Timing Analysis of Keystrokes And Timing Attacks on SSH

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Ferry Astika Saputra Workshop Administrasi Jaringan TELNET & SSH.
HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
16-1 Last time Internet Application Security and Privacy Authentication Security controls using cryptography Link-layer security: WEP.
Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis Presented by Yang Gao 11/2/2011 Charles V. Wright MIT Lincoln Laboratory Scott.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
Secure Shell Client. SSH program allows you to: Access another computer over a network Execute commands on a remote machine Move files from one machine.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Georgy Melamed Eran Stiller
COS 420 DAY 24. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Student evaluations Latest.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Key-Stroke Timing and Timing Attack on SSH Yonit Shabtai and Michael Lustig supervisor: Yoram Yihyie Technion - Israel Institute of Technology Computer.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
SSH Secure Login Connections over the Internet
Telnet/SSH: Connecting to Hosts Internet Technology1.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Week 2 File Systems & Unix Commands. File System Hierarchy.
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Sleepy Watermark Tracing: An Active Network-based Intrusion Response Framework Xinyuan Wang † Douglas S. Reeves †‡ S. Felix Wu †† Jim Yuill † † Department.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
Anonymity on the Internet Presented by Randy Unger.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
CSCE 815 Network Security Lecture 26 SSH and SSH Implementation April 24, 2003.
Linux Networking and Security
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Session 1341: Case Studies of Security Studies of Intrusion.
CHAPTER 9 Sniffing.
Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems USENIX 2009 Kehuan Zhang, Indiana University, Bloomington XiaoFeng Wang,
- Gene Spafford, Purdue "Using encryption on the Internet is the equivalent of arranging an armored car to deliver credit-card information from.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
TELNET 1.TELNET 2.SSH. TELNET  TELNET is an abbreviation for TErminaL NETwork.  It is the standard TCP/IP protocol for virtual terminal service as proposed.
Introduction to Secure Shell Greg Porter Data Processing Manager USPFO For California.
Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Confidentiality using Conventional Encryption Chapter 5.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
TCP Sliding Windows For each TCP connection each hosts keep two Sliding Windows, send sliding window, and receive sliding window to make sure the correct.
Virtual Private Networks
IT443 – Network Security Administration Instructor: Bo Sheng
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Side-Channel Attack on Encrypted Traffic
Data transfer through the internet (OSI Model)
SECURE SHELL MONIKA GUPTA COT 4810.
Packet Sniffers Lecture 10 - NETW4006 NETW4006-Lecture09.
PPP – Point to Point Protocol
6.6 Firewalls Packet Filter (=filtering router)
2018 Huawei H Real Questions Killtest
Timing Analysis of Keystrokes and Timing Attacks on SSH
0x1A Great Papers in Computer Security
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
SSH – the practical solution
Some slides from Shuo Chen
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

Timing Analysis of Keystrokes And Timing Attacks on SSH Authers:dawn xiaodong song,david wagner xuqing tian publication:usenix security simposium 2001 presenter: hiral chhaya for cap 6133

Outline…… Secure Shell (SSH) weaknesses Analysis of user keystroke patterns Attack using inter-keystroke timing Performance evaluation Countermeasures Comments and conclusion

Ssh- secured shell Offers an encrypted channel and strong authentication. Replaces telnet, rlogin. protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. If attacker tries to takeover the network SSh diconnects.

Ssh- secured shell

Weeknesses of ssh Two seemingly minor weaknesses: Padding: 1-8 bytes Reveals approximate data size In interactive mode, every individual keystrokes is sent to remote machine in separate IP packet. Leaks timing information of user’s typing Padding length Random Padding Payload Integrity data (MAC) Packet length

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Traffic signature attack

Nested ssh attack User establish SSH session between A and B Another session from B to C User’s password for C is transmitted across ssh link A-> B Adversary sniff the password

Statistical analysis of inter-keystroke timings Pick a pair of characters, e.g. (“v”, “o”) Ask users to type the pair for 30-40 times Collect latency information Repeat for every different pair of characters

Hidden markov model (hmm) HMM - A Markov model when the current state can not be observed. Outputs of the process are observed. Probability of output depends only on the state. Information on the prior path of the process can be inferred from it’s output.

Hidden markov model (hmm) Character pair is the hidden state. Keystroke latency measured is the output observation. Two assumptions: Probability of transformation from current state to another state, depends only on the current state. Probability distribution of latency, depends only on the current state q = character pair y = latency observation

Big picture Detect SSH session detect nested SSH or SU A B Sniffer detect nested SSH or SU Keystroke Timing statistics n-Viterbi Possibilities Password

countermeasures Let the server return dummy packets when it receives keystroke packets from the client. Let the client randomly delay sending keystroke packets. Let the client send keystroke packets at a constant rate.

strengths Novel idea Nice technique Good performance Interesting findings Countermeasures given

weeknesses No mention of how to deal with backspace No discussion of how different keyboard layouts affect the results Laptop vs desktop Different keyboard layouts in different regions

THANK YOU