NavTalks
From Navigators
(Difference between revisions)
Line 56: | Line 56: | ||
<table border="0.5" cellspacing="0" style="background:#89B085"> | <table border="0.5" cellspacing="0" style="background:#89B085"> | ||
<tr> | <tr> | ||
- | <td style="width:100px">13 | + | <td style="width:100px">13 November</td> |
<td style="width:300px">Salvatore Signorello</td> | <td style="width:300px">Salvatore Signorello</td> | ||
<td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."> | <td style="width:600px"><span style="border-bottom: dashed 1px #000" title="Today's Internet dominant usage trends motivate research on more content-oriented future network architectures. Among the future Internet proposals, the Information-Centric Networking (ICN) research paradigm aims to redesign the Internet's core protocols focusing on contents rather than on hosts. Among the ICN architectures, the Named-Data Networking (NDN) forwards and records users' content requests by their names in routers along the path from one consumer to 1-or-many content sources. The Pending Interest Table (PIT) is the NDN's router component which temporarily records forwarded requests. On one hand, the state in the PIT enables properties like requests aggregation, multicast responses delivery and native hop-by-hop control flow. On the other hand, the PIT stateful forwarding behavior can be easily abused by malicious users to mount disruptive distributed denial of service attacks (DDoS), named Interest Flooding Attacks (IFAs). In IFAs, loosely coordinated botnets flood the network with a large amount of hard-to-satisfy requests with the aim to overload both the network infrastructure and the content producers. In this talk I will summarize the state of the art on the design of countermeasures against the IFA, an NDN-specific security threat to which I devoted much of my PhD research. First, I will introduce existing defense mechanisms and main flaws in the mainstream approach to the defense against this attack. Secondly, I will present some other techniques I propose to counteract certain IFAs, whose design has not been completed yet. Finally, I will share a few more research directions that can be pursued to design more robust forwarding planes for a certain class of ICNs."> | ||
Line 63: | Line 63: | ||
</tr> | </tr> | ||
<tr> | <tr> | ||
- | <td>13 | + | <td>13 November</td> |
<td>Tiago Oliveira</td> | <td>Tiago Oliveira</td> | ||
<td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. | <td><span style="border-bottom: dashed 1px #000" title="Data is the new gold, and storing it brings new challenges. Nowadays, more and more companies are moving their data centres to the cloud, especially because it is cost-effective, easily scalable and remove a lot of management efforts. However, at the same time, current cloud storage solutions have some limitations: (1) they are not totally reliable - we have seen major reports of outages; (2) they not fit to every customer’s needs - businesses have a huge data diversity which probably require different levels of security, availability and costs; and (3) they are not fully private - most of the cloud storage solution have access to the users files. |
Revision as of 11:38, 13 November 2018
The Navtalks is a series of informal talks given by Navigators members or some special guests about every two-weeks at Ciências, ULisboa.
Leave mouse over title's presentation to read the abstract.
Contents |
September 2018
20 September | Alysson Bessani | SMaRtChain: A Principled Design for a New Generation of Blockchains | |
20 September | Rui Miguel | Named Data Networking with Programmable Switches |
October 2018
4 October | Bruno Vavala (Research Scientist in Intel Labs) | Private Data Objects | |
4 October | Marcus Völp (Research Scientist, CritiX, SnT, Univ. of Luxembourg) | Reflective Consensus | |
18 October | Yair Amir (Professor, Johns Hopkins University) | Timely, Reliable, and Cost-Effective Internet Transport Service using Structured Overlay Networks |
November 2018
13 November | Salvatore Signorello | The Past, the Present and some Future of Interest Flooding Attacks in Named-Data Networking | |
13 November | Tiago Oliveira | Vawlt - Privacy-Centered Cloud Storage |
November 2018
27/11 | Nuno Neves | ||
27/11 | Ricardo Mendes |
December 2018
11/12 | António Casimiro | |||
11/12 | Carlos Nascimento |
January 2019
15/01 | Fernando Alves | ||
15/01 | Ibéria Medeiros | ||
29/01 | Fernando Ramos | ||
29/01 | Miguel Garcia |
February 2019
19/02 | Ana Fidalgo | ||
19/02 | João Sousa |
March 2019
12/03 | Pedro Gaspar | ||
12/03 | Ricardo Morgado | ||
26/03 | André Oliveira | ||
26/03 | Nuno Dionísio |
April 2019
09/04 | Adriano Serckumecka | ||
09/04 | Tulio Ribeiro | ||
30/04 | Miguel Moreira | ||
30/04 | Pedro Ferreira |
May 2019
14/05 | Diogo Gonçalves | ||
14/05 | Vinicius Cogo | ||
28/05 | Francisco Araújo | ||
28/05 | Miguel Matos |
June 2019
11/06 | Eric Vial | ||
11/06 | Robin Vassantlal | ||
25/06 | João Pinto | ||
25/06 | Tiago Correia |