Notes
Slide Show
Outline
1
Model of Trust – Why?
2
Scenario #1
3
Network Administration – Co-operative Intrusion Detection
4
Network Health Monitoring
5
Solution
6
Scenario #2
7
Large Network (NAS for example)
8
Routing – A Critical Service for Networks
9
Routing
  • Correct message
    • B®E: I have a path to G as <B, A, G>
  • Malicious message
    • D masquerades as B to E and says
      • B®E: I have a better path to G as <C, F, G>
    • If  D is believed E will never be able to send messages to G.
    • Proposed solution – Have routing information digitally signed by B’s private key
10
Problem with PKI Certificates
11
Problem with PKI Certificates
12
Problem with PKI Certificates
13
Problem with PKI Certificates
14
Other Problems with PKI
  • PKI requires complete trust in one root authority.
    • No globally defined single trusted root.
      • Practically impossible to setup one (at least in the foreseeable future)
        • Why should I trust X completely?
  • Problem of certificate revocation
  • It may not always be possible to validate a certificate chain all the way to the root (assuming one) because of network reachability issues
15
Therefore 100% trust cannot be established via any practical means
  • Easier to establish different degrees of trust
16
Trustworthy Systems Properties
17
Solution
  • A new model of trust that provides different degrees of trust and defines ways to compute trust values, compare trust values and compose trust values