'On the security of bottleneck bandwidth estimation techniques'. Together they form a unique fingerprint.

  • Cite this

    Karame, G., Gubler, D., & Capkun, S. (2009). On the security of bottleneck bandwidth estimation techniques. In Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers (Vol. 19 LNICST, pp. 121-141). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Vol. 19 LNICST). https://doi.org/10.1007/978-3-642-05284-2_8