The Devil and Packet Trace Anonymization

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

CCNA – Network Fundamentals
Lecture 7 Transport Layer
BZUPAGES.COM 1 User Datagram Protocol - UDP RFC 768, Protocol 17 Provides unreliable, connectionless on top of IP Minimal overhead, high performance –No.
CCNA 1 v3.1 Module 11 Review.
CSCI 4550/8556 Computer Networks Comer, Chapter 21: IP Encapsulation, Fragmentation, and Reassembly.
Internet Networking Spring 2003
Gursharan Singh Tatla Transport Layer 16-May
Chapter Overview TCP/IP Protocols IP Addressing.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Module 10. Internet Protocol (IP) is the routed protocol of the Internet. IP addressing enables packets to be routed from source to destination using.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
What is FORENSICS? Why do we need Network Forensics?
TCP/IP Yang Wang Professor: M.ANVARI.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
10/8/2015CST Computer Networks1 IP Routing CST 415.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Networked & Distributed Systems TCP/IP Transport Layer Protocols UDP and TCP University of Glamorgan.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
1 Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Linux Networking and Security
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Cisco Networking Academy S2 C9 TCP/IP. ensure communication across any set of interconnected networks Stack components such as protocols to support file.
The Devil and Packet Trace Anonymization Authors: Ruoming Pang, Mark Allman, Vern Paxson and Jason Lee Published: ACM SIGCOMM Computer Communication Review,
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
K. Salah1 Security Protocols in the Internet IPSec.
Process-to-Process Delivery:
© 2003, Cisco Systems, Inc. All rights reserved.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Chapter 7: Transport Layer
CompTIA Security+ Study Guide (SY0-401)
Chapter 5 Network and Transport Layers
Chapter 11 User Datagram Protocol
LESSON Networking Fundamentals Understand TCP/IP.
The Transport Layer Implementation Services Functions Protocols
Transport Layer Slides are originally from instructor: Carey Williamson at University of Calgary Very minor modification are made Notes derived from “Computer.
Introduction to TCP/IP networking
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Internet Networking Spring 2002
8 Network Layer Part V Computer Networks Tutun Juhana
Understand the OSI Model Part 2
Lecture 6: TCP/IP Networking By: Adal Alashban
TCP Transport layer Er. Vikram Dhiman LPU.
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Net 431: ADVANCED COMPUTER NETWORKS
CompTIA Security+ Study Guide (SY0-401)
Packet Sniffing.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Network Fundamentals – Chapter 4
Process-to-Process Delivery:
TCP/IP Protocol Suite: Review
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
TCP/IP Protocol Suite: Review
Lecture 2: Overview of TCP/IP protocol
CPEG514 Advanced Computer Networkst
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
ITIS 6167/8167: Network and Information Security
The TCP/IP Model.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Layer 9/22/2019.
Presentation transcript:

The Devil and Packet Trace Anonymization Authors: Ruoming Pangy, Mark Allmanz, Vern Paxsonz, Jason Lee Princeton University, International Computer Science Institute, Lawrence Berkeley National Laboratory (LBNL) Publication: Computer Communication Review, January 2006. Presenter: Radha V. Maldhure

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONCLUSION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

INTRODUCTION Released data Released data anonymization DATA TO IMPROVE / TO DEVELOP RESEARCHER Released data ATTACKER TO ATTACK DATA e.g. packet traces RESEARCHER Released data anonymization ATTACKER

ANONYMIZATION Releasing network measurement data to research community Publishing traces require balance between security needs of organization and research usefulness Example: “tcpdpriv” removes TCP options from traces, no physical fingerprinting, no research value Research Usefulness Research Usefulness Security Needs Security Needs

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONCLUSION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

PROBLEM WITH CURRENT TECHNIQUES Existing publicly released traces have problems as: No careful guidance on anonymization policy for public release No tool that adapts to particular policy Example : NLANR’s PMA packet traces

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONCLUSION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

USE OF ANONYMIZATION Some uses of anonymization: Your web site's performance and availability Understanding of the Internet’s structure and behavior

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONCLUSION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

PAPER’S CONTENTS Arrives at acceptable anonymization policy Presents a tool “tcpmkpub” that implements the suggested transformations Provides meta-data about each trace for analysis

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONCLUSION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

METHODOLOGY Precise method for anonymization Concerns for Purpose of transform Concerns for appearing traffic Policy decisions Anonymization tool

Example Specification Specification of IP Header anonymization:

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONCLUSION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

ANONYMIZATION POLICY Focuses on traces that include only packet headers A possible policy but not completely a correct policy It is crucial to prevent users of the trace files from determining: identities of specific hosts identities of internal hosts such that a map could be constructed of which hosts support which services security practices of the organization

Protocol Stack Application FTP/ Telnet/ SNMP/ DNS Layer Transport TCP/ UDP Internet Layer IP/ ARP/ ICMP/ IGMP Network Interface Layer Ethernet/ ATM/ FR

CHECKSUMS Re-calculate checksums in traces for two reasons: Reason to anonymize: Re-calculate checksums in traces for two reasons: Gives content of data even when application data removed To determine if original checksum were valid Way to anonymize: Original checksum Co, Calculated checksum Cc Replace Co by Cc Insert “1” into appropriate checksum field to mark packet as failed checksum

NETWORK INTERFACE LAYER: Ethernet Address Reason to anonymize: Ethernet Addresses are distinct to individual NICs Can be used by an attacker to uncover actions of given user Way to anonymize: Three Different methods of randomizing Ethernet addresses Scrambling the entire 6 byte address Scrambling only the lower 3 bytes of address Scrambling lower 3 and upper 3 bytes independently

INTERNET LAYER: IP Address Reason to anonymize: Attacker can attain accounting of user’s activities if he knows IP Address Can plan an attack using information about services running on the host Way to anonymize: Remap addresses differently based on type of addresses Multicast addresses preserved in anonymized trace

TRANSPORT LAYER: TCP/UDP Reason to anonymize: Not given Way to anonymize: Preserves port number and sequence number but not the timestamp They transform timestamps into separate monotonically increasing counters Research use: uniqueness and transmission order of segments

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONCLUSION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

INFORMATION LOSS The effectiveness in preserving information is checked by analyzing original and anonymized traces Two tools for analysis: “tcpsum” and “pOF” tcpsum : Used to find number of packets and bytes sent in each direction Crunches each Tcp connection in trace Except for IP addresses, crunching original and transformed traces matched No value lost in transformation pOF : Did not get what they tried to explain!

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONCLUSION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

VALIDATION Need to validate information intended to mask was indeed transformed or left out of anonymized trace Two ad hoc validations: Inspected the log created by “tcpmkpub” Flags all unexpected aspects of a packet trace Used “ipsumdump” to dump Tcp options Picked timestamps, sorted and verified Timestamp re-numbering appears accurate

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

CONTRIBUTIONS Enumerated and explored devil-ish details in preparing packet traces A framework for implementing anonymization policy and developed “tcpmkpub” Sets framework for future work of packet trace anonymization

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

WEAKNESSES No timing information for analyzing TCP dynamics Preserving port number may lead to identification of a particular machine No performance analysis

AGENDA ANONYMIZATION PROBLEM WITH CURRENT TECHNIQUES USE OF ANONYMIZATION PAPER’S CONTENTS METHODOLOGY ANONYMIZATION POLICY INFORMATION LOSS VALIDATION CONCLUSION CONTRIBUTIONS WEAKNESSES SUGGESTIONS

SUGGESTIONS Needs to deal with different protocols at each layer of protocol stack Should present performance analysis that indicates tool’s efficiency in terms of maintaining security needs preserving research values

QUESTIONS?????????????????