Cost to defeat the N-1 Attack

Slides:



Advertisements
Similar presentations
Service Bus Service Bus Access Control.
Advertisements

APPLICATION LAYER. DeviceNet Interface Notes DeviceNet Protocol supports Master/Slave, Multiple Master and Peer to Peer Communications SDN Scanner.
A P RESENTATION O N R ESOURCE D ISCOVERY I N T HE P EER- T O- P EER N ETWORK by Aravind Renganathan.
Registers and Counters. Register Register is built with gates, but has memory. The only type of flip-flop required in this class – the D flip-flop – Has.
Cassandra Structured Storage System over a P2P Network Avinash Lakshman, Prashant Malik.
Helper Protocols Protocols that either make it easier for IP to do its job, or extend the capabilities of the network layer.
Message Splitting Against the Partial Adversary Andrei Serjantov The Free Haven Project (UK) Steven J Murdoch University of Cambridge Computer Laboratory.
Reusable Anonymous Return Channels
Denial-of-Service Resilience in Peer-to-Peer Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica and W. Zwaenepoel Presenter: Yan Gao.
Dynamic Anonymity Emin İslam Tatlı, Dirk Stegemann, Stefan Lucks University of Mannheim, Germany.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
The central processing unit and main memory chapter 4, Exploring the Digital Domain The Development and Basic Organization of Computers.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
1 CMPT 471 Networking II DHCP Failover and multiple servers © Janice Regan,
SIGNALING. To establish a telephone call, a series of signaling messages must be exchanged. There are two basic types of signal exchanges: (1) between.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Anonymity on the Internet Presented by Randy Unger.
Anonymous Communication -- a brief survey
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Layer 2 and Switching. How Computers Communicate  In a two node flat network data can be sent without addressing.
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
Anonymous Health Information Exchange (HIE) Transfer with Credibility Check against Fraud through Chaum Mixes and Crowds. By: Aaron Silcott.
Effectiveness of Blending Attacks on Mixes Meng Tang.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Add 2-digit numbers with regrouping. Add 2-digit numbers with regrouping
Effects of Adding Arbitrary Physical Nodes(APNs) to a Mobile Ad-Hoc Network (MANET)Utilizing a Anonymous Routing Protocol.
Verifiable Mixing Protocol How can a mixer prove its integrity?
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
Fall, 2001CS 6401 Switching and Routing Outline Routing overview Store-and-Forward switches Virtual circuits vs. Datagram switching.
Spatial Aware Geographic Forwarding for Mobile Ad Hoc Networks Jing Tian, Illya Stepanov, Kurt Rothermel {tian, stepanov,
Washington University
Packets & Routing Lower OSI layers (1-3) concerned with packets and the network Packets carry data independently through the network, and into other networks…
Troubleshooting Network Communications
A Study of Group-Tree Matching in Large Scale Group Communications
Anonymous Communication
Chapter 8 – Software Testing
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
The quieter you become, the more you are able to hear By: Ben Knapic
Network Programming (3)
Virtual LANs.
Reliable MIX Cascade Networks Through Reputation
Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms
Ethernet Network Systems Security
Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity and Identity Management – A Consolidated Proposal for Terminology Authors: Andreas.
0x1A Great Papers in Computer Security
Enhancing chaum mixes with randomness
مفاهیم بهره وري.
Free-route Mixes vs. Cascades
Enhancing of chaum mixes with random probabilistic functions
Intradomain Routing Outline Introduction to Routing
Anonymous Communication
Online Jam Space.
Chapter 10 IGMP Prof. Choong Seon HONG.
Virtual LAN VLAN Trunking Protocol and Inter-VLAN Routing
Hazard-free Karnaugh Map Minimisation
Bridges Neil Tang 10/10/2008 CS440 Computer Networks.
Migrating Your Data to the Cloud? Location Matters
QoS routing Finding a path that can satisfy the QoS requirement of a connection. Achieving high resource utilization.
Anonymous Communication
Anonymity – Generalizing Mixes
Multiprocessors and Multi-computers
Contributors: Connor McCoy
Presentation transcript:

Cost to defeat the N-1 Attack Neil Chettiar

Plan Modify a pool mix to output n+k messages for every n input messages. MIX

How costly is it? Always maintain a pool of k dummy messages. Use a random function to decide if the mix should or should not send out k dummy messages. Use Heartbeat traffic to check if an N-1 attack is in progress, use this information to weigh the decision. Set a Time-To-Live value for the dummy traffic.

Focus Points Does the strategy really beat the N-1 attack? How is the pool Mix triggered: OR/AND, Dynamic Threshold? Set limits of the number of dummy messages used. How expensive is it to use the Dummy messages? Cases when HeartBeat strategy gets wrongly triggered. Extreme situations when the proposed random function fails to defeat the N-1 attack.

Resources 1. On blending attacks for mixes with Memory extended version. 2. Regroup-And-Go mixes to counter the (n-1) attack. 3. Active attacks on Reputable mix Networks. 4. Heartbeat traffic to counter (n-1) attacks. 5. A Least Squares approach to the static traffic analysis of high-latency anonymous communication systems. 6. Untraceable electronic mail, return addresses and digital pseudonyms. 7. From a trickle to a Flood: Active attacks on several Mix types. 8. Real-Time Mixes: A Bandwidth-Efficient anonymity protocol.

Questions?