On detecting service violations and bandwidth theft in QoS network domains

  • Authors:
  • Ahsan Habib;Sonia Fahmy;Srinivas R. Avasarala;Venkatesh Prabhakar;Bharat Bhargava

  • Affiliations:
  • CERIAS and Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398, USA;CERIAS and Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398, USA;CERIAS and Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398, USA;CERIAS and Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398, USA;CERIAS and Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398, USA

  • Venue:
  • Computer Communications
  • Year:
  • 2003

Quantified Score

Hi-index 0.24

Visualization

Abstract

We design and evaluate a simple and scalable system to verify quality of service (QoS) in a differentiated services domain. The system uses a distributed edge-to-edge monitoring approach with measurement agents collecting information about delays, losses and throughput, and reporting to a service level agreement monitor (SLAM). The SLAM detects potential service violations, bandwidth theft, denial of service attacks, and flags the need to re-dimension the network domain or limit its users. Measurements may be performed entirely edge-to-edge, or the core routers may participate in logging packet drop information. We compare the core-assisted and edge-to-edge schemes, and we extend network tomography-based loss inference mechanisms to cope with different drop precedences in a QoS network. We also develop a load-based service monitoring scheme which probes the appropriate edge routers for loss and throughput on demand. Simulation results indicate that the system detects attacks with reasonable accuracy, and is useful for damage control in both QoS-enabled and best effort network domains.