CS590B/690B Detecting Network Interference (FALL 2016)

Slides:



Advertisements
Similar presentations
I Want My Voice to Be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention Amir Houmansadr (The University of Texas at Austin) Thomas.
Advertisements

Censorship Resistance: Decoy Routing Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See.
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network Rob Jansen et. al NDSS 2014 Presenter: Yue Li Part of slides adapted from R.
Onion Routing Security Analysis Aaron Johnson U.S. Naval Research Laboratory DC-Area Anonymity, Privacy, and Security Seminar.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Censorship Resistance: Parrots Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Jeremiah O’Connor CS 683 Fall 2012 CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
The Parrot is Dead: Observing Unobservable Network Communications
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Routing Around Decoys Max Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper Proposed in FOCI'11, USINIX Security'11 and CCS'11 Presented by:
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 20 PHILLIPA GILL - STONY BROOK U.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 19 PHILLIPA GILL - STONY BROOK U.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 16 PHILLIPA GILL - STONY BROOK U.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Strengthening Tor against Eavesdropping Correlation Attacks Robert Thomas CSCE APR 2015 Audio:
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
NETWORK SECURITY HERD: A SCALABLE, TRAFFIC ANALYSIS RESISTANT ANONYMITY NETWORK FOR VOIP SYSTEMS JINGTAO YAO JIAJUN LI ACM HORNORED CLASS.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum
Seminar on 4G wireless technology
CS590B/690B Detecting Network Interference
Presented by Nelson Mandela Date 7th February 2017
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting network interference (Fall 2016)
CONNECTING TO THE INTERNET
CS590B/690B Detecting Network Interference (Fall 2016)
Instructor Materials Chapter 9: Testing and Troubleshooting
CS590/690 Detecting network interference Fall 2016
Tor Internals and Hidden Services
Practical Censorship Evasion Leveraging Content Delivery Networks
CS590B/690B Detecting Network Interference (Fall 2016)
Anonymous Communication
Telemedicine.
Living in a Network Centric World
Living in a Network Centric World
CS590B/690B Detecting Network Interference
Introduction to Networks
The University of Adelaide, School of Computer Science
Packet Sniffing.
Privacy Through Anonymous Connection and Browsing
PPPoE Internet Point to Point Protocol over Ethernet
Progress leisure OCR GCSE ICT.
0x1A Great Papers in Computer Security
IS4680 Security Auditing for Compliance
Living in a Network Centric World
Anonymous Communication
Living in a Network Centric World
Firewalls Jiang Long Spring 2002.
CS590B/690B Detecting network interference (Spring 2018)
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Anonymous Communication
Living in a Network Centric World
Anonymous Communication
Living in a Network Centric World
Presentation transcript:

CS590B/690B Detecting Network Interference (FALL 2016) Lecture 17 Phillipa Gill – Umass -- Amherst

Where we are Last time: Attacks on Tor Timing attacks Today: Review/discussion Covert channels Why imitating existing protocols doesn’t work.

Review questions – Tor basics What does it mean to be anonymous? Informally? Formally? Where might an adversary compromise an anonymity network? Why is confidentiality not enough to ensure anonymity? Why might law enforcement want to be anonymous? Why might dissidents want to be anonymous? Why do you need multiple groups to ensure anonymity? What is onion routing? What are some weaknesses of Tor?

Review – Relay-based Timing Attacks Why are these plots different for the different applications when we consider exit-relay or guard+exit-relay compromises but the same when we only consider guard-relay compromise? Exit relay Guard+Exit relay Guard relay

Review – AS AWARE Tor clients What are three fundamental challenges faced by AS-aware Tor clients? How do users get routed and holding all the ASes differ in their approach to predicting network paths? List the AS-level attacks discussed in RAPTor What challenges do these attacks post to researchers developing AS-aware Tor clients? How does an adversary on the reverse path learn packet timings and sizes? Why is increasing the AS-level diversity of Tor relays challenging?

Where we are Today: Review/discussion Covert channels Why imitating existing protocols doesn’t work.

Challenge Circumvention tools can get around censorship, but have a hard time not being observable Ie., they generally cannot hide the fact that users are using them E.g., Tor is not completely effective for circumvention because a censor can just block the IPs of known relays Users who are seen using these tools may face trouble from the government .. And the censor can leverage observability to stop the system Reduce availability

freewave Traffic obfuscation: Hide covert traffic *within* an *actual* implementation of an application. Server obfuscation: Leverage oblivious participants in VOIP network

FreeWave: IP over Voice-over-IP Target protocol: Voice-over IP (VoIP) Why VoIP Widely used protocol (only 663 Million Skype users) Collateral damage to block Encrypted How to hide? The dial-up modems are back! NDSS 2013 http://dedis.cs.yale.edu/dissent/papers/freewave-slides.pptx

FreeWave architecture Server Client NDSS 2013 http://dedis.cs.yale.edu/dissent/papers/freewave-slides.pptx

Threat model + Goals User connects to the Internet via a censoring ISP which precludes access to specific destinations. + limits access to circumvention tools ISP does not want to compromise usability of the network E.g. political/economic pressures Goals Unblockability: the systems needs to be unblockable by censors Unobservability: should hide the fact that users are using the circumvention system Security: anonymity, privacy and confidentiality of users need to be protected Deployment feasibilty: avoid dependencies on other systems (e.g ISPs) QoS: Needs to provide adequate bandwidth and latency appropriate for Web browsing.

Basic idea of Freewave User downloads the Freewave Client and enters her VoIP ID and makes a call to the FreeWave server (by entering its VoIP ID). Server is set up such that connections will go via an oblivious VoIP client (e.g., Skype supernode). Since VoIP connection is encrypted censor cannot ID server’s VoIP ID and censor it. Components: VoIP client Virtual Sound Card (virtual sound card interface: any application can use it the same way a physical sound card is utilized). MoDem: application that translates network traffic into acoustic signals and vice versa (aka Modulator Demodulator) Proxy: Server uses this to relay traffic received via VoIP connections to its final destination.

Basic components

Performance 16-19 kbps

FreeWave’s unobservability Traffic analysis (packet rates and sizes) Fixed rate codecs (e.g., G.7 series) Not an issue  Variable bit-rates (e.g., Skype’s SILK) Simple analysis Superimpose with recoded conversation NDSS 2013