Presented by Nelson Mandela Date 7th February 2017

Slides:



Advertisements
Similar presentations
Fraunhofer FOKUS 2007 VoIP Defender The Future of VoIP Protection Fraunhofer FOKUS Institute, Germany.
Advertisements

I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention Amir Houmansadr (The University of Texas at Austin) Thomas.
SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Tom Behrens Adam Muniz. Overview What is VoIP SIP Sessions H.323 Examples Problems.
Voice over IP Fundamentals
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Censorship Resistance: Parrots Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the.
Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.
Process-to-Process Delivery:
CS 218 F 2003 Nov 3 lecture:  Streaming video/audio  Adaptive encoding (eg, layered encoding)  TCP friendliness References: r J. Padhye, V.Firoiu, D.
CIS679: RTP and RTCP r Review of Last Lecture r Streaming from Web Server r RTP and RTCP.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
HTTP HTTP stands for Hypertext Transfer Protocol. It is an TCP/IP based communication protocol which is used to deliver virtually all files and other.
The Parrot is Dead: Observing Unobservable Network Communications
This document is for informational purposes only, and Tekelec reserves the right to change any aspect of the products, features or functionality described.
Call Control with SIP Brian Elliott, Director of Engineering, NMS.
Multimedia Over IP: RTP, RTCP, RTSP “Computer Science” Department of Informatics Athens University of Economics and Business Λουκάς Ελευθέριος.

H.323 An International Telecommunications Union (ITU) standard. Architecture consisting of several protocols oG.711: Encoding and decoding of speech (other.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Module 10: How Middleboxes Impact Performance
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
VoIP Signaling Protocols A signaling protocol is a common language spoken by telephones and call-management servers, the PSTN, and legacy PBX systems as.
SIP working group IETF#70 Essential corrections Keith Drage.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Cryptography and Network Security
Skype.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
SDN and Security Security as a service in the cloud
Block 5: An application layer protocol: HTTP
On-line Detection of Real Time Multimedia Traffic
How HTTP Works Made by Manish Kushwaha.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
IoT Integration Patterns, REST, and CoAP
CS590B/690B Detecting Network Interference (FALL 2016)
CS590B/690B Detecting Network Interference (Fall 2016)
Quick UDP Internet Connections
5. End-to-end protocols (part 1)
Session Initiation Protocol
Troubleshooting Network Communications
Practical Censorship Evasion Leveraging Content Delivery Networks
CS590B/690B Detecting Network Interference (Fall 2016)
Principles of Network Applications
Practical Censorship Evasion Leveraging Content Delivery Networks
Chapter 14 User Datagram Program (UDP)
Introduction to Networking
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Client-Server Interaction
Net 431: ADVANCED COMPUTER NETWORKS
WEB API.
0x1A Great Papers in Computer Security
Multimedia and Networks
Process-to-Process Delivery:
لایه ی کاربرد مظفر بگ محمدی 2: Application Layer.
Starting TCP Connection – A High Level View
CPEG514 Advanced Computer Networkst
Building A Network: Cost Effective Resource Sharing
CS4470 Computer Networking Protocols
HTTP Hypertext Transfer Protocol
Process-to-Process Delivery: UDP, TCP
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Presentation transcript:

Presented by Nelson Mandela Date 7th February 2017 PARROT IS DEAD OBSERVING UNOBSERVABLE NETWORK COMMUNICATION Authors: Amir Houmansadr Chad Brubaker Vitaly Shmatikov The university of Texas Austin Presented by Nelson Mandela Date 7th February 2017

Motivation Parrot circumventing systems have been motivated by the increasing number of Repressive/nondemocratic government to monitor the internet and strengthening their censorship powers. This in return has motivated a growing community of developer aiming at circumventing the censor systems through unobservability which is what we refer as the parrot circumventing systems. The parrot circumventing systems bypass censorship through imitations of common protocols.eg skype,http

How it works X X parrot circumventing systems Content inspector Allowed address X Blocked address X Internet user censors Circumventing by imitation Skype morph Censor spoofer stegoTorus Skype VoIP traffic HTTP Ventrilo

Adversary Models-capabilities classification Passive attack-involves observing, analyzing and packet inspection of internet entities. Proactive attack-identify entities involved in circumventing by sending probes that will elicit certain responses. Active attack-involve manipulation of network traffic i.e. delaying, dropping and terminating internet connection.

Adversary models-Knowledge Classification Local adversary(LO)-small number of network devices, observe small number networks. State level oblivion Adversary(OB)-limited storage, limited computational resource ,deep packet inspection. State level omniscient adversary(OM)-ample processing, storage and computational resource.

Circumvention systems Skymorph -pluggable transport aim at imitating skype video calls. Client obtain bridge id in advance Bridge enter skype picks a high UDP port Client picks high UDP port StegoTorus-pluggable transport derived from obfsproxy. Adds chopping and steganography Mimick HTTP, Skype, and Ventrilo Censorspoofer-stand alone system Ip spoofing Mimic voip traffic

Requirement for parrot circumventing systems Mimicking the protocol in entirety e.g voip(sip,rtp,rtcp) Correctness-mimic full behavior. Side protocols-protocols that run besides the main session. Intradepend- dependancies & correlation among protocol session Interdepend- Mimicking reaction to errors and network condition i.e. reaction to errors/network conditions Mimicking typical traffic i.e. content, pattern, users, Mimicking implementation specific artifacts i.e. parrot must mimic a specific version of a specific popular implementation to the last bug

Detecting skype imitators Passive attacks Exploiting deviation from genuine skype behavior Exploiting re-use of client generated skype traces. Exploiting re-use of pre-recorded Skype traces Hypothetical SkypeMorph+ and StegoTorus+-experiment to find out if the weakeness could be bridged by upgrading. Active and proactive attacks Verifying supernode behavior Manipulate skype calls Manipulate tcp control channels

DETECTING SKYPE IMITATORS SkypeMorph and StegoTorus-Embed—can be easily distinguished from genuine Skype. Attack Imitation requirement Adversary SkypeMorph StegoTorus-Embed Skype HTTP update traffic (T1) SideProtocols LO/OB/OM Satisfied Failed Skype login traffic (T2) SoM field of Skype UDP packets (T3) Content Traffic statistics (T4, T5) Pattern LO/OM Periodic message exchanges (T6, T7) Typical Skype client behavior (T8) IntraDepend TCP control channel (T9)

ACTIVE AND PROACTIVE ATTACKS TO DETECT IMPROVED SKYPE PARROTS Skypemorph+ and StegoTorus+ Attack Imitation requirement Adversary Skype SkypeMorph+ and StegoTorus+ Verify supernode behavior SideProtocols Proactive, The target node serves as the adversary’s Rejects all by flushing supernode cache IntraDepend LO/OM SN, e.g., relays his Skype calls Skype messages Drop a few UDP packets Network, Err Active, LO/OB/OM A burst of TCP packets on the control channel (Fig. 1) No reaction Close TCP channel IntraDepend, Ends the UDP stream immediately Delay TCP packets SideProtocols, Network Reacts depending on the type of TCP messages Close TCP connection to a SN Client initiates UDP probes to find other SNs Block the default TCP port for TCP channel Connects to TCP ports 80 or 443 instead

DETECTING STEGOTORUS HTTP request Real HTTP server StegoTorus’s HTTP module GET existing Returns “200 OK” and sets Connection to keep-alive Arbitrarily sets Connection to either keep-alive or Close GET long request Returns “404 Not Found” since URI does not exist No response GET non-existing Returns “404 Not Found” Returns “200 OK” GET wrong protocol Most servers produce an error message, e.g., “400 Bad Request” HEAD existing Returns the common HTTP headers OPTIONS common Returns the supported methods in the Allow line DELETE existing Most servers have this method not activated and produce an error message TEST method Returns an error message, e.g., “405 Method Not Allowed” and sets Connection=Close Attack request Returns an error message, e.g., “404 Not Found”

DISTINGUISHING CENSORSPOOFER FROM GENUINE SIP CLIENTS. Attack Imitation requirement Adversary Typical SIP clients (e.g., Ekiga) CensorSpoofer Manipulate tag in SIP OK Soft LO/OB/OM Nothing Client closes the call SIP INVITE to fakeID@suspiciousIP SideProtocols Soft, Err Respond with “100 Trying” and “180 Ringing”, “483 Busy Here”, “603 Decline”, or “404 Not Found” SIP INVALID SideProtocols,Err Respond “400 BadRequest” SIP BYE with invalid SIP-ID Respond “481 Call Leg/Transaction Does Not Exist” Drop RTP packets (only for confirmation) Soft, Network Terminate the call after a time period depending on the client, may change codec in more advanced clients.

RELATED WORK Pluggable Tor transports Decoy routing

RECOMMENDATIONS understanding of the adversaries unobservability by imitation is a fundamentally flawed approach. partial imitation is worse than no imitation at all not mimic, but run the actual protocol