Secure Overlay Network Design

Due to the increasing security threats in the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application servers are protected by a defense perimeter where only traffic from entities called servelets are allowed to pass. End...

Full description

Saved in:
Bibliographic Details
Published inAlgorithmic Aspects in Information and Management pp. 354 - 366
Main Authors Li, Li (Erran), Mahdian, Mohammad, Mirrokni, Vahab S.
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2006
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3540351574
9783540351573
ISSN0302-9743
1611-3349
DOI10.1007/11775096_33

Cover

Loading…
Abstract Due to the increasing security threats in the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application servers are protected by a defense perimeter where only traffic from entities called servelets are allowed to pass. End users must be authorized and can only communicate with entities called access points (APs). APs relay authorized users’ requests to servelets, which in turn pass them to the servers. The identity of APs are publicly known while the servelets are typically secret. All communications are done through the public Internet. Thus all the entities involved forms an overlay network. The main component of this distributed system consists of n APs. and m servelets. A design for a network is a bipartite graph with APs on one side, and the servelets on the other side. If an AP is compromised by an attacker, all the servelets that are connected to it are subject to attack. An AP is blocked, if all servelets connected to it are subject to attack. We consider two models for the failures: In the average case model, we assume that each AP i fails with a given probability pi. In the worst case model, we assume that there is an adversary that knowing the topology of the network, chooses at most k APs to compromise. In both models, our objective is to design the connections between APs and servelets to minimize the (expected/worst-case) number of blocked APs. In this paper, we give a polynomial-time algorithm for this problem in the average-case model when the number of servelets is a constant. We also show that if the probability of failure of each AP is at least 1/2, then in the optimal design each AP is connected to only one servelet (we call such designs star-shaped), and give a polynomial-time algorithm to find the best star-shaped design. We observe that this statement is not true if the failure probabilities are small. In the worst-case model, we show that the problem is related to a problem in combinatorial set theory, and use this connection to give bounds on the maximum number of APs that a perfectly failure-resistant design with a given number of servelets can support. Our results provide the first rigorous theoretical foundation for practical secure overlay network design.
AbstractList Due to the increasing security threats in the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application servers are protected by a defense perimeter where only traffic from entities called servelets are allowed to pass. End users must be authorized and can only communicate with entities called access points (APs). APs relay authorized users’ requests to servelets, which in turn pass them to the servers. The identity of APs are publicly known while the servelets are typically secret. All communications are done through the public Internet. Thus all the entities involved forms an overlay network. The main component of this distributed system consists of n APs. and m servelets. A design for a network is a bipartite graph with APs on one side, and the servelets on the other side. If an AP is compromised by an attacker, all the servelets that are connected to it are subject to attack. An AP is blocked, if all servelets connected to it are subject to attack. We consider two models for the failures: In the average case model, we assume that each AP i fails with a given probability pi. In the worst case model, we assume that there is an adversary that knowing the topology of the network, chooses at most k APs to compromise. In both models, our objective is to design the connections between APs and servelets to minimize the (expected/worst-case) number of blocked APs. In this paper, we give a polynomial-time algorithm for this problem in the average-case model when the number of servelets is a constant. We also show that if the probability of failure of each AP is at least 1/2, then in the optimal design each AP is connected to only one servelet (we call such designs star-shaped), and give a polynomial-time algorithm to find the best star-shaped design. We observe that this statement is not true if the failure probabilities are small. In the worst-case model, we show that the problem is related to a problem in combinatorial set theory, and use this connection to give bounds on the maximum number of APs that a perfectly failure-resistant design with a given number of servelets can support. Our results provide the first rigorous theoretical foundation for practical secure overlay network design.
Author Li, Li (Erran)
Mirrokni, Vahab S.
Mahdian, Mohammad
Author_xml – sequence: 1
  givenname: Li (Erran)
  surname: Li
  fullname: Li, Li (Erran)
  email: erranlli@dnrc.bell-labs.com
  organization: Bell Laboratories,  
– sequence: 2
  givenname: Mohammad
  surname: Mahdian
  fullname: Mahdian, Mohammad
  email: mahdian@microsoft.com
  organization: Microsoft Research,  
– sequence: 3
  givenname: Vahab S.
  surname: Mirrokni
  fullname: Mirrokni, Vahab S.
  email: mirrokni@theory.csail.mit.edu
  organization: MIT Computer Science and Artificial Intelligence Lab,  
BookMark eNpNj01Lw0AQQEetYFpz8izk6iE6k9nNZI_S-gXFHtRz2E0mpbQkkvUD_72KCp7e4cGDN4VJP_QKcEJ4TohyQSRi0ZU18x6kTiq2BtmSrXAfEiqJcmbjDmD6J8RMIEHGIndi-AjSGDcBkZwTRk7g9EGb11Gz1ZuOO_-R3evL-zBus4XGzbo_hsPO76Kmv5zB0_XV4_w2X65u7uaXyzwSGs7FNSKtdLYh9mVnq1AE69mF0HlbhFaNfjmrru3KojSlONN603LlAwajlmdw9tONz-OmX-tYh2HYxpqw_v6u_33zJ6VyRe0
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2006
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2006
DOI 10.1007/11775096_33
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783540351580
3540351582
EISSN 1611-3349
Editor Cheng, Siu-Wing
Poon, Chung Keung
Editor_xml – sequence: 1
  givenname: Siu-Wing
  surname: Cheng
  fullname: Cheng, Siu-Wing
  email: scheng@cs.ust.hk
– sequence: 2
  givenname: Chung Keung
  surname: Poon
  fullname: Poon, Chung Keung
  email: ckpoon@cs.cityu.edu.hk
EndPage 366
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-s1043-79c77d7f5c13a6f58b2b5a39bbfa52bde4ef5c5e9df62646794da4d38ab0b4e53
ISBN 3540351574
9783540351573
ISSN 0302-9743
IngestDate Tue Jul 29 19:55:50 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1043-79c77d7f5c13a6f58b2b5a39bbfa52bde4ef5c5e9df62646794da4d38ab0b4e53
PageCount 13
ParticipantIDs springer_books_10_1007_11775096_33
PublicationCentury 2000
PublicationDate 2006
PublicationDateYYYYMMDD 2006-01-01
PublicationDate_xml – year: 2006
  text: 2006
PublicationDecade 2000
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle Second International Conference, AAIM 2006, Hong Kong, China, June 20-22, 2006. Proceedings
PublicationTitle Algorithmic Aspects in Information and Management
PublicationYear 2006
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Tygar, Dough
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, CA, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, MA, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Dough
  surname: Tygar
  fullname: Tygar, Dough
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbruecken, Germany
SSID ssib001997303
ssj0000316146
ssj0002792
Score 1.2986578
Snippet Due to the increasing security threats in the Internet, new overlay network architectures have been proposed to secure privileged services. In these...
SourceID springer
SourceType Publisher
StartPage 354
SubjectTerms combinatorics
network design
network security
optimization
Title Secure Overlay Network Design
URI http://link.springer.com/10.1007/11775096_33
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT-MwELWgXBCHBXYR34rQ3qKgNraT-MABoSKEChwWELfKjp0tAhopza60_HpmbCctFCGWS1QlUZv4uePx-L1nQn5qdCBkqNtSjEesl-pIZImOcor4S8m5tdi4uEzObtj5Hb-bUnmtuqRWh_nzu7qSr6AK5wBXVMn-B7Ltl8IJ-Az4whEQhuOb5Pd1mdXRix9_lzCzHyG5_dgKJi211euL6oZmPM9vGThB9D0ml_2qwgpoWw24kCPsMLZMWo7k05PU7aX7qiof7A5Q4a0cSRX-OpztcLZyb8Krv1gh_IdKYuR8QUBrKSLYJmZyNPDLFpdlbdlgYbOzRBNoPqxENJXI8AOjLl9oopBFuR1MGu0WxGWY2bhTxoXiBA0WqTM09eGVOsNpP1JTt1_L3CDgeB-4Go3eNkNKF8limvEOWTrunw9up9miEBDfaFuSg_iWWCsdP5Cjt6JbhHIP56VB9uGdp-TMy3jtJ8oyZ355bn3dpi3Xq2QFpSwBakygedfIghmvk29Ncwe-ub-TPYdd4LELPHaBw-4HuTntX5-cRX7fjGjSQzJFKvI01WnB8x6VScEzFSsuqVCqkDxW2jAD17gRuoDpLIyUgmnJNM2k6ipmON0gnXE5NpskkHnCjIjTXFG4o4DZp8yLTJvYdEWcd9kWOWjeb4j_hMmwscGeaYTtz9y0Q5anfWqXdOrqj9mDfK9W-x63F2CqSis
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Algorithmic+Aspects+in+Information+and+Management&rft.au=Li%2C+Li+%28Erran%29&rft.au=Mahdian%2C+Mohammad&rft.au=Mirrokni%2C+Vahab+S.&rft.atitle=Secure+Overlay+Network+Design&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2006-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783540351573&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=354&rft.epage=366&rft_id=info:doi/10.1007%2F11775096_33
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon