• Tidak ada hasil yang ditemukan

Impact of Pending Interest Table Size and Policies on Network Performance in Named Data Networking

N/A
N/A
Protected

Academic year: 2023

Membagikan "Impact of Pending Interest Table Size and Policies on Network Performance in Named Data Networking"

Copied!
156
0
0

Teks penuh

Among all the proposals, Named Data Networking (NDN) is one of the most popular and promising because of its simple design and broad support from the NDN community. The aim of the thesis is therefore to examine the impact of PIT on network performance from three aspects: QoS, security and congestion control.

Motivation for the Thesis

It degrades the quality customers' QoS (pays an additional cost for better service). In both of the above circumstances (in the presence of explosive traffic or attackers), the network can become overloaded, causing the PIT to fill up.

Figure 1.1: (a) bottleneck topology (b) ndn-grid topology
Figure 1.1: (a) bottleneck topology (b) ndn-grid topology

Contributions

Attackers can also aim to degrade the QoS of legitimate consumers by exploiting PIT from the routers en route to the manufacturers. Therefore, in our second contribution, we propose a smart, collaborative attack model that uses the PIT of the routers on their way to the manufacturers.

Organization

Attackers aim to degrade the QoS of targeted legitimate consumers. Next, we give an inside look at the Pending Interest Table (PIT) and review some of the work related to PIT.

A brief introduction to NDN

If this field is provided, the Name element in the Interest is a prefix, exact or full name of the requested Data packet. The delay value is taken from the "Interest Lifetime field" of the Interest packet.

Figure 2.1: (a) TCP/IP stack and (b) NDN Stack
Figure 2.1: (a) TCP/IP stack and (b) NDN Stack

Inside view of PIT

If there is a match, it sends the data packet to all incoming faces listed in the PIT entry. After that, data packets are cached in CS, subject to a predetermined caching policy, and the PIT entry is removed.

Figure 2.5: Inside view of a PIT
Figure 2.5: Inside view of a PIT

PIT related works

Another data structure named Pending Hash Table is maintained to store all nonce fields of the packets of interest stored in the PIT. The main disadvantage of the hash table implementations is an unbalanced load among its buckets.

Definition of some terms related to NDN

Section: 2.4 Definition of Certain Terms Related to NDN. iv) Third Party Placement: Unlike above mentioned, in this placement, on arrival of interest, PIT entry is not generated as per incoming or outgoing interface. The rest of this chapter is organized as follows: Section 3.1 covers the motivation behind our proposed work, Section 3.2 presents related works, Section 3.3 presents the network model.

Motivation

We present analytical models of both the proposed schemes using a two-dimensional Continuous Time Markov Chain (CTMC). In that case, packet dropout occurs, resulting in a reduction in the consumer's ISR and degrading the consumer's QoS.

Related Works

4] propose an RTT estimation approach where each node measures RTT for each producer after each time interval (Tmsr). If it is 1, it matches the node ID in the data packet with its ID.

Network Model

When a node receives an interest, it checks whether the RTT measurement stored in the FIB is fresh or not. We add a field called "priority" to the interest package to simplify the marking process.

Figure 3.1: System model of EQPR
Figure 3.1: System model of EQPR

Proposed Schemes

The reason for this is that the forwarding of data packets depends on the information stored in the PIT. If yes, then it sends a data packet including the estimated RTT for that prefix. Otherwise, it is a normal interest delay RT T measuringDF. A data packet with this field (set to 1) is used for RTT.

If it is not NULL, it means that we can use the RTT calculation from other intermediate users (refer to line number 19 of Algorithm 5).

Table 3.1: New tag fields added in Interest and Data packet
Table 3.1: New tag fields added in Interest and Data packet

Analytical modeling of PRWR and PRR scheme

The probability of prioritized and non-prioritized interests for which data packets arrive is calculated as below. This is the probability that an incoming non-prioritized interest arrives and finds the PIT full and is discarded. This is the probability of removing non-prioritized PIT entries due to the arrival of a new prioritized Interest and PIT is full.

The system states are denoted by (i, j), where i and j represent the number of priority and non-priority PIT inputs, respectively.

Table 3.3: Notations and their meaning
Table 3.3: Notations and their meaning

Performance Evaluation

Data packets received by all consumers correspond to non-priority interest packets sent and N P I is the total number of non-priority interest packets sent by all consumers. There are no reservations in the PRWR scheme, resulting in multiple non-priority entries being replaced. A comparison of non-priority interest blocking probability (Pblock,np) for PRWR and PPR scheme with respect to interest arrival rate in bottleneck, ndn network and rocket fuel topology is shown in Figures and 3.23.

The value of the allowable probability of forced interruption without priority is statically set to 0.01 in the simulation.

Summary

However, in a real scenario, attackers can exploit the presence of a PIT and make the PIT full. In the next section, we propose one attack model designed to degrade the QoS of legitimate consumers. In such a scenario, existing countermeasures can identify the source of the attack or mitigate the impact of the attack.

We implemented our proposed attack model called SCAN in the ndnSIM simulator [7] and the results confirm the effectiveness of the attack.

Figure 3.19: Non-Prioritized Interest Blocking probabilities for bottleneck topology considering (a) 30 % prioritized Interests (b) 40 % prioritized Interests
Figure 3.19: Non-Prioritized Interest Blocking probabilities for bottleneck topology considering (a) 30 % prioritized Interests (b) 40 % prioritized Interests

Motivation

Furthermore, due to the high-interest sending rate of the attacker, a router may experience high packet loss, making it easier to detect the potential attack. To the best of our knowledge, no one has discovered that an attacker's attacking characteristics can change over time. In light of this, we propose a new attacker model in which the attacker dynamically adjusts the interest transmission rate to succeed in the attack while remaining undetected.

The rest of this chapter is organized as follows: Section 4.1 describes the motivation behind our proposed attack model.

Related works

Routers announce this limit to downstream neighbors so that they can limit malicious interest from the attacker. Because of this, malicious content consumes a large portion of caches of intermediate routers. 29] present a detection and mitigation framework for a hidden interest flooding attack where malicious consumers derive interests that can only be served by the malicious producer.

Satisfaction based on the ISR interface chokes the traffic of malicious this approach fails in the case of a collaborative attack.

System Model and assumptions

Satisfaction per interface ISR forward Interests based on ISR Consumer ISR decreases because each router is independent. Poseidon [28] Per Interface ISR and PIT Usage Limit PIT size and Legitimate consumer sharing same interface, alarm is sent downstream with Malicious consumer affected. As we can see in Table 4.1, most attack detection schemes are based on two parameters: ISR and PIT usage.

So if we use "PIT usage" as an indicator for an attack, it would not be appropriate.

Figure 4.1: Different entities of SCAN attack
Figure 4.1: Different entities of SCAN attack

Description of SCAN Attack

Pre-attack phase: In this phase, the attacker calculates the total number of unique contents to be stored in the malicious producer (Nmp). So, at this stage, the attacker tries to estimate the number of contents to be stored in the MP. After a certain time interval (say 10 seconds), the attacker increases the frequency to twice the previous value.

In addition, the attacker changes the name prefix periodically to raise the attack detection bar.

Figure 4.3: Different phases of SCAN attack
Figure 4.3: Different phases of SCAN attack

Performance Analysis

Average Interest Satisfaction Ratio (ISR) of legitimate consumers: It is the ratio of the total number of data packets received to the total number of interest packets sent. In the attack phase, we use the data/information gathered during the pre-attack phase. To validate the effectiveness of the attack, we calculate performance metrics (discussed in 4.5.2) for both the baseline (no attack) and attack scenarios.

This occurs due to the dynamic setting of the Interest Arrival Rate for malicious consumers.

Figure 4.6: AT & T topology: Legitimate Consumer (Cx), Adversary or Malicious Consumer (Ax), Monitoring node (Mx), Router (Rx), Legitimate Producer(LPx) and Malicious Producer (MPx)
Figure 4.6: AT & T topology: Legitimate Consumer (Cx), Adversary or Malicious Consumer (Ax), Monitoring node (Mx), Router (Rx), Legitimate Producer(LPx) and Malicious Producer (MPx)

Summary

We propose a congestion control scheme named LPECN that uses PIT per outgoing face location to limit interests based on available bandwidth. Moreover, we have observed that none of the existing congestion control schemes took into account the presence of non-responsive consumers. We use the CUBIC [32] congestion control scheme at consumers for scalability and stability in long-haul and fast-haul networks.

After describing related work in Section 5.2, we explain the rationale behind considering PIT per outbound face placement in Section 5.3.

Motivation

We are introducing PIT on the outbound face setup to regulate interest based on the capacity of the outbound link. The rest of this chapter is organized as follows: Section 5.1 presents the motivation behind our work. As a result, the sending rate of the consumer's interest decreases, resulting in a sharp decrease in throughput.

This chapter addresses this problem and exploits PIT to lay out the outgoing plane and the architectural features of NDN: the stateful forwarding plane and symmetric forwarding.

Related Works

The authors calculate the available capacity of each NDN router and use Interest shaping to dynamically update their data rate and transmission buffer occupancy. When the expected data buffer occupancy is greater than a certain threshold, the data packets are marked. After receiving a marked data packet, the consumer adjusts the size of the window of interest using the AIMD approach.

To our knowledge, most of the existing work except [39, 40] have not considered the existence of PIT.

Rationale behind considering PIT per outgoing face placement

On the other hand, due to PIT per outgoing face placement, C2's Interests may pre-. Another benefit of considering PIT per outbound face placement is that it also helps estimate PIT size compared to a single PIT. Since we consider PIT per outbound placement, one PIT is placed at each outbound interface of the router.

M ap A map list of output face IDs and their corresponding PIT table pointers.

Figure 5.1: Single PIT
Figure 5.1: Single PIT

Proposed Scheme: LPECN

If the value of the flag is 1 for predefined congestion mark interval (default: 100msec), then the outgoing data packet is marked. If so, it further extracts the name prefix from the Data packet using getNamePrefix() function. Then CE router extracts ISR value from isrPrefix's field of the Data packet using getISR() function.

In addition, a list named N is maintained on responsive list to keep track of the interest name prefix and its corresponding incoming interface IDs.

Figure 5.4: Congestion detection and signalling in NDN
Figure 5.4: Congestion detection and signalling in NDN

Performance Analysis

The average Goodput, Response Time and ISR of consumer C2 in the PCON and LPECN scheme is shown in figure 5.9. Due to congestion in the PCON scheme, the response time increases due to increased queuing delay. The average Goodput, Response time and ISR of consumer C1 for both schemes are shown in figure 5.10.

The total turnover of all consumers for PCON and LPECN scheme is shown in Figure 5.11.

Table 5.3: Simulation Parameters
Table 5.3: Simulation Parameters

Summary

Therefore, due to this limitation, LPECN has a lower value in goodput and ISR compared to PCON. On the other hand, PCON applies no limit to C1, which increases the number of packets in the outgoing queue and increases the queuing delay. As we can see in the figure, LPECN has a significantly larger turnover than the PCON.

Conclusion

We also show that the design features of NDNs: state mediation plane and symmetric mediation help to detect and limit the interests of non-responsive consumers.

Future Directions

On pending interest table in named data networks”.in:2012 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS). Information Centric Networks (ICN): Content Centric Networks (CCNx) and Named Data Networks (NDN) Terminology.” in:RFC pages1–17. ICP: Design and Evaluation of a Stake Control Protocol for Content-Centric Networks".in:2012 Proceedings IEEE INFOCOM Workshops.

MIRCC: Multipath-aware ICN rate-based congestion control".i: Proceedings of the 3rd ACM Conference on Information-Cenric Networking.

CBF, 18, 19

EWMA, 30 FIA, 1

ICN, 1

RED, 94 RTO, 91

SBP, 69 SLA, 26, 119

Gambar

Figure 1.1: (a) bottleneck topology (b) ndn-grid topology
Figure 2.1: (a) TCP/IP stack and (b) NDN Stack
Table 3.3: Notations and their meaning
Figure 3.5: Transition rate diagram for PRR scheme
+7

Referensi

Dokumen terkait

CONCLUSION Based on the research on the attractiveness of MADIPA Digital Science Magazine based on contextual learning on the theme my river is polluted that has been carried out, it