Networks Research Group Prof. Mark Handley Department of Computer Science.

18
Networks Research Group Prof. Mark Handley Department of Computer Science

Transcript of Networks Research Group Prof. Mark Handley Department of Computer Science.

Page 1: Networks Research Group Prof. Mark Handley Department of Computer Science.

Networks Research Group

Prof. Mark Handley

Department of Computer Science

Page 2: Networks Research Group Prof. Mark Handley Department of Computer Science.

Nets Faculty: Interests & Accomplishments

PhDs from Cambridge, Harvard, MIT, Queen Mary, UCL

Internet standards activity(30+ standards including SIP)

Brought the first Internet link to Europe

Research contributions in: congestion control, distributed systems, mobility, multimedia, routing, scheduling, security, wireless networks.

Page 3: Networks Research Group Prof. Mark Handley Department of Computer Science.

Wedge: Making Networked Applications more Resilient to

Attack

Andrea Bittau, Petr MarchenkoMark Handley, and Brad Karp

Page 4: Networks Research Group Prof. Mark Handley Department of Computer Science.

Software vulnerability reports per year

As one-off defenses are released, new vulnerability categories emerge

Source: Open source vulnerability database (osvdb.org)

Page 5: Networks Research Group Prof. Mark Handley Department of Computer Science.

Two systems security principles

Compartmentalization:Divide system intosubsystems that failindependently

Least privilege:Each subsystem should only have access to read/modify data needed for its job

Page 6: Networks Research Group Prof. Mark Handley Department of Computer Science.

Problem: Lack of compartmentalization

Monolithic process must invoke SSL, so must hold RSA private key in memory

Single, monolithic address space: any code can access all memory

Apache web server

Internet

requestparse

r

HACKED!private key

Page 7: Networks Research Group Prof. Mark Handley Department of Computer Science.

Wedge: Compartments improve security

Crowbar, a run-time instrumentation tool: Measures memory access behavior of code running

on real, non-malicious workloads Informs programmer of memory permissions code

requires on these workloads OS primitives for Linux:

Fine-grained tagging of memory Explicit assignment of per-tag permissions to

threads

requestparsergen_session_key

(~200 LoC)

memory protection

memory protection

InternetHACKE

D!private key

Page 8: Networks Research Group Prof. Mark Handley Department of Computer Science.

Cone of Silence: Nulling Interference for Higher-

Throughput Wireless Networks

Yiorgos Nikolaidis, Astrit Zhushi, Kyle Jamieson, and Brad Karp

Page 9: Networks Research Group Prof. Mark Handley Department of Computer Science.

The 802.11 (WiFi) “success disaster”

Page 10: Networks Research Group Prof. Mark Handley Department of Computer Science.

Limits of omnidirectional antennas

Interference from other senders is typically the limiting factor

Receiver can only decode Sender’s packet when Sender is sufficiently stronger than Interferer

Interferer

Receiver

Sender

Page 11: Networks Research Group Prof. Mark Handley Department of Computer Science.

The promise of directional antennas

InterfererReceiver

Sender

OK!

Page 12: Networks Research Group Prof. Mark Handley Department of Computer Science.

Our approach: Cone of Silence (CoS)

Phased arrays: Long used in radar systems; newly available for 802.11

Receiver shapes beam to maximize SIR Receiver balances between nulling toward

interferer, directing gaintoward sender

Explicitly measure S andI to account formulti-path propagation

Page 13: Networks Research Group Prof. Mark Handley Department of Computer Science.

Multipath TCP: Utilizing the natural resilience of the

Internet

Mark Handley, Damon Wischik, Costin Raiciu, Christoper Plunkte

Page 14: Networks Research Group Prof. Mark Handley Department of Computer Science.

Multipath traffic control, or, why peer-to-peer will balance the Internet

Why does my phone have to choose between connections?

What if it could use several connections at the same time?

Page 15: Networks Research Group Prof. Mark Handley Department of Computer Science.

Mb/s on wifi alone

Mb/s on 3G alone

Mb/s with multipath

At my desk. Good wifi reception,

poor 3G.

Go downstairs to make coffee. Wifi fails. 3G is good.

In the kitchen. Wifi is OK, 3G

is good.

We’ve implemented multipath extensions for TCP.

Page 16: Networks Research Group Prof. Mark Handley Department of Computer Science.

But is it safe?

If everyone greedily takes all the bandwidth they want, the Internet will collapse, like it did in 1988.

If everyone is restrained in the total bandwidth they use, but everyone greedily shifts all his/her traffic onto the best path, the Internet will “flap”.

Need to guarantee it is safe to deploy.

Page 17: Networks Research Group Prof. Mark Handley Department of Computer Science.

Not only is it safe, it’s the natural evolution of the Internet.

Before the Internet, networks used to split links into “circuits”, e.g. one circuit per telephone call.

One of the big ideas of the Internet was to use packets, not circuits, to carry data. This lets users take more bandwidth on a link as they need it — but relies on them to share fairly.

Our algorithm extends the idea of “fair sharing as needed” from links to networks.

Page 18: Networks Research Group Prof. Mark Handley Department of Computer Science.

Build your own Internet

Trend: Opening the network up to innovation Software routers, software-defined radios,

peer-to-peer networks Result: New ways of communicating