CS590B/690B Detecting Network Interference (Fall 2016)

Slides:



Advertisements
Similar presentations
Tor: The Second-Generation Onion Router
Advertisements

 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
ToR. Tor: anonymity online Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
A Usability Evaluation of the Tor Anonymity Network By Gregory Norcie.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 08 PHILLIPA GILL – STONY BROOK UNIVERSITY.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U.
The Silk Road: An Online Marketplace
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Computer Security By Duncan Hall.
Measuring and Mitigating AS-level Adversaries Against Tor
Strengthening Tor against Eavesdropping Correlation Attacks Robert Thomas CSCE APR 2015 Audio:
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Online Anonymity & Privacy Andrew Lewman The Tor Project
The Tor Project Anonymity Online Erinn Clark
Online Anonymity The Tor Project
1 Paul Syverson U.S. Naval Research Laboratory Anonymous Internet Communication.
The Tor Project Anonymity Online Erinn Clark TU-Berlin Techtalks January 2011.
1 Tor: Anonymous Communications for the EFF... and you. Roger Dingledine The Tor Project
Andrew Lewman The Tor Project
CS590B/690B Detecting Network Interference
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (FALL 2016)
CS590B/690B Detecting network interference (Fall 2016)
The Tor Project
CS590B/690B Detecting Network Interference (Fall 2016)
Online Anonymity Roger Dingledine, Andrew Lewman The Tor Project
Andrew Lewman
CS590/690 Detecting network interference Fall 2016
Tor Internals and Hidden Services
Practical Censorship Evasion Leveraging Content Delivery Networks
CS590B/690B Detecting Network Interference (Fall 2016)
Anonymous Communication
Andrew Lewman The Tor Project
Karen Reilly Andrew Lewman
Roger Dingledine Jacob Appelbaum
Exercise ?: TOR.
CS590B/690B Detecting Network Interference Spring 2018
Privacy Through Anonymous Connection and Browsing
COS 561: Advanced Computer Networks
0x1A Great Papers in Computer Security
Anonymous Communication
Alex Guy packets (stars) tor routers users web servers (squares)
IP-Spoofing and Source Routing Connections
Firewalls Jiang Long Spring 2002.
CS590B/690B Detecting network interference (Spring 2018)
Anonymity (Privacy) Suppose you are surfing the Web.
COS 561: Advanced Computer Networks
BGP Security Jennifer Rexford Fall 2018 (TTh 1:30-2:50 in Friend 006)
BGP Instability Jennifer Rexford
Anonymous Communication
Anonymous Communication
Presentation transcript:

CS590B/690B Detecting Network Interference (Fall 2016) Lecture 13 Phillipa Gill – Umass Amherst

Last time Fingerprinting filtering products Questions?

Review questions What is the meaning of “dual use technology” (in the context of filtering products)? How can we learn about what products to suspect in a given network? How can we validate that a given product is installed on a specific IP address? How can we verify that a specific product is being used for censorship? What factors make this challenging? Filtering products can be used in enterprise/academic networks vs. for national censorship User reports, logos on block pages What web Create bogus domains/submit them to the product’s Web site Need to know what categories of content the ISP is blocking. Need to create sites matching that content for submission

Today Onion routing Tor (an implementation of onion routing) Slides by Roger Dingledine (via Jonathan Katz) http://www.cs.umd.edu/~jkatz/security/f09/lectures/syverson.p df https://crysp.uwaterloo.ca/courses/cs458/W14- lectures/Module5.pdf

What is anonymity Informally: You can’t tell who did what Who wrote this blog post? Who’s been viewing my Web pages? Who’s been emailing patent attorneys? Formally: Indistinguishability within an “anonymity set”

Anonymity Can’t distinguish? Anonymity set size? Probability distribution within anonymity set?

Assumptions… We have to make some assumptions about what the attacker can do

Anonymity != Confidentiality Encryption does not give anonymity. It just protects the contents

Why do we care about anonymity?

Why anonymity? Regular citizens don’t want to be tracked People around the world experience censored Internet Their speech on the Internet is also censored… … can lead to arrest, persecution, or worse Not just for dissidents… … if you write something bad about your employer you could be fired Law enforcement needs it too Investigating a suspect: why is alice.fbi.gov reading my Web page? Sting operation: why is alice.fbi.gov selling counterfeits on ebay? Corporations Are your employees reading a competitor’s jobs page? Government Hide list of IPs in Baghdad receiving .gov e-mail (untrusted ISP) What does the CIA Google for? (untrusted service)

Can’t be anonymous by yourself … anonymity loves company

Can’t be anonymous by yourself … anonymity loves company

Simple anonymity design

But an attacker who sees alice can see who she talks to

So add encryption

But the relay is a single point of failure

Also single point to bypass

Solution: multiple relays

Can tell Alice is talking but not to Whom

Can tell someone is talking to bob but not who it is

How it works

How it works

How it works

How it works

How it works

Tor: The Big picture Freely available (open source) Comes with spec + documentation, translated into 15+ languages Several commercial imitators Focus on usability/scalability/incentives 200,000+ active users including gov’t/law enforcement Began in 1995 Now a 501 (c ) 3 with a handful of employees and many volunteers Volunteers run relays, have options to configure traffic load Issues with being responsible for the traffic exiting from exit nodes

Weaknesses/Attacks Eavesdropping AS AS on path between source and entry node + exit node and destination Applications that leak IP address (technically not something Tor protects against) Bad apple attack Use leaked IP + analyze traffic patterns to deanonymize users Run an exit node and eavesdrop DoS Carefully execute commands to exhaust resources on a relay https://blog.torproject.org/blog/new-tor-denial-service-attacks-and-defenses

Stats about Tor https://metrics.torproject.org/

Related anonymity systems Reading presentation: Aqua

Hands on activity Install and run Tor https://www.torproject.org/projects/torbrowser.html.en Run Wireshark while connecting through Tor Explore tor metrics data