CIS 4930/6930 – Privacy-Preserving and Trustworthy Cyber-Systems Dr

Slides:



Advertisements
Similar presentations
Client Puzzles A Cryptographic Defense Against Connection Depletion Attacks Ari Juels and John Brainard RSA Laboratories.
Advertisements

Client Puzzles A Cryptographic Defense Against Connection Depletion Attacks Most of slides come from Ari Juels and John Brainard RSA Laboratories.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 4.2 BiBa.
CSC 774 Advanced Network Security
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Hash Function. What are hash functions? Just a method of compressing strings – E.g., H : {0,1}*  {0,1} 160 – Input is called “message”, output is “digest”
CSC 774 Advanced Network Security
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Hash-based Primitives Credits: Dr. Peng Ning and Dr. Adrian Perrig.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Overview of Cryptography Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Security 2 Distributed Systems Lecture# 15. Overview Cryptography Symmetric Assymeteric Digital Signature Secure Digest Functions Authentication.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks Peng Ning, An Liu North Carolina State University and Wenliang Du Syracuse.
Socket Lab Info. Computer Network. Requirement Use TCP socket to implement a pair of programs, containing a server and a client. The server program shall.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Protecting Web Servers from Content Request Floods Srikanth Kandula ▪ Shantanu Sinha ▪ Dina Katabi ▪ Matthias Jacob CSAIL –MIT.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
Chapter 21 Public-Key Cryptography and Message Authentication.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
Copyright 1999 S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 41b Cryptography and Its Applications.
A Cost-Based Framework for Analysis of Denial of Service in Networks Author: Catherine Meadows Presenter: Ajay Mahimkar.
________________ CS3235, Nov 2002 (Distributed) Denial of Service Relatively new development. –Feb 2000 saw attacks on Yahoo, buy.com, ebay, Amazon, CNN.
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Ari Juels, J. Alex Halderman and Edward W. Felten.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE 519/599 Applied Cryptography ADVANCED PRIMITIVES AND TOOLS Credits: Dr. Peng Ning.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE Network Security Dr. Attila Altay Yavuz Authentication Protocols (I): Secure Handshake.
New Client Puzzle Outsourcing Techniques for DoS Resistance Brent Waters, Stanford University Ari Juels, RSA Laboratories Alex Halderman, Princeton University.
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Breno de MedeirosFlorida State University Fall 2005 The IP, TCP, UDP protocols A quick refresher.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.3 Hash Functions.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Denial of Service Attacks and Countermeasures Analysis Dang Nguyen Duc School of Engineering ( )
Using Rhythmic Nonces for Puzzle-Based DoS Resistance Ellick M. Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, and Daniel Rebolledo University of.
Cryptography CS 555 Topic 34: SSL/TLS.
IT443 – Network Security Administration Instructor: Bo Sheng
CS/ECE 578 Cyber Security Dr. Attila Altay Yavuz
CPS 512 Distributed Systems
DTTF/NB479: Dszquphsbqiz Day 26
Outline Basics of network security Definitions Sample attacks
COMP3220 Web Infrastructure COMP6218 Web Architecture
A way to detect a collision…
CS/ECE 578 Cyber-Security
Topic 14: Random Oracle Model, Hashing Applications
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Cryptography Lecture 13.
Cryptographic Hash Functions
The IP, TCP, UDP protocols
0x1A Great Papers in Computer Security
CS/ECE 418 Introduction to Network Security
A Cryptographic Defense Against Connection Depletion Attacks
CS/ECE 478 Introduction to Network Security
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
A Cryptographic Defense Against Connection Depletion Attacks
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
Pre-image Resistance: Given a, hard to find b such that ____
The Secure Sockets Layer (SSL) Protocol
DTTF/NB479: Dszquphsbqiz Day 27
Lecture 10: Network Security.
Hash-based Primitives Credits: Dr. Peng Ning and Dr. Adrian Perrig
CIS 4930/6930 – Privacy-Preserving and Trustworthy Cyber-Systems Dr
Essential Public Key Crypto Methods Credit: Prof. Dr. Peng Ning
Cryptography Lecture 14.
Cryptography Lecture 13.
Outline Basics of network security Definitions Sample attacks
CRYPTOGRAPHY & NETWORK SECURITY
Presentation transcript:

CIS 4930/6930 – Privacy-Preserving and Trustworthy Cyber-Systems Dr CIS 4930/6930 – Privacy-Preserving and Trustworthy Cyber-Systems Dr. Attila Altay Yavuz Counter Denial of Service Client-Server Puzzles Credits: Dr. Peng Ning and Dr. Adrian Perrig Dr. Attila A. Yavuz

Client Puzzles The problem being addressed Three basic constructions Denial of Service (DoS) attacks Three basic constructions Use pre-image of crypto hash functions Use special image of crypto hash functions

An Example Scenario: TCP SYN Flooding “TCP connection, please.” “TCP connection, please.” “O.K. Please send ack.” “O.K. Please send ack.” Buffer

Client Puzzle: Intuition ??? O.K. Please solve this puzzle. Table for four at 8 o’clock. Name of Mr. Smith. O.K., Mr. Smith Restauranteur

Client Puzzle: Intuition A puzzle takes an hour to solve There are 40 tables in restaurant Reserve at most one day in advance A legitimate patron can easily reserve a table

Client Puzzle: Intuition ??? An attacker has to reserve many tables to have a real impact  too many puzzles to solve

The Client Puzzle Protocol Service request M Server Client Buffer O.K.

Puzzle Properties Puzzles are stateless Puzzles are easy to verify Hardness of puzzles can be carefully controlled Puzzles use standard cryptographic primitives

Puzzle Basis (Cont’d) Cryptographic hash functions (e.g., HMAC) Only way to solve puzzle (X’,Y) is brute force method. (hash function is not invertible) Expected number of steps (hash) to solve puzzle: 2k / 2 = 2k-1

Puzzle Basis: Partial Hash Image partial-image X’ ? k bits ? pre-image X 160 bits hash image Y Pair (X’, Y) is k-bit-hard puzzle

Puzzle Construction Client Server Secret S Service request M

Puzzle Construction Server computes: hash Puzzle hash secret S time T request M hash Puzzle pre-image X hash image Y

Sub-puzzle Construct a puzzle consisting of m k-bit-hard sub-puzzles. Why not use k+logm bit puzzles? Probability of guessing the right solution is different in these two cases. Construct a puzzle consisting of m k-bit-hard sub-puzzles. Increase the difficulty of guessing attacks. Expected number of steps to solve (invert): m×2k-1.

Why not use k+logm bit puzzles? Expected number of trials to invert m×2k-1 But for random guessing attacks, the successful probability One (k+logm)-bit puzzle 2-(k+logm) (e.g., 2-(k+3)) m k-bit subpuzzles (2-k)m = 2-km (e.g., 2-8k)

Puzzle Properties Puzzles are stateless Puzzles are easy to verify Hardness of puzzles can be carefully controlled Puzzles use standard cryptographic primitives

A Possible Way to use Client Puzzle Client puzzle protocol (normal situation) Mi1 : first message of i-th execution of protocol M

A Possible Way to use Client Puzzle Client puzzle protocol (under attack)

New Requirements from the Puzzle Preserve the previous properties The same puzzle can be given to several clients Knowing solution for a client should not help the other (e.g., the adversary) to find another solution Broadcast puzzles! Not one-to-one connection required to initiate. The server should be able to pre-compute the broadcast puzzles. Even faster at online stage Previous: M hash operations per-client (1-1), A client can re-use the same broadcast puzzle to create multiple solutions, multiple access tickets

Puzzle Construction S  All clients (broadcast): Digitally sign: k, Ts, NS Client C  S: C, NS, NC, X S: verify h(C, NS, NC, X) has k leading zero’s