Collaborative Network Outage Troubleshooting with Secure Multiparty Computation

被引:5
|
作者
Djatmiko, Mentari [1 ]
Schatzmann, Dominik [2 ]
Dimitropoulos, Xenofontas [2 ]
Friedman, Arik
Boreli, Roksana [1 ]
机构
[1] Univ New S Wales, Sydney, NSW 2052, Australia
[2] Swiss Fed Inst Technol, Zurich, Switzerland
基金
澳大利亚研究理事会;
关键词
D O I
10.1109/MCOM.2013.6658656
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Troubleshooting network outages is a complex and time-consuming process. Network administrators are typically overwhelmed with large volumes of monitoring data, like SMTP and NetFlow measurements, from which it is very hard to separate between actionable and non-actionable events. In addition, they can only debug network problems using very basic tools, like ping and traceroute. In this context, intelligent correlation of measurements from different Internet locations is essential for analyzing the root cause of outages. However, correlating measurements across domains raises privacy concerns and hence is largely avoided. A possible solution to the privacy barrier is secure multi-party computation (MPC), that is, a set of cryptographic methods that enable a number of parties to aggregate private data without revealing sensitive information. In this article, we propose a distributed mechanism based on MPC for privacy-preserving correlation of NetFlow measurements from multiple ISPs, which helps in the diagnosis of network outages. We first outline an MPC protocol that can be used to analyze the scope (local, global, or semi-global) and severity of network outages across multiple ISPs. Then we use NetFlow data from a medium-sized ISP to evaluate the performance of our protocol. Our findings indicate that correlating data from several dozens of ISPs is feasible in near real time, with a delay of just a few seconds. This demonstrates the scalability and potential for real-world deployment of MPC-based schemes. Finally, as a case study we demonstrate how our scheme helped analyze, from multiple domains, the impact that Hurricane Sandy had on Internet connectivity in terms of scope and severity.
引用
收藏
页码:78 / 84
页数:7
相关论文
共 50 条
  • [1] Using Secure Multiparty Computation for Collaborative Information Exchange
    Titze, Dennis
    Hofinger, Hans
    Schoo, Peter
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1717 - 1722
  • [2] Secure Multiparty Computation
    Lindell, Yehuda
    [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [3] Efficient Secure Multiparty Computation Protocol in Asynchronous Network
    Huang, Zheng
    Qiu, Weidong
    Li, Qiang
    Chen, Kefei
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 152 - 158
  • [4] Elementary secure-multiparty computation for massive-scale collaborative network monitoring: A quantitative assessment
    Iacovazzi, A.
    D'Alconzo, A.
    Ricciato, F.
    Burkhart, M.
    [J]. COMPUTER NETWORKS, 2013, 57 (17) : 3728 - 3742
  • [5] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    [J]. International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [6] Secure multiparty computation of DNF
    Peng, Kun
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [7] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    [J]. ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [8] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [9] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [10] Better Preprocessing for Secure Multiparty Computation
    Baum, Carsten
    Damgard, Ivan
    Toft, Tomas
    Zakarias, Rasmus
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 327 - 345